Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Entire DC Network

Location Constraints In Digital Rights Management, Adam Muhlbauer, Reihaneh Safavi-Naini, Farzad Salim, Nicholas Paul Sheppard, Martin Jan Surminen Apr 2008

Location Constraints In Digital Rights Management, Adam Muhlbauer, Reihaneh Safavi-Naini, Farzad Salim, Nicholas Paul Sheppard, Martin Jan Surminen

Faculty of Informatics - Papers (Archive)

Digital rights management allows information owners to control the use and dissemination of electronic documents via a machine-readable licence. This paper describes the design and implementation of a system for creating and enforcing licences containing location constraints that can be used to restrict access to sensitive documents to a defined area. Documents can be loaded onto a portable device and used in the approved areas, but cannot be used if the device moves to another area. Our contribution includes a taxonomy for access control in the presence of requests to perform non-instantaneous controlled actions.


From Automatic Identification And Data Capture (Aidc) To “Smart Business Process”: Preparing For A Pilot Integrating Rfid, S. F. Wamba, E. Lefebvre, Y. Bendavid, L.. A. Lefebvre Jan 2008

From Automatic Identification And Data Capture (Aidc) To “Smart Business Process”: Preparing For A Pilot Integrating Rfid, S. F. Wamba, E. Lefebvre, Y. Bendavid, L.. A. Lefebvre

Faculty of Informatics - Papers (Archive)

This paper examines the underlying logic behind the rules configured in a RFID middleware to support “smart business processes” in one retail supply chain. Through a detailed investigation of the underlying business processes, we will demonstrate how businesses rules can be defined, configured and refined in a RFID middleware. The results confirm that RFID technology is not a “Plug and Play” solution. RFID middleware configuration will require a high level of customization. Finally, this study allows the improvement of our understanding of the real potential of RFID technology in the supply chain context.