RFID : Applications, Security, and Privacy (Hardcover)
Simson Garfinkel, Beth Rosenberg
- 出版商: Addison Wesley
- 出版日期: 2005-07-16
- 定價: $2,100
- 售價: 8.0 折 $1,680
- 語言: 英文
- 頁數: 608
- 裝訂: Hardcover
- ISBN: 0321290968
- ISBN-13: 9780321290960
-
相關分類:
RFID、資訊安全
立即出貨(限量) (庫存=9)
買這商品的人也買了...
-
$1,550$1,473 -
$590$460 -
$780$616 -
$480$408 -
$1,881$1,782 -
$400$340 -
$750$593 -
$820$697 -
$580$493 -
$490$382 -
$540$427 -
$390$332 -
$650$507 -
$890$757 -
$780$741 -
$650$553 -
$580$458 -
$780$702 -
$650$507 -
$480$456 -
$680$537 -
$720$569 -
$1,100$1,078 -
$299$254 -
$680$578
相關主題
商品描述
Description:
Radio frequency identification (RFID) technology is rapidly becoming ubiquitous as businesses seek to streamline supply chains and respond to mandates from key customers. But RFID and other new wireless ID technologies raise unprecedented privacy issues. RFID: Applications, Security, and Privacy covers these issues from every angle and viewpoint.
Award-winning technology journalist and privacy expert Simson Garfinkel brings together contributions from every stakeholder community—from RFID suppliers to privacy advocates and beyond. His contributors introduce today’s leading wireless ID technologies, trace their evolution, explain their promise, assess their privacy risks, and evaluate proposed solutions—technical, business, and political. The book also looks beyond RFID, reviewing the privacy implications of Wi-Fi, Bluetooth, smart cards, biometrics, new cell-phone networks, and the ever-evolving Internet. Highlights include
- How RFID and other wireless ID technologies work
- RFID applications—from gas stations and pharmacies to the twenty-first century battlefield
- RFID, privacy, and the law—in the United States and around the world
- RFID, security, and industrial espionage
- How Bluetooth and Wi-Fi can track individuals, with or without their permission
- Technical solutions to wireless ID privacy concerns—their values and limitations
- Stakeholder perspectives from EPCglobal, Inc., Gemplus, The Procter & Gamble Company, and other industry leaders
- The future of citizen activism on privacy issues
Clear, balanced, and accessible, this is the indispensable primer for everyone involved in RFID: businesses implementing or evaluating RFID; technology suppliers responding to user concerns; and policymakers and privacy advocates who want a deeper understanding of the technology and its implications.
Table of Contents:
Foreword.
Preface.
Acknowledgments.
I: PRINCIPLES.
1. Automatic Identification and Data Collection: What the Future Holds.
Introduction
A Brief History of AIDC
The "Industry" That Isn't
The Interconnected World
Clear and Present Benefits
Future Applications
Conclusions
2. Understanding RFID Technology.
Introduction
RFID Technology
RFID Applications
Conclusions
3. A History of the EPC.
Introduction
The Beginning
A Mini-Lecture: The Supply Chain
The Auto-ID Center
Harnessing the Juggernaut
Conclusions
4. RFID and Global Privacy Policy.
Introduction
Definitions of Privacy
Mapping the RFID Discovery Process
Privacy as a Fundamental Human Right
Privacy Through Data Protection Law and Fair Information Practices
Conclusions
5. RFID, Privacy, and Regulation.
Introduction
Some Current and Proposed RFID Applications
Whither Item-Level Tagging?
Understanding RFID's Privacy Threats
Conclusions
6. RFID and the United States Regulatory Landscape.
Introduction
Current State of RFID Policy
RFID Policy Issues
Government Versus Individual Context
Business Versus Individual Context
Industry Leadership
Options for Government Leadership
Snapshot of Current Status
Policy Prescriptions
The Case for, and Limits of, EPCglobal Leadership
Conclusions
7. RFID and Authenticity of Goods.
Introduction
A Few Important Concepts in Authentication
Authenticity of Tags and Authenticity of Goods
Authenticity of Goods and Anticounterfeiting Measures
Authentication of Readers
Authentication of Users Across the Supply Chain (Federation)
Conclusions
8. Location and Identity: A Brief History.
Introduction
Place and Identity in a World of Habits and Symbols
Locational Technologies
Rethinking Identity: Beyond Traits and Names
On RFID
Conclusions
9. Interaction Design for Visible Wireless.
Introduction
The Role of Interaction Design
A Common Vocabulary
Designing and Modifying WID Systems
Conclusions
II: APPLICATIONS.
10. RFID Payments at ExxonMobil.
Introduction
Interview with Joe Giordano, ExxonMobil Corporation
11. Transforming the Battlefield with RFID.
Introduction
Logistics and the Military
Conclusions
12. RFID in the Pharmacy: Q&A with CVS.
Introduction
CVS and Auto-ID
Project Jump Start
RFID in the Store
Making RFID Work: The Back End
13. RFID in Healthcare.
Introduction
Home Eldercare
Challenges
Conclusions
14. Wireless Tracking in the Library: Benefits, Threats, and Responsibilities.
Introduction
RFID System Components and Their Effects in Libraries
RFID Standards
RFID in U.S. Libraries
Best-Practices Guidelines for Library Use of RFID
Conclusions
15. Tracking Livestock with RFID.
Introduction
RFID Has to Prove Itself
Putting RFID to Work
RFID and Livestock Marketing
RFID World Livestock Roundup
III: THREATS.
16. RFID: The Doomsday Scenario.
Introduction
RFID Tags and the EPC Code
A Ubiquitous RFID Reader Network
Watching Everything: RFID and the Four Databases It Will Spawn
Corporate Abuse
Government Abuse
Conclusions
17. Multiple Scenarios for Private-Sector Use of RFID.
Introduction
Scenario 1: "No One Wins"
Scenario 2: "Shangri-La"
Scenario 3: "The Wild West"
Scenario 4: "Trust but Verify"
Conclusions
18. Would Macy's Scan Gimbels?: Competitive Intelligence and RFID.
Introduction
In-Store Scenarios
So, Who Wants to Know?
Conclusions
19. Hacking the Prox Card.
Introduction
Reverse-Engineering the Protocol
Security Implications
Protecting Against These Types of Attacks
Conclusions
20. Bluejacked!
Introduction
Bluetooth
Bluetooth Security and Privacy Attacks
Conclusions
IV: TECHNICAL SOLUTIONS.
21. Technological Approaches to the RFID Privacy Problem.
Introduction
The Technical Challenges of RFID Privacy
Blocker Tags
Soft Blocking
Signal-to-Noise Measurement
Tags with Pseudonyms
Corporate Privacy
Technology and Policy
Conclusions
22. Randomization: Another Approach to Robust RFID Security.
Introduction
The Problems in RFID Security
Conclusions
23. Killing, Recoding, and Beyond.
Introduction
RFID Recoding and Infomediaries
Infrastructure Issues
Conclusions
V: STAKEHOLDER PERSPECTIVES.
24. Texas Instruments: Lessons from Successful RFID Applications.
Introduction
Toll Tracking: Who Knows Where You Are Going?
Contactless Payment: Are Safeguards Already in Place?
RFID and Automotive Anti-Theft: Staying Ahead of the Security Curve
How and What We Communicate
Conclusions
25. Gemplus: Smart Cards and Wireless Cards.
Introduction
What Is a Smart Card?
Smart Card Communication and Command Format
Card Life Cycle
Smart Card Applications
"Contactless" Cards
Protocols and Secure Communication Schemes
Constraints of Contactless Products
Contactless Products and the Contact Interface
Conclusions
26. NCR: RFID in Retail.
Introduction
Payment Applications
Inventory Management Applications
Hybrid Scanners
Privacy Concerns
RFID Portal
Conclusions
27. P&G: RFID and Privacy in the Supply Chain.
Introduction
Procter & Gamble's Position
RFID Technology and the Supply Chain
Global Guidelines for EPC Usage
Conclusions
28. Citizens: Getting at Our Real Concerns.
Introduction
Prior to the Point of Sale
After the Point of Sale: Nonconsumer Goods
After the Point of Sale: Consumer Goods
After the Point of Sale: Privacy Interests
Eliminating the RFID Threats to Privacy
Conclusions
29. Activists: Communicating with Consumers, Speaking Truth to Policy Makers.
Introduction
RFID Characteristics That Threaten Privacy
Proposed Technology-Based Solutions
Is Consumer Education the Answer?
Calling for a Technology Assessment
Conclusions
30. Experimenting on Humans Using Alien Technology.
Introduction
The Surveillance Society: It's Already Here
A Trick to Overcome Resistance
Constituents to Change-and to Stasis
Privacy Advocates Own This Story
Privacy, Change, and Language
How to Make Consumers Demand Change (and RFID)
Conclusions
31. Asia: Billions Awaken to RFID.
Introduction
Factors Separating Western and Asian RFID Experience
The Extant Paper Database and Electronic Credit Card Systems
RFID in India
RFID Across Asia
Conclusions
32. Latin America: Wireless Privacy, Corporations, and the Struggle for Development.
Introduction
An Overview of Wireless Services Penetration into Central America
Pervasiveness of Telecommunications in Central America
Privacy Concerns
An Overview of Privacy Across Latin America
Conclusions: Privacy, Poverty, and the Future
APPENDIXES.
Appendix A: Position Statement on the Use of RFID on Consumer Products.
Appendix B: RFID and the Construction of Privacy: Why Mandatory Kill Is Necessary.
Appendix C: Guidelines for Privacy Protection on Electronic Tags of Japan.
Appendix D: Adapting Fair Information Practices to Low-Cost RFID Systems.
Appendix E: Guidelines on EPC for Consumer Products.
Appendix F: Realizing the Mandate: RFID at Wal-Mart.
Index.
商品描述(中文翻譯)
描述:
無線射頻識別(RFID)技術正迅速普及,因為企業希望簡化供應鏈並回應重要客戶的要求。但是,RFID和其他新的無線識別技術引發了前所未有的隱私問題。《RFID:應用、安全和隱私》從各個角度和觀點探討了這些問題。
屢獲殊榮的技術記者和隱私專家Simson Garfinkel匯集了來自各利益相關者社區的貢獻,從RFID供應商到隱私倡導者等等。他的貢獻者介紹了當今領先的無線識別技術,追蹤其演變,解釋其潛力,評估其隱私風險,並評估提出的解決方案-技術、商業和政治。該書還超越了RFID,回顧了Wi-Fi、藍牙、智能卡、生物識別、新的手機網絡和不斷發展的互聯網的隱私影響。亮點包括:
- RFID和其他無線識別技術的工作原理
- RFID的應用-從加油站和藥店到21世紀的戰場
- RFID、隱私和法律-在美國和世界各地
- RFID、安全和工業間諜活動
- 藍牙和Wi-Fi如何追蹤個人,無論是否獲得其許可
- 無線識別隱私問題的技術解決方案-其價值和局限性
- 利益相關者的觀點,來自EPCglobal、Gemplus、寶潔公司和其他行業領導者
- 公民行動主義在隱私問題上的未來
這本書清晰、平衡且易於理解,是所有參與RFID的人的必備入門書籍:實施或評估RFID的企業、回應用戶關注的技術供應商,以及希望更深入了解該技術及其影響的政策制定者和隱私倡導者。
目錄:
- 前言
- 前言
- 致謝
- 第一部分:原則
- 第1章:自動識別和數據收集:未來的發展
- 簡介
- 自動識別和數據收集的簡史
- 不是“行業”的“行業”