Abstract
Radio frequency identification (RFID) technology is used for access control systems, public transit fares, credit and debit cards, and for anti-counterfeiting purposes. In all three cases malicious duplication of RFID tags or their theft can have significant consequences for the owner or product user. This paper presents an implementation of a risk-based access control system, Dynamic Risk Assessment Access Control (DRAAC) for the Microsoft Windows operating system. This implementation of DRAAC can be connected to a wide range of devices including RFID systems, smartphones, and PCs. Copyright 2012 ACM.
Author supplied keywords
Cite
CITATION STYLE
Butler, M., Reed, S., Hawrylak, P. J., & Hale, J. (2013). Implementing graceful RFID privilege reduction. In ACM International Conference Proceeding Series. https://doi.org/10.1145/2459976.2460037
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.