Implementing graceful RFID privilege reduction

2Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Radio frequency identification (RFID) technology is used for access control systems, public transit fares, credit and debit cards, and for anti-counterfeiting purposes. In all three cases malicious duplication of RFID tags or their theft can have significant consequences for the owner or product user. This paper presents an implementation of a risk-based access control system, Dynamic Risk Assessment Access Control (DRAAC) for the Microsoft Windows operating system. This implementation of DRAAC can be connected to a wide range of devices including RFID systems, smartphones, and PCs. Copyright 2012 ACM.

Cite

CITATION STYLE

APA

Butler, M., Reed, S., Hawrylak, P. J., & Hale, J. (2013). Implementing graceful RFID privilege reduction. In ACM International Conference Proceeding Series. https://doi.org/10.1145/2459976.2460037

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free