Security Requirements for RFID Computing Systems.
Xiaolan Joy ZhangBrian KingPublished in: Int. J. Netw. Secur. (2008)
Keyphrases
- computing systems
- security requirements
- smart card
- information security
- security analysis
- computer systems
- rfid tags
- security problems
- access control
- security mechanisms
- software architecture
- low cost
- security policies
- security properties
- data collection
- autonomic computing
- secure electronic
- software developers
- artificial intelligence
- development lifecycle
- database
- mobile phone
- e government
- sensor networks
- decision making
- information systems