Authentication and access control in RFID based logistics-customs clearance service platform

被引:8
作者
Deng H.-F. [1 ]
Deng W. [2 ]
Li H. [3 ,4 ]
Yang H.-J. [4 ]
机构
[1] School of Computer Science and Engineering, South China University of Technology
[2] School of Software Engineering, South China University of Technology
[3] School of Computer Science and Technology, Dalian University of Technology
[4] School of Computing, De Montfort University, Leicester
基金
国家高技术研究发展计划(863计划);
关键词
Access control; Content security; Control transfer; Logistics-customs clearance service platform (LCCSP); Unified identity authentication;
D O I
10.1007/s11633-010-0180-x
中图分类号
学科分类号
摘要
The content security requirements of a radio frequency identification (RFID) based logistics-customs clearance service platform (LCCSP) are analysed in this paper. Then, both the unified identity authentication and the access control modules are designed according to those analyses. Finally, the unified identity authentication and the access control on the business level are implemented separately. In the unified identity authentication module, based on an improved Kerberos-based authentication approach, a new control transfer method is proposed to solve the sharing problem of tickets among different servers of different departments. In the access control module, the functions of access controls are divided into different granularities to make the access control management more flexible. Moreover, the access control module has significant reference value for user management in similar systems. © 2010 Institute of Automation, Chinese Academy of Sciences and Springer-Verlag Berlin Heidelberg.
引用
收藏
页码:180 / 189
页数:9
相关论文
共 16 条
[1]  
Deng H.F., Huang J.C., System integration and data exchange solution based on message queue software bus, Journal of South China University of Technology (Natural Science Edition), 36, 5, pp. 1-5, (2008)
[2]  
Hussak W., Yang S.H., Formal reduction of interfaces to large-scale process control systems, International Journal of Automation and Computing, 4, 4, pp. 413-421, (2007)
[3]  
Kohl J., Neuman C., RFC 1510: The Kerberos Network Authentication Service (V5), (1993)
[4]  
Whitepaper on Liberty Protocol and Identity Theft, (2004)
[5]  
Net Passport Technical Overview, (2001)
[6]  
Chapman R., Hilton A., Enforcing security and safety models with an information flow analysis tool, ACM SIGAda Ada Letters, 24, 4, pp. 39-46, (2004)
[7]  
Zhang H., Che T., Li N., Analysis and improvement of authentication protocol named Kerberos, Journal of Computer Applications, 22, 12, pp. 25-27, (2002)
[8]  
Xue L., Research and Implementation of Single Sign-on for Internet/Intranet, (2006)
[9]  
Neuman B.C., Ts'o T., Kerberos: An authentication service for computer networks, IEEE Communications Magazine, 32, 9, pp. 33-38, (1994)
[10]  
Introduction to Single Signon