Web Services-Based Architecture for RFID Applications

被引:0
作者
Sundaram, David [1 ]
Zhou, Wei [2 ]
Pienaar, Schalk [1 ]
Piramuthu, Selwyn [3 ]
机构
[1] Univ Auckland, Dept Informat Syst & Operat Management, Private Bag 92019, Auckland 1, New Zealand
[2] ESCP Europe, Informat Syst & Technol, F-75543 Paris 11, France
[3] Univ Florida, Informat Syst & Operat Management, Gainesville, FL 32611 USA
来源
2009 13TH ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS (EDOCW 2009) | 2009年
关键词
RFID; Web Services; evolvability; architectures; AUTHENTICATION;
D O I
10.1109/EDOCW.2009.5332011
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Two crucial elements of cyber-infrastructures of the future are Web Services and Radio Frequency Identification (RFID) tags. Tags are frequently being incorporated in systems that communicate with one another. Among other things, these systems communicate individually with RFID tags that pass through their field of presence as well as share data thus collected with other systems. There is a need to link these elements to develop e-infrastructures that enable an organization to learn and evolve, be agile and flexible, and adapt to the changing requirements of the highly interconnected environment. While providing flexibility and evolvability we argue that the characteristics of information generated through Web Services and RFID tags enable us to provide services that are also stable and available. The stabilization and convergence of standards for the execution of business processes, Web Services, RFID data enable us to design cyber-infrastructures that resemble the supply chain services they support. We propose and illustrate a Web Services based architecture for such applications.
引用
收藏
页码:100 / +
页数:3
相关论文
共 8 条
[1]  
Fremantle P, 2002, COMMUN ACM, V45, P77, DOI 10.1145/570907.570935
[2]  
Johnston S. J., 2002, STATE WEB SERVICES
[3]  
KAPOOR G, 2008, P 16 INT C ADV COMP
[4]   Web services and business process management [J].
Leymann, F ;
Roller, D ;
Schmidt, MT .
IBM SYSTEMS JOURNAL, 2002, 41 (02) :198-211
[5]   Lightweight cryptographic authentication in passive RFID-tagged systems [J].
Piramuthu, Selwyn .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2008, 38 (03) :360-376
[6]   Protocols for RFID tag/reader authentication [J].
Piramuthu, Selwyn .
DECISION SUPPORT SYSTEMS, 2007, 43 (03) :897-914
[7]  
ZHOU W, 2008, GLOBAL DECISION SUPP
[8]   RFID and item-level information visibility [J].
Zhou, Wei .
EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2009, 198 (01) :252-258