RFID : Applications, Security, and Privacy (Hardcover)
暫譯: RFID:應用、安全性與隱私(精裝版)
Simson Garfinkel, Beth Rosenberg
- 出版商: Addison Wesley
- 出版日期: 2005-07-16
- 定價: $2,100
- 售價: 8.0 折 $1,680
- 語言: 英文
- 頁數: 608
- 裝訂: Hardcover
- ISBN: 0321290968
- ISBN-13: 9780321290960
-
相關分類:
RFID、資訊安全
立即出貨(限量) (庫存=9)
買這商品的人也買了...
-
$1,590$1,511 -
$590$460 -
$780$616 -
$480$379 -
$1,881Linux Device Drivers, 3/e (Paperback)
-
$400$340 -
$750$593 -
$820$648 -
$580$493 -
$490$382 -
$540$427 -
$390$308 -
$650$507 -
$890$757 -
$780$741 -
$650$553 -
$580$458 -
$780$663 -
$650$507 -
$480$456 -
$680$537 -
$720$569 -
$1,100$1,078 -
$299$236 -
$680$578
商品描述
Description:
Radio frequency identification (RFID) technology is rapidly becoming ubiquitous as businesses seek to streamline supply chains and respond to mandates from key customers. But RFID and other new wireless ID technologies raise unprecedented privacy issues. RFID: Applications, Security, and Privacy covers these issues from every angle and viewpoint.
Award-winning technology journalist and privacy expert Simson Garfinkel brings together contributions from every stakeholder community—from RFID suppliers to privacy advocates and beyond. His contributors introduce today’s leading wireless ID technologies, trace their evolution, explain their promise, assess their privacy risks, and evaluate proposed solutions—technical, business, and political. The book also looks beyond RFID, reviewing the privacy implications of Wi-Fi, Bluetooth, smart cards, biometrics, new cell-phone networks, and the ever-evolving Internet. Highlights include
- How RFID and other wireless ID technologies work
- RFID applications—from gas stations and pharmacies to the twenty-first century battlefield
- RFID, privacy, and the law—in the United States and around the world
- RFID, security, and industrial espionage
- How Bluetooth and Wi-Fi can track individuals, with or without their permission
- Technical solutions to wireless ID privacy concerns—their values and limitations
- Stakeholder perspectives from EPCglobal, Inc., Gemplus, The Procter & Gamble Company, and other industry leaders
- The future of citizen activism on privacy issues
Clear, balanced, and accessible, this is the indispensable primer for everyone involved in RFID: businesses implementing or evaluating RFID; technology suppliers responding to user concerns; and policymakers and privacy advocates who want a deeper understanding of the technology and its implications.
Table of Contents:
Foreword.
Preface.
Acknowledgments.
I: PRINCIPLES.
1. Automatic Identification and Data Collection: What the Future Holds.
Introduction
A Brief History of AIDC
The "Industry" That Isn't
The Interconnected World
Clear and Present Benefits
Future Applications
Conclusions
2. Understanding RFID Technology.
Introduction
RFID Technology
RFID Applications
Conclusions
3. A History of the EPC.
Introduction
The Beginning
A Mini-Lecture: The Supply Chain
The Auto-ID Center
Harnessing the Juggernaut
Conclusions
4. RFID and Global Privacy Policy.
Introduction
Definitions of Privacy
Mapping the RFID Discovery Process
Privacy as a Fundamental Human Right
Privacy Through Data Protection Law and Fair Information Practices
Conclusions
5. RFID, Privacy, and Regulation.
Introduction
Some Current and Proposed RFID Applications
Whither Item-Level Tagging?
Understanding RFID's Privacy Threats
Conclusions
6. RFID and the United States Regulatory Landscape.
Introduction
Current State of RFID Policy
RFID Policy Issues
Government Versus Individual Context
Business Versus Individual Context
Industry Leadership
Options for Government Leadership
Snapshot of Current Status
Policy Prescriptions
The Case for, and Limits of, EPCglobal Leadership
Conclusions
7. RFID and Authenticity of Goods.
Introduction
A Few Important Concepts in Authentication
Authenticity of Tags and Authenticity of Goods
Authenticity of Goods and Anticounterfeiting Measures
Authentication of Readers
Authentication of Users Across the Supply Chain (Federation)
Conclusions
8. Location and Identity: A Brief History.
Introduction
Place and Identity in a World of Habits and Symbols
Locational Technologies
Rethinking Identity: Beyond Traits and Names
On RFID
Conclusions
9. Interaction Design for Visible Wireless.
Introduction
The Role of Interaction Design
A Common Vocabulary
Designing and Modifying WID Systems
Conclusions
II: APPLICATIONS.
10. RFID Payments at ExxonMobil.
Introduction
Interview with Joe Giordano, ExxonMobil Corporation
11. Transforming the Battlefield with RFID.
Introduction
Logistics and the Military
Conclusions
12. RFID in the Pharmacy: Q&A with CVS.
Introduction
CVS and Auto-ID
Project Jump Start
RFID in the Store
Making RFID Work: The Back End
13. RFID in Healthcare.
Introduction
Home Eldercare
Challenges
Conclusions
14. Wireless Tracking in the Library: Benefits, Threats, and Responsibilities.
Introduction
RFID System Components and Their Effects in Libraries
RFID Standards
RFID in U.S. Libraries
Best-Practices Guidelines for Library Use of RFID
Conclusions
15. Tracking Livestock with RFID.
Introduction
RFID Has to Prove Itself
Putting RFID to Work
RFID and Livestock Marketing
RFID World Livestock Roundup
III: THREATS.
16. RFID: The Doomsday Scenario.
Introduction
RFID Tags and the EPC Code
A Ubiquitous RFID Reader Network
Watching Everything: RFID and the Four Databases It Will Spawn
Corporate Abuse
Government Abuse
Conclusions
17. Multiple Scenarios for Private-Sector Use of RFID.
Introduction
Scenario 1: "No One Wins"
Scenario 2: "Shangri-La"
Scenario 3: "The Wild West"
Scenario 4: "Trust but Verify"
Conclusions
18. Would Macy's Scan Gimbels?: Competitive Intelligence and RFID.
Introduction
In-Store Scenarios
So, Who Wants to Know?
Conclusions
19. Hacking the Prox Card.
Introduction
Reverse-Engineering the Protocol
Security Implications
Protecting Against These Types of Attacks
Conclusions
20. Bluejacked!
Introduction
Bluetooth
Bluetooth Security and Privacy Attacks
Conclusions
IV: TECHNICAL SOLUTIONS.
21. Technological Approaches to the RFID Privacy Problem.
Introduction
The Technical Challenges of RFID Privacy
Blocker Tags
Soft Blocking
Signal-to-Noise Measurement
Tags with Pseudonyms
Corporate Privacy
Technology and Policy
Conclusions
22. Randomization: Another Approach to Robust RFID Security.
Introduction
The Problems in RFID Security
Conclusions
23. Killing, Recoding, and Beyond.
Introduction
RFID Recoding and Infomediaries
Infrastructure Issues
Conclusions
V: STAKEHOLDER PERSPECTIVES.
24. Texas Instruments: Lessons from Successful RFID Applications.
Introduction
Toll Tracking: Who Knows Where You Are Going?
Contactless Payment: Are Safeguards Already in Place?
RFID and Automotive Anti-Theft: Staying Ahead of the Security Curve
How and What We Communicate
Conclusions
25. Gemplus: Smart Cards and Wireless Cards.
Introduction
What Is a Smart Card?
Smart Card Communication and Command Format
Card Life Cycle
Smart Card Applications
"Contactless" Cards
Protocols and Secure Communication Schemes
Constraints of Contactless Products
Contactless Products and the Contact Interface
Conclusions
26. NCR: RFID in Retail.
Introduction
Payment Applications
Inventory Management Applications
Hybrid Scanners
Privacy Concerns
RFID Portal
Conclusions
27. P&G: RFID and Privacy in the Supply Chain.
Introduction
Procter & Gamble's Position
RFID Technology and the Supply Chain
Global Guidelines for EPC Usage
Conclusions
28. Citizens: Getting at Our Real Concerns.
Introduction
Prior to the Point of Sale
After the Point of Sale: Nonconsumer Goods
After the Point of Sale: Consumer Goods
After the Point of Sale: Privacy Interests
Eliminating the RFID Threats to Privacy
Conclusions
29. Activists: Communicating with Consumers, Speaking Truth to Policy Makers.
Introduction
RFID Characteristics That Threaten Privacy
Proposed Technology-Based Solutions
Is Consumer Education the Answer?
Calling for a Technology Assessment
Conclusions
30. Experimenting on Humans Using Alien Technology.
Introduction
The Surveillance Society: It's Already Here
A Trick to Overcome Resistance
Constituents to Change-and to Stasis
Privacy Advocates Own This Story
Privacy, Change, and Language
How to Make Consumers Demand Change (and RFID)
Conclusions
31. Asia: Billions Awaken to RFID.
Introduction
Factors Separating Western and Asian RFID Experience
The Extant Paper Database and Electronic Credit Card Systems
RFID in India
RFID Across Asia
Conclusions
32. Latin America: Wireless Privacy, Corporations, and the Struggle for Development.
Introduction
An Overview of Wireless Services Penetration into Central America
Pervasiveness of Telecommunications in Central America
Privacy Concerns
An Overview of Privacy Across Latin America
Conclusions: Privacy, Poverty, and the Future
APPENDIXES.
Appendix A: Position Statement on the Use of RFID on Consumer Products.
Appendix B: RFID and the Construction of Privacy: Why Mandatory Kill Is Necessary.
Appendix C: Guidelines for Privacy Protection on Electronic Tags of Japan.
Appendix D: Adapting Fair Information Practices to Low-Cost RFID Systems.
Appendix E: Guidelines on EPC for Consumer Products.
Appendix F: Realizing the Mandate: RFID at Wal-Mart.
Index.
商品描述(中文翻譯)
描述:
無線射頻識別(RFID)技術正迅速普及,因為企業尋求簡化供應鏈並回應主要客戶的要求。然而,RFID和其他新型無線識別技術引發了前所未有的隱私問題。《RFID:應用、安全與隱私》從各個角度和觀點探討了這些問題。
獲獎的科技記者和隱私專家Simson Garfinkel匯集了來自各利益相關者社群的貢獻——從RFID供應商到隱私倡導者及其他。貢獻者介紹了當今領先的無線識別技術,追溯其演變,解釋其潛力,評估其隱私風險,並評估提出的解決方案——技術、商業和政治方面。本書還超越RFID,回顧Wi-Fi、藍牙、智慧卡、生物識別、新型手機網絡以及不斷演變的互聯網的隱私影響。重點包括:
- RFID和其他無線識別技術的運作方式
- RFID應用——從加油站和藥房到21世紀的戰場
- RFID、隱私與法律——在美國及全球的情況
- RFID、安全與工業間諜活動
- 藍牙和Wi-Fi如何追蹤個人,無論是否獲得其許可
- 無線識別隱私問題的技術解決方案——其價值和限制
- 來自EPCglobal, Inc.、Gemplus、寶潔公司及其他行業領導者的利益相關者觀點
- 公民在隱私問題上的未來行動主義
清晰、平衡且易於理解,這是每位參與RFID的人士不可或缺的入門書:實施或評估RFID的企業;回應用戶關切的技術供應商;以及希望深入了解技術及其影響的政策制定者和隱私倡導者。
目錄:
前言
序言
致謝
I:原則
1. 自動識別與數據收集:未來的展望
- 介紹
- 自動識別數據收集的簡史
- 不存在的「行業」
- 互聯網世界
- 明確且當前的好處
- 未來應用
- 結論
2. 理解RFID技術
- 介紹
- RFID技術
- RFID應用
- 結論
3. EPC的歷史
- 介紹
- 開端
- 小型講座:供應鏈
- 自動識別中心
- 駕馭巨獸
- 結論
4. RFID與全球隱私政策
- 介紹
- 隱私的定義
- RFID發現過程的映射
- 隱私作為基本人權
- 通過數據保護法和公平信息實踐來保障隱私
- 結論
5. RFID、隱私與監管
- 介紹
- 一些當前和提議的RFID應用
- 物品級標籤的未來?
- 理解RFID的隱私威脅
- 結論
6. RFID與美國的監管環境
- 介紹
- RFID政策的當前狀態
- RFID政策問題
- 政府與個人背景
- 商業與個人背景
- 行業領導
- 政府領導的選擇
- 當前狀態的快照
- 政策建議
- EPCglobal領導的理由及其限制
- 結論
7. RFID與商品的真實性
- 介紹
- 認證中的幾個重要概念
- 標籤的真實性與商品的真實性
- 商品的真實性與防偽措施
- 讀取器的認證
- 整個供應鏈中用戶的認證(聯邦制)
- 結論
8. 位置與身份:簡史
- 介紹
- 在習慣與符號的世界中,地點與身份