Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2009.16-C.3.307

RBAC Based Security Model for International Logistic Service  

Hwang, Jeong-Hee (남서울대학교 컴퓨터학과)
Shin, Moon-Sun (건국대학교 컴퓨터시스템학과)
Lee, Jong-Yun (충북대학교 컴퓨터교육과)
Hwang, Ik-Soo (한국무역정보통신)
Abstract
RFID technique which is recognizable without the physical contact between the reader and the tag is the core to archive ubiquitous environment, and has been attracting a lot of interest from both industry and academic institutes. Especially, RFID based logistic service management can get the low priced cost and the advancement of the appointed date of delivery. In this paper, we first analyze security requirements of international logistics process, and then propose a RBAC based security model and represent access control constraints using UML.
Keywords
Radio Frequency Identification(RFID); Security; Security Policy; Logistics Service;
Citations & Related Records
연도 인용수 순위
  • Reference
1 S.Lee, R.Gandhi and G.Ahn 'Security Requirements Driven Risk Assessment for Critical Infrastructure Information Systems,' In Proceedings of the 3rd Symposium on Requirements Engineering for Information Security, 2005
2 A. Poniszewska-Maranda, 'Role Engineering of information system using extended RBAC,' In Proceedings of the 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise, WETICE 2005   DOI
3 안규희, 이기열, 정목동, 'RFID 애플리케이션을 위한 엔터프라이즈 애플리케이션 프레임워크와 비즈니스 프로세스 모델,' 한국정보과학회 가을 학술 논문집, 제 33권 제2호, 2006.10   과학기술학회마을
4 EPCglobal. 'Object Naming Service(ONS) Version 1.0,' October 4,2005
5 EPCglobal, 'EPCglobal Data Exchange Joint Discussion Group,' September 19, 2006
6 EPCglobal, 'EPCglobal Tag Data Standard Version 1.3 Ratified Specification,' http://www.epcglobalinc.org, March 8, 2006
7 EPCglobal, 'Reader Protocol Standard, Version 1.1 Ratified Standard,' http://www.epcglobalinc.org, June 21, 2006
8 NIST(National Institute of Standards and Technology). 'Guidelines for Securing Radio Frequency Identification System,' April, 2007
9 A Basic Introduction to RFID Technology and Its use in the Supplychain, http://www.printronix.com/uploadedFiles/Laran_WhitePaper_RFID.pdf, January 2004
10 N.Mayer, A. Rifaut and E.Dubois, 'Towards Risk-Based Security Requirements Engineering Framework,' In Proceedings of the 11the International Workshop on Requirements Engineering: Foundation for Software Quality, 2005
11 L.Liu, E.S.K.Yu and J.Mylopoulus, 'Security and Privacy Requirements Analysis within a Social Setting,' In Proceedings of the 11the IEEE International Workshop on Requirements Engineering Conference, 2003
12 P. Epstein, R. Sandhu, 'Toward A Uml Based Approach to Role Engineering,' In Proceedings of the fourth ACM workshop on Role-based access control table of contents, 1999   DOI
13 대한상공회의소, 'http://scm.korcham.net/download/SCM_guide.pdf, 2005
14 최길영, 성낙선, 모희숙, 박찬원, 권성호, 'RFID 기술 및 표준화동향,' 전자통신동향분석 제22권 제3호, 2007. 6   과학기술학회마을
15 산은경제연구소. 'RFID산업의 동향과 전망,' 2007.09
16 EPCglobal. 'The EPCglobal architecture framework final version,' July 1,2005
17 EPCglobal. 'EPC Information Services(EPCIS) Version 1.0 Specification,' April 12, 2007
18 I. Ray, N. Li, R. France, 'Using UML To Visualize Role-Based Access Contol Constraints,' In Proceedings of the ninth ACM symposium on Access control models and technologies table of contents, 2004   DOI