SlideShare uma empresa Scribd logo
1 de 13
Baixar para ler offline
Enforcing RFID Data Visibility Restrictions
      using XACML security policies
   Miguel Pardal, Mark Harrison, Sanjay Sarma, José Alves Marques

Técnico Lisboa, University of Cambridge, Massachusetts Institute of Technology




      Miguel Pardal, Enforcing RFID Data Visibility using XACML security policies   Slide 1
Traceability systems assessment framework


                                                  http://trakchain.net




    Miguel Pardal, Enforcing RFID Data Visibility using XACML security policies   Slide 2
Each individual item takes a unique path...




Miguel Pardal, Enforcing RFID Data Visibility using XACML security policies   Slide 3
Traceability data security




Miguel Pardal, Enforcing RFID Data Visibility using XACML security policies   Slide 4
SCAz – Supply Chain Authorization Language
      • Classical authorization mechanisms
          - EAC – Enumerated Access Control
             • Access control lists
          - CCT – Chain of Communication Tokens




   Miguel Pardal, Enforcing RFID Data Visibility using XACML security policies   Slide 5
Externalized security

• Authentication
 - SAML
• Message level (cryptographic) protection
 - TLS
• Authorization
 - XACML



  Miguel Pardal, Enforcing RFID Data Visibility using XACML security policies   Slide 6
eXtensible Access Control Markup Language




 Miguel Pardal, Enforcing RFID Data Visibility using XACML security policies   Slide 7
XACML request processing




Miguel Pardal, Enforcing RFID Data Visibility using XACML security policies   Slide 8
Performance assessment tool




Miguel Pardal, Enforcing RFID Data Visibility using XACML security policies   Slide 9
EAC processing time breakdown for request evaluation




Miguel Pardal, Enforcing RFID Data Visibility using XACML security policies   Slide 10
EAC and CCT evaluation time with increasing item numbers




 Miguel Pardal, Enforcing RFID Data Visibility using XACML security policies   Slide 11
Contributions

  • Data sharing policies
  • XACML translation
  • Correctness check
  • Performance assessment
  • Future work
       - Pharma pedigree case study
       - Combine approaches in expressive language
       - “Automatic” authorization
           • minimize admin burden for traceability data sharing




Miguel Pardal, Enforcing RFID Data Visibility using XACML security policies   Slide 12
Merci!                            Visit http://trakchain.net




 Miguel Pardal, Enforcing RFID Data Visibility using XACML security policies   Slide 13

Mais conteúdo relacionado

Destaque

Архитектура, строительство в BergHaus
Архитектура, строительство в BergHaus Архитектура, строительство в BergHaus
Архитектура, строительство в BergHaus
Татьяна Кравченко
 
Архитектура и строительство в BergНaus Construction
Архитектура и  строительство в BergНaus ConstructionАрхитектура и  строительство в BergНaus Construction
Архитектура и строительство в BergНaus Construction
Татьяна Кравченко
 
XACML - Fight For Your Love
XACML - Fight For Your LoveXACML - Fight For Your Love
XACML - Fight For Your Love
David Brossard
 
Performance Assessment of XACML Authorizations for Supply Chain Traceability ...
Performance Assessment of XACML Authorizations for Supply Chain Traceability ...Performance Assessment of XACML Authorizations for Supply Chain Traceability ...
Performance Assessment of XACML Authorizations for Supply Chain Traceability ...
Miguel Pardal
 
A caminho da internet of things
A caminho da internet of thingsA caminho da internet of things
A caminho da internet of things
Miguel Pardal
 
Expressive RFID data access policies for the Pharmaceuticals supply chain
Expressive RFID data access policies for the Pharmaceuticals supply chainExpressive RFID data access policies for the Pharmaceuticals supply chain
Expressive RFID data access policies for the Pharmaceuticals supply chain
Miguel Pardal
 
Towards the Internet of Things: An introduction to RFID
Towards the Internet of Things: An introduction to RFIDTowards the Internet of Things: An introduction to RFID
Towards the Internet of Things: An introduction to RFID
Miguel Pardal
 

Destaque (16)

Архитектура, строительство в BergHaus
Архитектура, строительство в BergHaus Архитектура, строительство в BergHaus
Архитектура, строительство в BergHaus
 
Архитектура и строительство в BergНaus Construction
Архитектура и  строительство в BergНaus ConstructionАрхитектура и  строительство в BergНaus Construction
Архитектура и строительство в BergНaus Construction
 
Hair Removal Consultation
Hair Removal Consultation Hair Removal Consultation
Hair Removal Consultation
 
CIS13: Externalized Authorization from the Developer’s Perspective
CIS13: Externalized Authorization from the Developer’s PerspectiveCIS13: Externalized Authorization from the Developer’s Perspective
CIS13: Externalized Authorization from the Developer’s Perspective
 
Xacml
XacmlXacml
Xacml
 
XACML 3.0 (Partial) Concept Map
XACML 3.0 (Partial) Concept MapXACML 3.0 (Partial) Concept Map
XACML 3.0 (Partial) Concept Map
 
XACML - Fight For Your Love
XACML - Fight For Your LoveXACML - Fight For Your Love
XACML - Fight For Your Love
 
OASIS Workshop: Identity, Privacy, and Data Protection in the Cloud – What is...
OASIS Workshop: Identity, Privacy, and Data Protection in the Cloud – What is...OASIS Workshop: Identity, Privacy, and Data Protection in the Cloud – What is...
OASIS Workshop: Identity, Privacy, and Data Protection in the Cloud – What is...
 
Eclipse workshop presentation (March 2016)
Eclipse workshop presentation (March 2016)Eclipse workshop presentation (March 2016)
Eclipse workshop presentation (March 2016)
 
Finance and Audit Predictive Analytics
Finance and Audit Predictive AnalyticsFinance and Audit Predictive Analytics
Finance and Audit Predictive Analytics
 
Thesis for beginners 2015-10
Thesis for beginners 2015-10Thesis for beginners 2015-10
Thesis for beginners 2015-10
 
Performance Assessment of XACML Authorizations for Supply Chain Traceability ...
Performance Assessment of XACML Authorizations for Supply Chain Traceability ...Performance Assessment of XACML Authorizations for Supply Chain Traceability ...
Performance Assessment of XACML Authorizations for Supply Chain Traceability ...
 
A caminho da internet of things
A caminho da internet of thingsA caminho da internet of things
A caminho da internet of things
 
BEST Lisboa 2013 - The Internet of Things class
BEST Lisboa 2013 - The Internet of Things classBEST Lisboa 2013 - The Internet of Things class
BEST Lisboa 2013 - The Internet of Things class
 
Expressive RFID data access policies for the Pharmaceuticals supply chain
Expressive RFID data access policies for the Pharmaceuticals supply chainExpressive RFID data access policies for the Pharmaceuticals supply chain
Expressive RFID data access policies for the Pharmaceuticals supply chain
 
Towards the Internet of Things: An introduction to RFID
Towards the Internet of Things: An introduction to RFIDTowards the Internet of Things: An introduction to RFID
Towards the Internet of Things: An introduction to RFID
 

Mais de Miguel Pardal

Vulnerability-tolerant Transport Layer Security
Vulnerability-tolerant Transport Layer SecurityVulnerability-tolerant Transport Layer Security
Vulnerability-tolerant Transport Layer Security
Miguel Pardal
 
An introduction to RFID
An introduction to RFIDAn introduction to RFID
An introduction to RFID
Miguel Pardal
 
Interoperabilidade de cartões inteligentes
Interoperabilidade de cartões inteligentesInteroperabilidade de cartões inteligentes
Interoperabilidade de cartões inteligentes
Miguel Pardal
 
Utilização de políticas de serviços na plataforma Microsoft
Utilização de políticas de serviços na plataforma MicrosoftUtilização de políticas de serviços na plataforma Microsoft
Utilização de políticas de serviços na plataforma Microsoft
Miguel Pardal
 
Servidor de Informação Pessoal
Servidor de Informação PessoalServidor de Informação Pessoal
Servidor de Informação Pessoal
Miguel Pardal
 

Mais de Miguel Pardal (20)

Master Beginners Workshop - Feb 2023
Master Beginners Workshop - Feb 2023Master Beginners Workshop - Feb 2023
Master Beginners Workshop - Feb 2023
 
Master Beginners Workshop - September 2019
Master Beginners Workshop - September 2019Master Beginners Workshop - September 2019
Master Beginners Workshop - September 2019
 
SafeCloud Secure Communication solutions (WP1 overview)
SafeCloud Secure Communication solutions (WP1 overview)SafeCloud Secure Communication solutions (WP1 overview)
SafeCloud Secure Communication solutions (WP1 overview)
 
Master Beginners' Workshop September 2018
Master Beginners' Workshop September 2018Master Beginners' Workshop September 2018
Master Beginners' Workshop September 2018
 
IoT Middleware for Precision Agriculture: workforce monitoring in olive fields
IoT Middleware for Precision Agriculture: workforce monitoring in olive fieldsIoT Middleware for Precision Agriculture: workforce monitoring in olive fields
IoT Middleware for Precision Agriculture: workforce monitoring in olive fields
 
Rastreabilidade na Internet das (muitas) Coisas
Rastreabilidade na Internet das (muitas) CoisasRastreabilidade na Internet das (muitas) Coisas
Rastreabilidade na Internet das (muitas) Coisas
 
Vulnerability-tolerant Transport Layer Security
Vulnerability-tolerant Transport Layer SecurityVulnerability-tolerant Transport Layer Security
Vulnerability-tolerant Transport Layer Security
 
Master Beginners
Master BeginnersMaster Beginners
Master Beginners
 
Arranque Seguro de Redes 6LoWPAN para prevenir Ataques Vampiro na Internet da...
Arranque Seguro de Redes 6LoWPAN para prevenir Ataques Vampiro na Internet da...Arranque Seguro de Redes 6LoWPAN para prevenir Ataques Vampiro na Internet da...
Arranque Seguro de Redes 6LoWPAN para prevenir Ataques Vampiro na Internet da...
 
Precision Agriculture with Sensors and Technologies from the Internet of Things
Precision Agriculture with Sensors and Technologies from the Internet of ThingsPrecision Agriculture with Sensors and Technologies from the Internet of Things
Precision Agriculture with Sensors and Technologies from the Internet of Things
 
Smart Places INForum16 presentation
Smart Places INForum16 presentationSmart Places INForum16 presentation
Smart Places INForum16 presentation
 
LaTeX workshop (NEB)
LaTeX workshop (NEB)LaTeX workshop (NEB)
LaTeX workshop (NEB)
 
LaTeX workshop (JEQ)
LaTeX workshop (JEQ)LaTeX workshop (JEQ)
LaTeX workshop (JEQ)
 
Thesis for beginners
Thesis for beginnersThesis for beginners
Thesis for beginners
 
Scalable and secure RFID data discovery
Scalable and secure RFID data discoveryScalable and secure RFID data discovery
Scalable and secure RFID data discovery
 
Breve introdução à investigação
Breve introdução à investigaçãoBreve introdução à investigação
Breve introdução à investigação
 
An introduction to RFID
An introduction to RFIDAn introduction to RFID
An introduction to RFID
 
Interoperabilidade de cartões inteligentes
Interoperabilidade de cartões inteligentesInteroperabilidade de cartões inteligentes
Interoperabilidade de cartões inteligentes
 
Utilização de políticas de serviços na plataforma Microsoft
Utilização de políticas de serviços na plataforma MicrosoftUtilização de políticas de serviços na plataforma Microsoft
Utilização de políticas de serviços na plataforma Microsoft
 
Servidor de Informação Pessoal
Servidor de Informação PessoalServidor de Informação Pessoal
Servidor de Informação Pessoal
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

Enforcing RFID Data Visibility Restrictions using XACML security policies

  • 1. Enforcing RFID Data Visibility Restrictions using XACML security policies Miguel Pardal, Mark Harrison, Sanjay Sarma, José Alves Marques Técnico Lisboa, University of Cambridge, Massachusetts Institute of Technology Miguel Pardal, Enforcing RFID Data Visibility using XACML security policies Slide 1
  • 2. Traceability systems assessment framework http://trakchain.net Miguel Pardal, Enforcing RFID Data Visibility using XACML security policies Slide 2
  • 3. Each individual item takes a unique path... Miguel Pardal, Enforcing RFID Data Visibility using XACML security policies Slide 3
  • 4. Traceability data security Miguel Pardal, Enforcing RFID Data Visibility using XACML security policies Slide 4
  • 5. SCAz – Supply Chain Authorization Language • Classical authorization mechanisms - EAC – Enumerated Access Control • Access control lists - CCT – Chain of Communication Tokens Miguel Pardal, Enforcing RFID Data Visibility using XACML security policies Slide 5
  • 6. Externalized security • Authentication - SAML • Message level (cryptographic) protection - TLS • Authorization - XACML Miguel Pardal, Enforcing RFID Data Visibility using XACML security policies Slide 6
  • 7. eXtensible Access Control Markup Language Miguel Pardal, Enforcing RFID Data Visibility using XACML security policies Slide 7
  • 8. XACML request processing Miguel Pardal, Enforcing RFID Data Visibility using XACML security policies Slide 8
  • 9. Performance assessment tool Miguel Pardal, Enforcing RFID Data Visibility using XACML security policies Slide 9
  • 10. EAC processing time breakdown for request evaluation Miguel Pardal, Enforcing RFID Data Visibility using XACML security policies Slide 10
  • 11. EAC and CCT evaluation time with increasing item numbers Miguel Pardal, Enforcing RFID Data Visibility using XACML security policies Slide 11
  • 12. Contributions • Data sharing policies • XACML translation • Correctness check • Performance assessment • Future work - Pharma pedigree case study - Combine approaches in expressive language - “Automatic” authorization • minimize admin burden for traceability data sharing Miguel Pardal, Enforcing RFID Data Visibility using XACML security policies Slide 12
  • 13. Merci! Visit http://trakchain.net Miguel Pardal, Enforcing RFID Data Visibility using XACML security policies Slide 13