SlideShare une entreprise Scribd logo
1  sur  18
License-based Access Control in EPCglobal Networks RFID Systech 2011 May 17-18, 2011 – Dresden, Germany Matthieu-P. SchapranowHasso Plattner Institute
Agenda European Pharmaceutical Industry License-based Access Control Related Publications Real-time Security Extensions for RFID-aided Supply Chains, Schapranow, Feb 23, 2011 2
European Pharmaceutical IndustryMotivation Increasing counterfeit rates in pharmaceutical industry 34 million fake drugs in only two months in Europe [1] Pharmaceuticals: 3rd place / 10% of all intercepted articles [2] Current literature proposes Radio Frequency Identification (RFID)technology or data matrix for anti-counterfeiting [6] Problem: Low-cost tags do not provide security mechanisms But: RFID enables fine-grained tracking and tracing of each item “Minimize the used of personal data” [5] “Privacy by design” [3] Real-time Security Extensions for RFID-aided Supply Chains, Schapranow, Feb 23, 2011 3
European Pharmaceutical IndustryManufacturing Real-time Security Extensions for RFID-aided Supply Chains, Schapranow, Feb 23, 2011 4
European Pharmaceutical IndustryCounterfeits Real-time Security Extensions for RFID-aided Supply Chains, Schapranow, Feb 23, 2011 5
European Pharmaceutical IndustryComponents for Anti-counterfeiting Real-time Security Extensions for RFID-aided Supply Chains, Schapranow, Feb 23, 2011 6 Anti-counterfeiting service provider validates authenticity of concrete item for customers, e.g. in a pharmacy Discovery Service supports to identify appropriate Electronic Product Code Information Services (EPCIS) repository EPCIS repository contains all event data for handled products of a certain supply chain partner
European Pharmaceutical IndustryRoles Approx. 30 billion pharmaceuticalsper year [13] Main Roles [21] Manufacturers: ≈2.2k Wholesalers: ≈50k Retailers: ≈140k Other Roles Logistics Providers End Consumers Real-time Security Extensions for RFID-aided Supply Chains, Schapranow, Feb 23, 2011 7
License-based Access ControlSecurity Security := {confidentiality, integrity, availability} [4] Confidentiality := prevent unauthorized reading of event data Integrity := protect event data from being manipulated Availability := provide access only to authorized parties Extension of current EPCglobal networks to guarantee Confidentiality of event data, since it can be abused to derive business secrets,  Integrity of business data, i.e. a foundation for automatic anti-counterfeiting, and Fine-grained access for certain business partners. Real-time Security Extensions for RFID-aided Supply Chains, Schapranow, Feb 23, 2011 8
License-based Access ControlActors Real-time Security Extensions for RFID-aided Supply Chains, Schapranow, Feb 23, 2011 9 A := queries details for a certain EPC ACC := checks licenses, decrypts content, and applies access rights EPCIS := stores encrypted event data to serve it to querying parties B := captures EPC event data and stores it in the local EPCIS
License-based Access ControlBusiness Process Event owner Encrypts all event data, with individual master key per attribute (encrypter.py) Stores data in local EPCIS event repository Creates unique license per client and encrypt it with owners private key (license-encrypter.py) License contains a unique ID and decryption keys for granted attributes  ACC is responsible for Decryption of the license with the help of its public key, i.e. it can decrypted any license(decrypter.py) Enforcing access rights on per-attribute level and EPC lists Real-time Security Extensions for RFID-aided Supply Chains, Schapranow, Feb 23, 2011 10
License-based Access ControlPython Prototype Real-time Security Extensions for RFID-aided Supply Chains, Schapranow, Feb 23, 2011 11
License-based Access ControlSecurity Evaluation Real-time Security Extensions for RFID-aided Supply Chains, Schapranow, Feb 23, 2011 12
Related Publications [1] European Commission: Customs: Millions of illegal Medicines stopped by "MEDI-FAKE" action. IP/08/1980, 2008 [2] European Commission Taxation and Customs Union: Statistics of Customs Detentions Recorded at the External Borders of the EU, EU-wide statistics for 2009, 2010 [3] European Commission: Commission Recommendation on the Implementation of Privacy and Data Protection Principles in Applications supported by Radio-Frequency Identification, Brussel, 2009 [4] Federal Office for Information Security: Standard 100-1 Information Security Management Systems (ISMS) V. 1.5, 2008 [5] Federal Data Protection Act §3a: “Datenvermeidung und Datensparsamkeit”, 2009 [6] European Commission: Public Consultation in Preparation of a Legal Proposal to Combat Counterfeit Medicines for Human Use -- Key Ideas for better Protection of Patients against the Risk of Counterfeit Medicines, Brussel, 2008 [7] Matthieu-P. Schapranow, Alexander Zeier, Felix Leupold, Tobias Schubotz: Securing EPCglobal Object Name Service -- Privacy Enhancements for Anti-counterfeiting, 2nd International Conference on Intelligent Systems, Modeling and Simulation, 2011 [8] Matthieu-P. Schapranow, Alexander Zeier, Hasso Plattner: A Formal Model for Enabling RFID in Pharmaceutical Supply Chains, 44th Hawaii International Conference on System Sciences, 2011 [9] Matthieu-P. Schapranow, Alexander Zeier, Hasso Plattner: A Dynamic Mutual RFID Authentication Model Preventing Unauthorized Third Party Access, The 4th International Conference on Network and System Security, 2010 [10] Matthieu-P. Schapranow, Mike Nagora, Alexander Zeier: CoMoSeR: Cost Model for Security-Enhanced RFID-Aided Supply Chains, 18th International Conference on Software, Telecommunication and Computer Networks, 2010 Real-time Security Extensions for RFID-aided Supply Chains, Schapranow, Feb 23, 2011 13
Related Publications [11] Jürgen Müller, Martin Lorenz, Felix Geller, Matthieu-P. Schapranow, Thomas Kowark, Alexander Zeier: Assessment of Communication Protocols in the EPC Network: Replacing Textual SOAP and XML with Binary Google Protocol Buffers Encoding, 17th IEEE International Conference on Industrial Engineering and Engineering Management, Xiamen, China, 2010 [12] Matthieu-P. Schapranow, Jens Krüger, Vadym Borovskiy, Alexander Zeier, Hasso Plattner: Data Loading & Caching Strategies in Service-Oriented Enterprise Applications, Proceedings of IEEE Congress on Services (SERVICES 2009), Los Angeles, CA, USA, 2009 [13] Jürgen Müller, Matthieu-P. Schapranow, Marco Helmich, Sebastian Enderlein, Alexander Zeier: RFID Middleware as a Service - Enabling Small and Medium-sized Enterprises to Participate in the EPC Network, 16th International Conference on Industrial Engineering and Engineering Management (IE&EM), Beijing, China, 2009 [14] Jürgen Müller, Matthias Uflacker, Jens Krüger, Matthieu-P. Schapranow, Alexander Zeier: noFilisCrossTalk 2.0 as Device Management Solution, Experiences while Integrating RFID Hardware into SAP Auto-ID Infrastructure, 16th International Conference on Industrial Engineering and Engineering Management (IE&EM), Beijing, China, 2009 [15] Matthieu-P. Schapranow, Jürgen Müller, Sebastian Enderlein, Marco Helmich, Alexander Zeier: Low-Cost Mutual RFID Authentication Model Using Predefined Password Lists, 16th International Conference on Industrial Engineering and Engineering Management, Beijing, China, 2009 [16] Matthieu-P. Schapranow, Martin Grund, Jens Krüger, Jan Schaffner, Anja Bog: Combining Advantages - Unified Data Stores in Global Enterprises, IEEE Symposium on Advanced Management of Information for Globalized Enterprises, Tianjin, China, 2008 [17] Jürgen Müller, Matthieu-P. Schapranow, Conrad Pöpke, Michaela Urbat, Alexander Zeier, Hasso Plattner: Best Practices for Rigorous Evaluation of RFID Software Components, Proceedings of the 6th European Workshop on RFID Systems and Technologies, Ciudad Real, Spain, 2010 Real-time Security Extensions for RFID-aided Supply Chains, Schapranow, Feb 23, 2011 14
Related Publications [18] Matthieu-P. Schapranow, Jürgen Müller, Alexander Zeier, Hasso Plattner: Sustainable Use of RFID Tags in the Pharmaceutical Industry, European Workshop on Smart Objects: Systems, Technologies and Applications, Ciudad Real, Spain, 2010 [19] Matthieu-P. Schapranow, Jürgen Müller, Alexander Zeier, Hasso Plattner: RFID Event Data Processing -- An Architecture for Storing and Searching, Proceedings of the 4th International Workshop on RFID Technology - Concepts, Applications, Challenges, Funchal, Madeira, Portugal, 2010 [20] Matthieu-P. Schapranow, Jürgen Müller, Alexander Zeier, Hasso Plattner: Security Aspects in Vulnerable RFID-Aided Supply Chains, Proceedings of the 5th European Workshop on RFID Systems and Technologies, Bremen, 2009 [21] Jürgen Müller, Martin Faust, David Schwalb, Matthieu-P. Schapranow, Alexander Zeier, Hasso Plattner: A Software as a Service RFID Middleware for Small and Medium-sized Enterprises, Proceedings of the 5th European Workshop on RFID Systems and Technologies, Bremen, Germany, 2009 Real-time Security Extensions for RFID-aided Supply Chains, Schapranow, Feb 23, 2011 15
Thank you for your interest!Keep in contact with us. Responsible: Deputy Prof. of Prof. Hasso PlattnerDr. Alexander Zeierzeier@hpi.uni-potsdam.de Matthieu-P. Schapranow, M.Sc. matthieu.schapranow@hpi.uni-potsdam.de Hasso Plattner InstituteEnterprise Platform & Integration ConceptsMatthieu-P. SchapranowAugust-Bebel-Str. 8814482 Potsdam, Germany RFIDSystech10, Sustainable Use of RFID Tags in the Pharma Industry, Schapranow, June 15-16, 2010 16
BACKUP Real-time Security Extensions for RFID-aided Supply Chains, Schapranow, Feb 23, 2011 17
European Pharmaceutical IndustryData Sizing Assumptions ≈15 billion pharmaceuticals on prescription per year [21] ≥11 relevant events per unique item 1 x manufacturer (create + ship) 2 x wholesaler (receive + 2 x observe + ship)  1 x retailer (receive + sell) 1 x end consumer (check) Assuming 360 days production results in ≈5,300 events/s within the European pharmaceutical supply chain Individual events are very small, i.e. avg. 182 Byte[19] Real-time Security Extensions for RFID-aided Supply Chains, Schapranow, Feb 23, 2011 18

Contenu connexe

Tendances

Witdom overview 2016
Witdom overview 2016Witdom overview 2016
Witdom overview 2016Elsa Prieto
 
6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...IJNSA Journal
 
6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...IJNSA Journal
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
 
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0ITCamp
 
2015 security for the internet of things a survey of
2015 security for the internet of things a survey of2015 security for the internet of things a survey of
2015 security for the internet of things a survey ofVinod Salunkhe
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT DevicesIRJET Journal
 
Mobile Web Services in Health Care and Sensor Networks
Mobile Web Services in Health Care and Sensor NetworksMobile Web Services in Health Care and Sensor Networks
Mobile Web Services in Health Care and Sensor NetworksDr. Fahad Aijaz
 
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Scientific Review SR
 
PhD Projects in MQTT Research Ideas
PhD Projects in MQTT Research IdeasPhD Projects in MQTT Research Ideas
PhD Projects in MQTT Research IdeasPhD Services
 
Legal Issues in Research Data Collection and Sharing: An Introduction by EUDA...
Legal Issues in Research Data Collection and Sharing: An Introduction by EUDA...Legal Issues in Research Data Collection and Sharing: An Introduction by EUDA...
Legal Issues in Research Data Collection and Sharing: An Introduction by EUDA...EUDAT
 
Internet of Things (IoT) Business & Technology & Patent Integrated Strategy
Internet of Things (IoT) Business & Technology & Patent Integrated StrategyInternet of Things (IoT) Business & Technology & Patent Integrated Strategy
Internet of Things (IoT) Business & Technology & Patent Integrated StrategyAlex G. Lee, Ph.D. Esq. CLP
 

Tendances (13)

Witdom overview 2016
Witdom overview 2016Witdom overview 2016
Witdom overview 2016
 
6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...
 
6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...
 
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSSECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGS
 
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0
 
2015 security for the internet of things a survey of
2015 security for the internet of things a survey of2015 security for the internet of things a survey of
2015 security for the internet of things a survey of
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT Devices
 
Mobile Web Services in Health Care and Sensor Networks
Mobile Web Services in Health Care and Sensor NetworksMobile Web Services in Health Care and Sensor Networks
Mobile Web Services in Health Care and Sensor Networks
 
Io t first(1)
Io t first(1)Io t first(1)
Io t first(1)
 
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
 
PhD Projects in MQTT Research Ideas
PhD Projects in MQTT Research IdeasPhD Projects in MQTT Research Ideas
PhD Projects in MQTT Research Ideas
 
Legal Issues in Research Data Collection and Sharing: An Introduction by EUDA...
Legal Issues in Research Data Collection and Sharing: An Introduction by EUDA...Legal Issues in Research Data Collection and Sharing: An Introduction by EUDA...
Legal Issues in Research Data Collection and Sharing: An Introduction by EUDA...
 
Internet of Things (IoT) Business & Technology & Patent Integrated Strategy
Internet of Things (IoT) Business & Technology & Patent Integrated StrategyInternet of Things (IoT) Business & Technology & Patent Integrated Strategy
Internet of Things (IoT) Business & Technology & Patent Integrated Strategy
 

Similaire à License-based Access Control in EPCglobal Networks

A Formal Model for Enabling RFID in Pharmaceutical Supply Chains
A Formal Model for Enabling RFID in Pharmaceutical Supply ChainsA Formal Model for Enabling RFID in Pharmaceutical Supply Chains
A Formal Model for Enabling RFID in Pharmaceutical Supply ChainsMatthieu Schapranow
 
CoMoSeR: Cost Model for Security-Enhanced RFID-Aided Supply Chains
CoMoSeR: Cost Model for Security-Enhanced RFID-Aided Supply ChainsCoMoSeR: Cost Model for Security-Enhanced RFID-Aided Supply Chains
CoMoSeR: Cost Model for Security-Enhanced RFID-Aided Supply ChainsMatthieu Schapranow
 
SAPPHIRE NOW 2011: Business Impacts of RFID-aided Supply Chains
SAPPHIRE NOW 2011: Business Impacts of RFID-aided Supply ChainsSAPPHIRE NOW 2011: Business Impacts of RFID-aided Supply Chains
SAPPHIRE NOW 2011: Business Impacts of RFID-aided Supply ChainsMatthieu Schapranow
 
Industrial Data Space Key Facts
Industrial Data Space Key FactsIndustrial Data Space Key Facts
Industrial Data Space Key FactsBoris Otto
 
TA CR Day - Industrie 40 (Ralf Wehrspohn, Fraunhofer Institute)
TA CR Day - Industrie 40 (Ralf Wehrspohn, Fraunhofer Institute)TA CR Day - Industrie 40 (Ralf Wehrspohn, Fraunhofer Institute)
TA CR Day - Industrie 40 (Ralf Wehrspohn, Fraunhofer Institute)Technologická agentura ČR
 
CyberSecurity in Germany: Research Trends, Industrial Hub and Leading Clusters
CyberSecurity in Germany: Research Trends, Industrial Hub and Leading ClustersCyberSecurity in Germany: Research Trends, Industrial Hub and Leading Clusters
CyberSecurity in Germany: Research Trends, Industrial Hub and Leading ClustersGerd Meier zu Koecker
 
Lange - Industrial Data Space – Digital Sovereignty over Data
Lange - Industrial Data Space – Digital Sovereignty over DataLange - Industrial Data Space – Digital Sovereignty over Data
Lange - Industrial Data Space – Digital Sovereignty over DataVienna Data Science Group
 
A Reference Architecture for Digitalization in the Pharmaceutical Industry
A Reference Architecture for Digitalization in the Pharmaceutical IndustryA Reference Architecture for Digitalization in the Pharmaceutical Industry
A Reference Architecture for Digitalization in the Pharmaceutical IndustryCapgemini
 
Building Reference Architectures for the Industrial IoT
Building Reference Architectures for the Industrial IoTBuilding Reference Architectures for the Industrial IoT
Building Reference Architectures for the Industrial IoTCapgemini
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET Journal
 
Protecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMAProtecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMADomenico Catalano
 
Protecting Personal Data in a IoT Network with UMA
 Protecting Personal Data in a IoT Network with UMA Protecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMAkantarainitiative
 
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...Rio Info
 
Emerging Technology Risk Series - Internet of Things (IoT)
Emerging Technology Risk Series - Internet of Things (IoT)Emerging Technology Risk Series - Internet of Things (IoT)
Emerging Technology Risk Series - Internet of Things (IoT)Eryk Budi Pratama
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDEditor IJCATR
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDEditor IJCATR
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDEditor IJCATR
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDEditor IJCATR
 
Mainflux Labs - References (1).pdf
Mainflux Labs - References (1).pdfMainflux Labs - References (1).pdf
Mainflux Labs - References (1).pdfWlamir Molinari
 

Similaire à License-based Access Control in EPCglobal Networks (20)

A Formal Model for Enabling RFID in Pharmaceutical Supply Chains
A Formal Model for Enabling RFID in Pharmaceutical Supply ChainsA Formal Model for Enabling RFID in Pharmaceutical Supply Chains
A Formal Model for Enabling RFID in Pharmaceutical Supply Chains
 
CoMoSeR: Cost Model for Security-Enhanced RFID-Aided Supply Chains
CoMoSeR: Cost Model for Security-Enhanced RFID-Aided Supply ChainsCoMoSeR: Cost Model for Security-Enhanced RFID-Aided Supply Chains
CoMoSeR: Cost Model for Security-Enhanced RFID-Aided Supply Chains
 
SAPPHIRE NOW 2011: Business Impacts of RFID-aided Supply Chains
SAPPHIRE NOW 2011: Business Impacts of RFID-aided Supply ChainsSAPPHIRE NOW 2011: Business Impacts of RFID-aided Supply Chains
SAPPHIRE NOW 2011: Business Impacts of RFID-aided Supply Chains
 
Industrial Data Space Key Facts
Industrial Data Space Key FactsIndustrial Data Space Key Facts
Industrial Data Space Key Facts
 
TA CR Day - Industrie 40 (Ralf Wehrspohn, Fraunhofer Institute)
TA CR Day - Industrie 40 (Ralf Wehrspohn, Fraunhofer Institute)TA CR Day - Industrie 40 (Ralf Wehrspohn, Fraunhofer Institute)
TA CR Day - Industrie 40 (Ralf Wehrspohn, Fraunhofer Institute)
 
CyberSecurity in Germany: Research Trends, Industrial Hub and Leading Clusters
CyberSecurity in Germany: Research Trends, Industrial Hub and Leading ClustersCyberSecurity in Germany: Research Trends, Industrial Hub and Leading Clusters
CyberSecurity in Germany: Research Trends, Industrial Hub and Leading Clusters
 
Lange - Industrial Data Space – Digital Sovereignty over Data
Lange - Industrial Data Space – Digital Sovereignty over DataLange - Industrial Data Space – Digital Sovereignty over Data
Lange - Industrial Data Space – Digital Sovereignty over Data
 
A Reference Architecture for Digitalization in the Pharmaceutical Industry
A Reference Architecture for Digitalization in the Pharmaceutical IndustryA Reference Architecture for Digitalization in the Pharmaceutical Industry
A Reference Architecture for Digitalization in the Pharmaceutical Industry
 
Building Reference Architectures for the Industrial IoT
Building Reference Architectures for the Industrial IoTBuilding Reference Architectures for the Industrial IoT
Building Reference Architectures for the Industrial IoT
 
ICT Resilience in EU
ICT Resilience in EUICT Resilience in EU
ICT Resilience in EU
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
 
Protecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMAProtecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMA
 
Protecting Personal Data in a IoT Network with UMA
 Protecting Personal Data in a IoT Network with UMA Protecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMA
 
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...
RioInfo 2010: Seminário de Tecnologia - Mesa 1 - Integração e Convergência Ma...
 
Emerging Technology Risk Series - Internet of Things (IoT)
Emerging Technology Risk Series - Internet of Things (IoT)Emerging Technology Risk Series - Internet of Things (IoT)
Emerging Technology Risk Series - Internet of Things (IoT)
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFID
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFID
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFID
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFID
 
Mainflux Labs - References (1).pdf
Mainflux Labs - References (1).pdfMainflux Labs - References (1).pdf
Mainflux Labs - References (1).pdf
 

Plus de Matthieu Schapranow

Patient Journey in Oncology 2025: Molecular Tumour Boards in Practice
Patient Journey in Oncology 2025: Molecular Tumour Boards in PracticePatient Journey in Oncology 2025: Molecular Tumour Boards in Practice
Patient Journey in Oncology 2025: Molecular Tumour Boards in PracticeMatthieu Schapranow
 
How will AI affect the patient journey of the future?
How will AI affect the patient journey of the future?How will AI affect the patient journey of the future?
How will AI affect the patient journey of the future?Matthieu Schapranow
 
AnalyzeGenomes.com: A Federated In-Memory Database Platform for Digital Health
AnalyzeGenomes.com: A Federated In-Memory Database Platform for Digital HealthAnalyzeGenomes.com: A Federated In-Memory Database Platform for Digital Health
AnalyzeGenomes.com: A Federated In-Memory Database Platform for Digital HealthMatthieu Schapranow
 
Algorithmen statt Ärzte: Algorithmen statt Ärzte: Ersetzt Big Data künftig ...
Algorithmen statt Ärzte: Algorithmen statt Ärzte: Ersetzt Big Data künftig ...Algorithmen statt Ärzte: Algorithmen statt Ärzte: Ersetzt Big Data künftig ...
Algorithmen statt Ärzte: Algorithmen statt Ärzte: Ersetzt Big Data künftig ...Matthieu Schapranow
 
A Federated In-Memory Database Computing Platform Enabling Real-Time Analysis...
A Federated In-Memory Database Computing Platform Enabling Real-Time Analysis...A Federated In-Memory Database Computing Platform Enabling Real-Time Analysis...
A Federated In-Memory Database Computing Platform Enabling Real-Time Analysis...Matthieu Schapranow
 
In-Memory Apps for Precision Medicine
In-Memory Apps for Precision MedicineIn-Memory Apps for Precision Medicine
In-Memory Apps for Precision MedicineMatthieu Schapranow
 
ICT Platform to Enable Consortium Work for Systems Medicine of Heart Failure
ICT Platform to Enable Consortium Work for Systems Medicine of Heart FailureICT Platform to Enable Consortium Work for Systems Medicine of Heart Failure
ICT Platform to Enable Consortium Work for Systems Medicine of Heart FailureMatthieu Schapranow
 
Gesundheit geht uns alle an: Smart Data ermöglicht passendere Entscheidungen...
Gesundheit geht uns alle an: Smart Data ermöglicht passendere Entscheidungen...Gesundheit geht uns alle an: Smart Data ermöglicht passendere Entscheidungen...
Gesundheit geht uns alle an: Smart Data ermöglicht passendere Entscheidungen...Matthieu Schapranow
 
Analyze Genomes Services for Precision Medicine
Analyze Genomes Services for Precision MedicineAnalyze Genomes Services for Precision Medicine
Analyze Genomes Services for Precision MedicineMatthieu Schapranow
 
In-Memory Data Management for Systems Medicine
In-Memory Data Management for Systems MedicineIn-Memory Data Management for Systems Medicine
In-Memory Data Management for Systems MedicineMatthieu Schapranow
 
Analyze Genomes: In-memory Apps supporting Precision Medicine
Analyze Genomes: In-memory Apps supporting Precision MedicineAnalyze Genomes: In-memory Apps supporting Precision Medicine
Analyze Genomes: In-memory Apps supporting Precision MedicineMatthieu Schapranow
 
Analyze Genomes: In-memory Apps for Next-generation Life Sciences Research
Analyze Genomes: In-memory Apps for Next-generation Life Sciences ResearchAnalyze Genomes: In-memory Apps for Next-generation Life Sciences Research
Analyze Genomes: In-memory Apps for Next-generation Life Sciences ResearchMatthieu Schapranow
 
Analyze Genomes: A Federated In-memory Database Computing Platform enabling r...
Analyze Genomes: A Federated In-memory Database Computing Platform enabling r...Analyze Genomes: A Federated In-memory Database Computing Platform enabling r...
Analyze Genomes: A Federated In-memory Database Computing Platform enabling r...Matthieu Schapranow
 
Analyze Genomes Services for Precision Medicine
Analyze Genomes Services for Precision MedicineAnalyze Genomes Services for Precision Medicine
Analyze Genomes Services for Precision MedicineMatthieu Schapranow
 
The Driver of the Healthcare System in the 21st Century: Real-world Applicati...
The Driver of the Healthcare System in the 21st Century: Real-world Applicati...The Driver of the Healthcare System in the 21st Century: Real-world Applicati...
The Driver of the Healthcare System in the 21st Century: Real-world Applicati...Matthieu Schapranow
 
Festival of Genomics 2016 London: Mining and Processing of Unstructured Medic...
Festival of Genomics 2016 London: Mining and Processing of Unstructured Medic...Festival of Genomics 2016 London: Mining and Processing of Unstructured Medic...
Festival of Genomics 2016 London: Mining and Processing of Unstructured Medic...Matthieu Schapranow
 
Festival of Genomics 2016 London: Analyze Genomes: Modeling and Executing Gen...
Festival of Genomics 2016 London: Analyze Genomes: Modeling and Executing Gen...Festival of Genomics 2016 London: Analyze Genomes: Modeling and Executing Gen...
Festival of Genomics 2016 London: Analyze Genomes: Modeling and Executing Gen...Matthieu Schapranow
 
Festival of Genomics 2016 London: Analyze Genomes: A Federated In-Memory Comp...
Festival of Genomics 2016 London: Analyze Genomes: A Federated In-Memory Comp...Festival of Genomics 2016 London: Analyze Genomes: A Federated In-Memory Comp...
Festival of Genomics 2016 London: Analyze Genomes: A Federated In-Memory Comp...Matthieu Schapranow
 

Plus de Matthieu Schapranow (20)

Patient Journey in Oncology 2025: Molecular Tumour Boards in Practice
Patient Journey in Oncology 2025: Molecular Tumour Boards in PracticePatient Journey in Oncology 2025: Molecular Tumour Boards in Practice
Patient Journey in Oncology 2025: Molecular Tumour Boards in Practice
 
How will AI affect the patient journey of the future?
How will AI affect the patient journey of the future?How will AI affect the patient journey of the future?
How will AI affect the patient journey of the future?
 
AI in Oncology
AI in OncologyAI in Oncology
AI in Oncology
 
AnalyzeGenomes.com: A Federated In-Memory Database Platform for Digital Health
AnalyzeGenomes.com: A Federated In-Memory Database Platform for Digital HealthAnalyzeGenomes.com: A Federated In-Memory Database Platform for Digital Health
AnalyzeGenomes.com: A Federated In-Memory Database Platform for Digital Health
 
Algorithmen statt Ärzte: Algorithmen statt Ärzte: Ersetzt Big Data künftig ...
Algorithmen statt Ärzte: Algorithmen statt Ärzte: Ersetzt Big Data künftig ...Algorithmen statt Ärzte: Algorithmen statt Ärzte: Ersetzt Big Data künftig ...
Algorithmen statt Ärzte: Algorithmen statt Ärzte: Ersetzt Big Data künftig ...
 
A Federated In-Memory Database Computing Platform Enabling Real-Time Analysis...
A Federated In-Memory Database Computing Platform Enabling Real-Time Analysis...A Federated In-Memory Database Computing Platform Enabling Real-Time Analysis...
A Federated In-Memory Database Computing Platform Enabling Real-Time Analysis...
 
In-Memory Apps for Precision Medicine
In-Memory Apps for Precision MedicineIn-Memory Apps for Precision Medicine
In-Memory Apps for Precision Medicine
 
"When time matters..."
"When time matters...""When time matters..."
"When time matters..."
 
ICT Platform to Enable Consortium Work for Systems Medicine of Heart Failure
ICT Platform to Enable Consortium Work for Systems Medicine of Heart FailureICT Platform to Enable Consortium Work for Systems Medicine of Heart Failure
ICT Platform to Enable Consortium Work for Systems Medicine of Heart Failure
 
Gesundheit geht uns alle an: Smart Data ermöglicht passendere Entscheidungen...
Gesundheit geht uns alle an: Smart Data ermöglicht passendere Entscheidungen...Gesundheit geht uns alle an: Smart Data ermöglicht passendere Entscheidungen...
Gesundheit geht uns alle an: Smart Data ermöglicht passendere Entscheidungen...
 
Analyze Genomes Services for Precision Medicine
Analyze Genomes Services for Precision MedicineAnalyze Genomes Services for Precision Medicine
Analyze Genomes Services for Precision Medicine
 
In-Memory Data Management for Systems Medicine
In-Memory Data Management for Systems MedicineIn-Memory Data Management for Systems Medicine
In-Memory Data Management for Systems Medicine
 
Analyze Genomes: In-memory Apps supporting Precision Medicine
Analyze Genomes: In-memory Apps supporting Precision MedicineAnalyze Genomes: In-memory Apps supporting Precision Medicine
Analyze Genomes: In-memory Apps supporting Precision Medicine
 
Analyze Genomes: In-memory Apps for Next-generation Life Sciences Research
Analyze Genomes: In-memory Apps for Next-generation Life Sciences ResearchAnalyze Genomes: In-memory Apps for Next-generation Life Sciences Research
Analyze Genomes: In-memory Apps for Next-generation Life Sciences Research
 
Analyze Genomes: A Federated In-memory Database Computing Platform enabling r...
Analyze Genomes: A Federated In-memory Database Computing Platform enabling r...Analyze Genomes: A Federated In-memory Database Computing Platform enabling r...
Analyze Genomes: A Federated In-memory Database Computing Platform enabling r...
 
Analyze Genomes Services for Precision Medicine
Analyze Genomes Services for Precision MedicineAnalyze Genomes Services for Precision Medicine
Analyze Genomes Services for Precision Medicine
 
The Driver of the Healthcare System in the 21st Century: Real-world Applicati...
The Driver of the Healthcare System in the 21st Century: Real-world Applicati...The Driver of the Healthcare System in the 21st Century: Real-world Applicati...
The Driver of the Healthcare System in the 21st Century: Real-world Applicati...
 
Festival of Genomics 2016 London: Mining and Processing of Unstructured Medic...
Festival of Genomics 2016 London: Mining and Processing of Unstructured Medic...Festival of Genomics 2016 London: Mining and Processing of Unstructured Medic...
Festival of Genomics 2016 London: Mining and Processing of Unstructured Medic...
 
Festival of Genomics 2016 London: Analyze Genomes: Modeling and Executing Gen...
Festival of Genomics 2016 London: Analyze Genomes: Modeling and Executing Gen...Festival of Genomics 2016 London: Analyze Genomes: Modeling and Executing Gen...
Festival of Genomics 2016 London: Analyze Genomes: Modeling and Executing Gen...
 
Festival of Genomics 2016 London: Analyze Genomes: A Federated In-Memory Comp...
Festival of Genomics 2016 London: Analyze Genomes: A Federated In-Memory Comp...Festival of Genomics 2016 London: Analyze Genomes: A Federated In-Memory Comp...
Festival of Genomics 2016 London: Analyze Genomes: A Federated In-Memory Comp...
 

Dernier

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Dernier (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

License-based Access Control in EPCglobal Networks

  • 1. License-based Access Control in EPCglobal Networks RFID Systech 2011 May 17-18, 2011 – Dresden, Germany Matthieu-P. SchapranowHasso Plattner Institute
  • 2. Agenda European Pharmaceutical Industry License-based Access Control Related Publications Real-time Security Extensions for RFID-aided Supply Chains, Schapranow, Feb 23, 2011 2
  • 3. European Pharmaceutical IndustryMotivation Increasing counterfeit rates in pharmaceutical industry 34 million fake drugs in only two months in Europe [1] Pharmaceuticals: 3rd place / 10% of all intercepted articles [2] Current literature proposes Radio Frequency Identification (RFID)technology or data matrix for anti-counterfeiting [6] Problem: Low-cost tags do not provide security mechanisms But: RFID enables fine-grained tracking and tracing of each item “Minimize the used of personal data” [5] “Privacy by design” [3] Real-time Security Extensions for RFID-aided Supply Chains, Schapranow, Feb 23, 2011 3
  • 4. European Pharmaceutical IndustryManufacturing Real-time Security Extensions for RFID-aided Supply Chains, Schapranow, Feb 23, 2011 4
  • 5. European Pharmaceutical IndustryCounterfeits Real-time Security Extensions for RFID-aided Supply Chains, Schapranow, Feb 23, 2011 5
  • 6. European Pharmaceutical IndustryComponents for Anti-counterfeiting Real-time Security Extensions for RFID-aided Supply Chains, Schapranow, Feb 23, 2011 6 Anti-counterfeiting service provider validates authenticity of concrete item for customers, e.g. in a pharmacy Discovery Service supports to identify appropriate Electronic Product Code Information Services (EPCIS) repository EPCIS repository contains all event data for handled products of a certain supply chain partner
  • 7. European Pharmaceutical IndustryRoles Approx. 30 billion pharmaceuticalsper year [13] Main Roles [21] Manufacturers: ≈2.2k Wholesalers: ≈50k Retailers: ≈140k Other Roles Logistics Providers End Consumers Real-time Security Extensions for RFID-aided Supply Chains, Schapranow, Feb 23, 2011 7
  • 8. License-based Access ControlSecurity Security := {confidentiality, integrity, availability} [4] Confidentiality := prevent unauthorized reading of event data Integrity := protect event data from being manipulated Availability := provide access only to authorized parties Extension of current EPCglobal networks to guarantee Confidentiality of event data, since it can be abused to derive business secrets, Integrity of business data, i.e. a foundation for automatic anti-counterfeiting, and Fine-grained access for certain business partners. Real-time Security Extensions for RFID-aided Supply Chains, Schapranow, Feb 23, 2011 8
  • 9. License-based Access ControlActors Real-time Security Extensions for RFID-aided Supply Chains, Schapranow, Feb 23, 2011 9 A := queries details for a certain EPC ACC := checks licenses, decrypts content, and applies access rights EPCIS := stores encrypted event data to serve it to querying parties B := captures EPC event data and stores it in the local EPCIS
  • 10. License-based Access ControlBusiness Process Event owner Encrypts all event data, with individual master key per attribute (encrypter.py) Stores data in local EPCIS event repository Creates unique license per client and encrypt it with owners private key (license-encrypter.py) License contains a unique ID and decryption keys for granted attributes ACC is responsible for Decryption of the license with the help of its public key, i.e. it can decrypted any license(decrypter.py) Enforcing access rights on per-attribute level and EPC lists Real-time Security Extensions for RFID-aided Supply Chains, Schapranow, Feb 23, 2011 10
  • 11. License-based Access ControlPython Prototype Real-time Security Extensions for RFID-aided Supply Chains, Schapranow, Feb 23, 2011 11
  • 12. License-based Access ControlSecurity Evaluation Real-time Security Extensions for RFID-aided Supply Chains, Schapranow, Feb 23, 2011 12
  • 13. Related Publications [1] European Commission: Customs: Millions of illegal Medicines stopped by "MEDI-FAKE" action. IP/08/1980, 2008 [2] European Commission Taxation and Customs Union: Statistics of Customs Detentions Recorded at the External Borders of the EU, EU-wide statistics for 2009, 2010 [3] European Commission: Commission Recommendation on the Implementation of Privacy and Data Protection Principles in Applications supported by Radio-Frequency Identification, Brussel, 2009 [4] Federal Office for Information Security: Standard 100-1 Information Security Management Systems (ISMS) V. 1.5, 2008 [5] Federal Data Protection Act §3a: “Datenvermeidung und Datensparsamkeit”, 2009 [6] European Commission: Public Consultation in Preparation of a Legal Proposal to Combat Counterfeit Medicines for Human Use -- Key Ideas for better Protection of Patients against the Risk of Counterfeit Medicines, Brussel, 2008 [7] Matthieu-P. Schapranow, Alexander Zeier, Felix Leupold, Tobias Schubotz: Securing EPCglobal Object Name Service -- Privacy Enhancements for Anti-counterfeiting, 2nd International Conference on Intelligent Systems, Modeling and Simulation, 2011 [8] Matthieu-P. Schapranow, Alexander Zeier, Hasso Plattner: A Formal Model for Enabling RFID in Pharmaceutical Supply Chains, 44th Hawaii International Conference on System Sciences, 2011 [9] Matthieu-P. Schapranow, Alexander Zeier, Hasso Plattner: A Dynamic Mutual RFID Authentication Model Preventing Unauthorized Third Party Access, The 4th International Conference on Network and System Security, 2010 [10] Matthieu-P. Schapranow, Mike Nagora, Alexander Zeier: CoMoSeR: Cost Model for Security-Enhanced RFID-Aided Supply Chains, 18th International Conference on Software, Telecommunication and Computer Networks, 2010 Real-time Security Extensions for RFID-aided Supply Chains, Schapranow, Feb 23, 2011 13
  • 14. Related Publications [11] Jürgen Müller, Martin Lorenz, Felix Geller, Matthieu-P. Schapranow, Thomas Kowark, Alexander Zeier: Assessment of Communication Protocols in the EPC Network: Replacing Textual SOAP and XML with Binary Google Protocol Buffers Encoding, 17th IEEE International Conference on Industrial Engineering and Engineering Management, Xiamen, China, 2010 [12] Matthieu-P. Schapranow, Jens Krüger, Vadym Borovskiy, Alexander Zeier, Hasso Plattner: Data Loading & Caching Strategies in Service-Oriented Enterprise Applications, Proceedings of IEEE Congress on Services (SERVICES 2009), Los Angeles, CA, USA, 2009 [13] Jürgen Müller, Matthieu-P. Schapranow, Marco Helmich, Sebastian Enderlein, Alexander Zeier: RFID Middleware as a Service - Enabling Small and Medium-sized Enterprises to Participate in the EPC Network, 16th International Conference on Industrial Engineering and Engineering Management (IE&EM), Beijing, China, 2009 [14] Jürgen Müller, Matthias Uflacker, Jens Krüger, Matthieu-P. Schapranow, Alexander Zeier: noFilisCrossTalk 2.0 as Device Management Solution, Experiences while Integrating RFID Hardware into SAP Auto-ID Infrastructure, 16th International Conference on Industrial Engineering and Engineering Management (IE&EM), Beijing, China, 2009 [15] Matthieu-P. Schapranow, Jürgen Müller, Sebastian Enderlein, Marco Helmich, Alexander Zeier: Low-Cost Mutual RFID Authentication Model Using Predefined Password Lists, 16th International Conference on Industrial Engineering and Engineering Management, Beijing, China, 2009 [16] Matthieu-P. Schapranow, Martin Grund, Jens Krüger, Jan Schaffner, Anja Bog: Combining Advantages - Unified Data Stores in Global Enterprises, IEEE Symposium on Advanced Management of Information for Globalized Enterprises, Tianjin, China, 2008 [17] Jürgen Müller, Matthieu-P. Schapranow, Conrad Pöpke, Michaela Urbat, Alexander Zeier, Hasso Plattner: Best Practices for Rigorous Evaluation of RFID Software Components, Proceedings of the 6th European Workshop on RFID Systems and Technologies, Ciudad Real, Spain, 2010 Real-time Security Extensions for RFID-aided Supply Chains, Schapranow, Feb 23, 2011 14
  • 15. Related Publications [18] Matthieu-P. Schapranow, Jürgen Müller, Alexander Zeier, Hasso Plattner: Sustainable Use of RFID Tags in the Pharmaceutical Industry, European Workshop on Smart Objects: Systems, Technologies and Applications, Ciudad Real, Spain, 2010 [19] Matthieu-P. Schapranow, Jürgen Müller, Alexander Zeier, Hasso Plattner: RFID Event Data Processing -- An Architecture for Storing and Searching, Proceedings of the 4th International Workshop on RFID Technology - Concepts, Applications, Challenges, Funchal, Madeira, Portugal, 2010 [20] Matthieu-P. Schapranow, Jürgen Müller, Alexander Zeier, Hasso Plattner: Security Aspects in Vulnerable RFID-Aided Supply Chains, Proceedings of the 5th European Workshop on RFID Systems and Technologies, Bremen, 2009 [21] Jürgen Müller, Martin Faust, David Schwalb, Matthieu-P. Schapranow, Alexander Zeier, Hasso Plattner: A Software as a Service RFID Middleware for Small and Medium-sized Enterprises, Proceedings of the 5th European Workshop on RFID Systems and Technologies, Bremen, Germany, 2009 Real-time Security Extensions for RFID-aided Supply Chains, Schapranow, Feb 23, 2011 15
  • 16. Thank you for your interest!Keep in contact with us. Responsible: Deputy Prof. of Prof. Hasso PlattnerDr. Alexander Zeierzeier@hpi.uni-potsdam.de Matthieu-P. Schapranow, M.Sc. matthieu.schapranow@hpi.uni-potsdam.de Hasso Plattner InstituteEnterprise Platform & Integration ConceptsMatthieu-P. SchapranowAugust-Bebel-Str. 8814482 Potsdam, Germany RFIDSystech10, Sustainable Use of RFID Tags in the Pharma Industry, Schapranow, June 15-16, 2010 16
  • 17. BACKUP Real-time Security Extensions for RFID-aided Supply Chains, Schapranow, Feb 23, 2011 17
  • 18. European Pharmaceutical IndustryData Sizing Assumptions ≈15 billion pharmaceuticals on prescription per year [21] ≥11 relevant events per unique item 1 x manufacturer (create + ship) 2 x wholesaler (receive + 2 x observe + ship) 1 x retailer (receive + sell) 1 x end consumer (check) Assuming 360 days production results in ≈5,300 events/s within the European pharmaceutical supply chain Individual events are very small, i.e. avg. 182 Byte[19] Real-time Security Extensions for RFID-aided Supply Chains, Schapranow, Feb 23, 2011 18

Notes de l'éditeur

  1. BSI = Federal Office for Information SecurityBDSG = Federal Data Protection ActPrivacy, data security, etc. are not defined for RFID technology so far!
  2. This is how, it should look like
  3. Pictures taken in india, pharmaceutical counterfeits produced in dirt places (right viagra pills)
  4. 192k parties => much data to keep and observeAufbau der pharma supply chain in europe
  5. Unsere motivation für den license-based access control prototypen
  6. EPCglobaldiefiniert das bildohne ACC und event owner. Hierkommtunsere contribution1: Anfrage an EPCIS nachbestimmten events2: antwortalsverschlüsselterückgabemenge R*3: einmalignötig: client license anfordern, begrenztgültig4. Verschlüsselte client license L*5. L* an lokalinstallierte ACC übergeben6. ACC entschlüsselt L* und erhält L, überprüft L7. Prüfenob A zur license passt (bezug auf Public Key Infrastructure nehmen)8. Resultset R* wirdmitHilfe den in L enthaltenenSchlüsselnentschlüsselt.9. ACC filtertspalten und zeilenausdemresultset, die nichtvom client eingesehenwerdendürfen10: rückgabe der entschlüsselten und gefilterternergebnisemenge.
  7. EPCIS= Electronic Product Code Information System (stores events)ACC=Access Control ClientEPC list: blacklist to block certain EPC entries completely (rows)
  8. Bild von obennachuntenerläutern, die tabellenenthalten die Attributwertpaare der Resultssets / EPCIS respositories
  9. Verweis auf papier