Skip to main content

Qualitative and Quantitative Discussion

  • Chapter
  • First Online:
Real-time Security Extensions for EPCglobal Networks

Part of the book series: In-Memory Data Management Research ((IMDM))

  • 627 Accesses

Abstract

In the preceding chapters, I have presented my contributions for device-level and business-level security extensions for EPCglobal networks.The following section provides a qualitative and a quantitative discussion of my research results. From the systems engineering’s perspective, it builds the basis for evaluating the applicability of my security extensions in context of EPCglobal networks

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. M. Feldhofer, S. Dominikus, J. Wolkerstorfer, Strong authentication for RFID systems using the AES algorithm, in Proceedings of the 6th International Workshop on Cryptographic Hardware and Embedded Systems (2004), pp. 357–370

    Google Scholar 

  2. Global standards 1: EPCIS standard 1.0.1 (2007), http://www.gs1.org/gsmp/kc/epcglobal/epcis/epcis_1_0_1-standard-20070921.pdf. Accessed 8 Mar 2012

  3. M.-P. Schapranow, M. Nagora, A. Zeier, CoMoSeR: cost model for security-enhanced RFID-aided supply chains, in Proceedings of the 18th International Conference on Software Telecommunications and Computer Networks, IEEE, 2010

    Google Scholar 

  4. Global standards 1: Preise fĂĽr die Nutzung des Leistungspaketes GS1 complete (2011), http://www.gs1-germany.de/service/gs1_complete/preisliste/index_ger.html. Accessed 8 Mar 2012

  5. M.-P. Schapranow, J. MĂĽller, A. Zeier, H. Plattner, RFID event data processing: an architecture for storing and searching, in Proceedings of the 4th International Workshop on RFID Technology: Concepts, Applications, Challenges, 2010

    Google Scholar 

  6. J.F. Kurose, K.W. Ross, Computer Networking: A Top-Down Approach, 5th edn. (Addison-Wesley, Boston, 2009)

    Google Scholar 

  7. Amazon web services LLC, Pricing (2010), http://aws.amazon.com/ec2/pricing/. Accessed 8 Mar 2012

  8. J. MĂĽller et al., A simulation of the pharmaceutical supply chain to provide realistic test data, in Proceedings of 1st International Conference on Advances in System Simulation, IEEE, 2009

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Matthieu-P. Schapranow .

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Schapranow, MP. (2014). Qualitative and Quantitative Discussion. In: Real-time Security Extensions for EPCglobal Networks. In-Memory Data Management Research. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36343-6_6

Download citation

Publish with us

Policies and ethics