%% This BibTeX bibliography file was created using BibDesk.
%% http://bibdesk.sourceforge.net/


%% Created for Thorsten Karrer at 2005-11-22 15:59:55 +0100 


%% Saved with string encoding ASCII (TeX) 





@book{Borchers:2001,
	Author = {Jan Borchers},
	Date-Added = {2005-11-22 15:56:58 +0100},
	Date-Modified = {2005-11-22 15:59:55 +0100},
	Publisher = {John Wiley & Sons, Ltd},
	Title = {A Pattern Approach to Interaction Design},
	Year = {2001}}
	
@inproceedings{Theseos1,
  author    = {Alvin Cheung and
               Karin Kailing and
               Stefan Sch{\"o}nauer},
  title     = {Theseos: A Query Engine for Traceability across Sovereign,
               Distributed RFID Databases},
  booktitle = {ICDE},
  year      = {2007},
  pages     = {1495-1496},
  ee        = {http://dx.doi.org/10.1109/ICDE.2007.369050},
  crossref  = {DBLP:conf/icde/2007},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@misc{Theseos2,
  author    = "Steve Beier and Tyrone Grandison and Karin Kailing and Ralf Rantzau",
  title     = "Discovery Service -- Enabling RFID Traceability in EPCglobal Networks",
  howpublished = "Proc. of the 13th International Conference on Management of Data (COMAD) 2006. Delhi, India",
  month = "December",
  year = "2006",
  url = {http://www.almaden.ibm.com/cs/projects/iis/rfid/}
  }

@misc{lefevre04limiting,
  author = "K. LeFevre and R. Agrawal and V. Ercegovac and R. Ramakrishnan and Y. Xu and D. DeWitt",
  title = "Limiting disclosure in Hippocratic databases",
  year = "2004",
  url = "citeseer.ist.psu.edu/lefevre04limiting.html" }

@ARTICLE{Whitman:1999, 
title={Understanding the supply chain impact of a manufacturing process change}, 
author={Whitman, L. and Rogers, K.J. and Johnson, M. and Huff, B.L.}, 
journal={Management of Engineering and Technology, 1999. Technology and Innovation Management. PICMET '99. Portland International Conference on}, 
year={1999}, 
volume={1}, 
number={}, 
pages={322 vol.1-}, 
doi={10.1109/PICMET.1999.808321}, 
ISSN={}, }


@inproceedings{SCADAS:1,
 author = {Anurag Gupta and Larry Whitman and Ramesh K. Agarwal},
 title = {Supply chain agent decision aid system (SCADAS)},
 booktitle = {WSC '01: Proceedings of the 33nd conference on Winter simulation},
 year = {2001},
 isbn = {0-7803-7309-X},
 pages = {553--559},
 location = {Arlington, Virginia},
 publisher = {IEEE Computer Society},
 address = {Washington, DC, USA},
 }

@Inproceedings{Kalakota:1995,
Author={Ravi Kalakota and Jan Stallaert and Andrew B. Whinston},
Title={Implementing real-time supply chain optimization systems},
Booktitle={Proceedings of the Conference on Supply Chain Management},
Year={1995},
Address={Hong Kong}
}

@misc{thomsen,
  author = "L. L. Thomsen and B. Thomsen",
  title = "Mobile Agents - The new paradigm in computing",
  year ="1997", 
  url = "citeseer.ist.psu.edu/thomsen97mobile.html" }


@misc{brugali,
  author = "D. Brugali and G. Menga and S. Galarraga",
  title = "InterCompany Supply Chains Integration via Mobile Agents",
  text = "Brugali, D., Menga, G. and Galarraga, S. (1998). InterCompany Supply Chains
    Integration via Mobile Agents. In Jacucci, G. (ed.), Globalization of Manufacturing
    in the Digital Communications Era of the 21 st Century: Innovation, Agility
    and the Virtual Enterprise, Kluwer Academic Publisher, pp. 43-54.",
  year = "1998",
  url = "citeseer.ist.psu.edu/brugali98intercompany.html" }
  
@book{lange,
 author = {Danny B. Lange and Oshima Mitsuru},
 title = {Programming and Deploying Java Mobile Agents Aglets},
 year = {1998},
 isbn = {0201325829},
 publisher = {Addison-Wesley Longman Publishing Co., Inc.},
 address = {Boston, MA, USA},
 }

@Book{rbac,
  author =	"David F. Ferraiolo and D. Richard Kuhn and Ramaswamy Chandramouli",
  title =	"Role-Based Access Control",
  publisher =	"Artech House",
  year = 	"2003",
  month =	apr,
  address =	"Norwood, Massachusetts",
  ISBN = 	"1580533701",
  topic =	"rbac[0.9]",
}

@misc{epcglobal,
	title = {{EPC}global Homepage},
	url = {http://www.epcglobalinc.org/home}{http://www.epcglobalinc.org/home}
}

@misc{epcnetworkdemo,
	title = {The {EPC}global Network Demonstration},
	url = {http://www.epcglobalinc.org/about/media_centre/EPCglobal_Network_Demo.pdf}{http://www.epcglobalinc.org/about/media_centre/EPCglobal_Network_Demo.pdf}
}

@misc{epcglobalarchitectureframework,
	title = {{EPC}global Architecture Framework Standard},
	url = {http://www.epcglobalinc.org/standards/architecture/}{http://www.epcglobalinc.org/standards/architecture/}
}

@misc{ons,
	title = {{EPC}global Object Naming Service},
	url = {http://www.epcglobalinc.org/standards/ons}{http://www.epcglobalinc.org/standards/ons}
}

@misc{rsa,
	title = {{RSA} Cryptography Standard},
	url = {http://www.rsa.com/rsalabs/node.asp?id=2125}
}

@misc{webservice,
	title = {{W3C} Web Services Architecture Document},
	url = {http://www.w3.org/TR/ws-arch/}
}

@misc{appsrv,
	title = {Sun Java System Application Server Home},
	url = {http://www.sun.com/software/products/appsrvr/index.jsp}
}

@misc{msdn,
	title = {X.509 Technical Supplement},
	url = {http://msdn2.microsoft.com/en-us/library/aa480610.aspx}
}


@misc{x509,
	title = {International Telecommunication Union},
	url = {http://www.itu.int/rec/T-REC-X.509/en}{http://www.itu.int/rec/T-REC-X.509/en}
}

@misc{FreeBSD,
	title = {{FreeBSD} Homepage},
	url = {http://www.freebsd.org/}{http://www.freebsd.org/}
}

@misc{OracleDBMS,
	title = {Oracle {DBMS} Homepage},
	url = {http://www.oracle.com/technology/software/products/database/index.html}{http://www.oracle.com/technology/software/products/database/index.html}
}

@misc{SAPR/3,
	title = {{SAP R/3}},
	url = {http://help.sap.com/}{http://help.sap.com/}
}

@misc{SELinux,
	title = {{SELinux} Homepage},
	url = {http://www.nsa.gov/selinux/}{http://www.nsa.gov/selinux/}
}

@misc{Solaris,
	title = {Solaris Homepage},
	url = {http://www.sun.com/software/solaris/index.jsp}{http://www.sun.com/software/solaris/index.jsp}
}

@misc{Derby,
	title = {Derby Homepage},
	url = {http://db.apache.org/derby/}{http://db.apache.org/derby/}
}

@misc{demo,
	title = {{RFID} demo},
	url = {http://www.alphaworks.ibm.com/tech/theseos/download}{http://www.alphaworks.ibm.com/tech/theseos/download}
}

@misc{epcis,
	title = {{EPCIS} Specification},
	url = {http://www.epcglobalinc.org/standards/epcis/epcis_1_0_1-standard-20070921.pdf}{http://www.epcglobalinc.org/standards/epcis/epcis_1_0_1-standard-20070921.pdf}
}



@article{rbacmodels,
    author = "Ravi S. Sandhu and Edward J. Coyne and Hal L. Feinstein and Charles E. Youman",
    title = "Role-Based Access Control Models",
    journal = "IEEE Computer",
    volume = "29",
    number = "2",
    pages = "38-47",
    year = "1996",
    url = "citeseer.ist.psu.edu/article/sandhu96rolebased.html" }
    
    
@inproceedings{sam,
 author = {Roland Awischus},
 title = {Role based access control with the security administration manager (SAM)},
 booktitle = {RBAC '97: Proceedings of the second ACM workshop on Role-based access control},
 year = {1997},
 isbn = {0-89791-985-8},
 pages = {61--68},
 location = {Fairfax, Virginia, United States},
 doi = {http://doi.acm.org/10.1145/266741.266758},
 publisher = {ACM},
 address = {New York, NY, USA},
 }

@inproceedings{arairss,
    author = "Matunda Nyanchama and Sylvia L. Osborn",
    title = "Access Rights Administration in Role-Based Security Systems",
    booktitle = "{IFIP} Workshop on Database Security",
    pages = "37--56",
    year = "1994",
    url = "citeseer.ist.psu.edu/nyanchama94access.html" }


@inproceedings{migratingtorbac,
  author    = {Kami Brooks},
  title     = {Migrating to Role-Based Access Control},
  booktitle = {ACM Workshop on Role-Based Access Control},
  year      = {1999},
  pages     = {71-81},
  ee        = {http://doi.acm.org/10.1145/319171.319178},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@article{tmocspuara,
 author = {S. H. von Solms and Isak van der Merwe},
 title = {The management of computer security profiles using a role-oriented approach},
 journal = {Comput. Secur.},
 volume = {13},
 number = {9},
 year = {1994},
 issn = {0167-4048},
 pages = {673--680},
 publisher = {Elsevier Advanced Technology Publications},
 address = {Oxford, UK, UK},
 }



@inproceedings{rolehierarchies,
 author = {Jonathan D. Moffett and Emil C. Lupu},
 title = {The uses of role hierarchies in access control},
 booktitle = {RBAC '99: Proceedings of the fourth ACM workshop on Role-based access control},
 year = {1999},
 isbn = {1-58113-180-1},
 pages = {153--160},
 location = {Fairfax, Virginia, United States},
 doi = {http://doi.acm.org/10.1145/319171.319186},
 publisher = {ACM},
 address = {New York, NY, USA},
 }
 
 @inproceedings{roleadministration1,
 author = {Sejong Oh and Ravi Sandhu},
 title = {A model for role administration using organization structure},
 booktitle = {SACMAT '02: Proceedings of the seventh ACM symposium on Access control models and technologies},
 year = {2002},
 isbn = {1-58113-496-7},
 pages = {155--162},
 location = {Monterey, California, USA},
 doi = {http://doi.acm.org/10.1145/507711.507737},
 publisher = {ACM},
 address = {New York, NY, USA},
 }

@inproceedings{roleadministration2,
 author = {Jason Crampton},
 title = {Administrative scope and role hierarchy operations},
 booktitle = {SACMAT '02: Proceedings of the seventh ACM symposium on Access control models and technologies},
 year = {2002},
 isbn = {1-58113-496-7},
 pages = {145--154},
 location = {Monterey, California, USA},
 doi = {http://doi.acm.org/10.1145/507711.507736},
 publisher = {ACM},
 address = {New York, NY, USA},
 }


@ARTICLE{EPCIS1, 
title={RFID-based EPC System and Information Services in Intelligent Transportation System}, 
author={Fangli Liu and Huansheng Ning and Huiping Yang and Zhiqiang Xu and Yu Cong}, 
journal={ITS Telecommunications Proceedings, 2006 6th International Conference on}, 
year={June 2006}, 
volume={}, 
number={}, 
pages={26-28}, 
keywords={electronic products, information services, radiofrequency identificationITS, RFID-based EPC system, electronic product code, information service, intelligent transportation system, network infrastructure, radiofrequency identification}, 
doi={10.1109/ITST.2006.288752}, 
ISSN={}, }

@ARTICLE{EPCIS2, 
title={PTSP: a lightweight EPCDS platform to deploy traceable services between supply-chain applications}, 
author={Yingping Cao and Dong Wang and Huanye Sheng}, 
journal={RFID Eurasia, 2007 1st Annual}, 
year={5-6 Sept. 2007}, 
volume={}, 
number={}, 
pages={1-5}, 
keywords={bar codes, radiofrequency identificationEPCglobal Network and Object Naming Service, RFID-tagged products, full-fledged discovery services, product trace service platform, supply-chain applications, traceable services}, 
doi={10.1109/RFIDEURASIA.2007.4368125}, 
ISSN={}, }

@misc{rfc2379,
  author="L. Berger",
  title="{RSVP over ATM Implementation Guidelines}",
  series="Request for Comments",
  number="2379",
  howpublished="RFC 2379 (Best Current Practice)",
  publisher="IETF",
  organisation="Internet Engineering Task Force",
  year=1998,
  month=aug,
    url="http://www.ietf.org/rfc/rfc2379.txt",
}

@misc{rfc2380,
  author="L. Berger",
  title="{RSVP over ATM Implementation Requirements}",
  series="Request for Comments",
  number="2380",
  howpublished="RFC 2380 (Proposed Standard)",
  publisher="IETF",
  organisation="Internet Engineering Task Force",
  year=1998,
  month=aug,
    url="http://www.ietf.org/rfc/rfc2380.txt",
}

@article{dfdus,
 author = {Imtiaz Mohammed and David M. Dilts},
 title = {Design for dynamic user-role-based security},
 journal = {Comput. Secur.},
 volume = {13},
 number = {9},
 year = {1994},
 issn = {0167-4048},
 pages = {661--671},
 publisher = {Elsevier Advanced Technology Publications},
 address = {Oxford, UK, UK},
 }
 
 @inproceedings{thomasconceptual,
    author = "R. K Thomas and R. S. Sandhu",
    title = "Conceptual Foundations for a Model of Task-based Authorizations",
    pages = "66--79",
    url = "citeseer.ist.psu.edu/thomas94conceptual.html" }

@article{lacm,
    author = "Ravi S. Sandhu",
    title = "Lattice-Based Access Control Models",
    journal = "IEEE Computer",
    volume = "26",
    number = "11",
    pages = "9-19",
    year = "1993",
    url = "citeseer.ist.psu.edu/article/sandhu93latticebased.html" }

@inproceedings{eacwdrbam,
 author = {Dirk Jonscher},
 title = {Extending access control with duties - realized by active mechanisms},
 booktitle = {Results of the Sixth Working Conference of IFIP Working Group 11.3 on Database Security on Database security, VI : status and prospects},
 year = {1993},
 isbn = {0-444-89889-1},
 pages = {91--111},
 location = {Simon Fraser Univ., Vancouver, British Columbia, Canada},
 publisher = {Elsevier Science Inc.},
 address = {New York, NY, USA},
 }

@misc{moffett91delegation,
  author = "J. Moffett and M. Sloman",
  title = "Delegation of Authority",
  text = "Moffett J.D. & Sloman M.S. (1991a), Delegation of Authority, in I. Krishnan
    & W. Zimmer (eds), Integrated Network Management II, North Holland (April
    1991) pp 595-606.",
  year = "1991",
  url = "citeseer.ist.psu.edu/article/moffett90delegation.html" }

@inproceedings{679780,
 author = {Eduardo B. Fern\'{a}ndez and Jie Wu and Minjie H. Fernandez},
 title = {User Group Structures in Object-Oriented Database Authorization},
 booktitle = {Proceedings of the IFIP WG11.3 Working Conference on Database Security VII},
 year = {1994},
 isbn = {0-444-81976-2},
 pages = {57--76},
 publisher = {North-Holland Publishing Co.},
 address = {Amsterdam, The Netherlands, The Netherlands},
 }

@inproceedings{1151502,
 author = {Samuel Fosso Wamba and Louis A. Lefebvre and Elisabeth Lefebvre},
 title = {Enabling intelligent B-to-B eCommerce supply chain management using RFID and the EPC network: a case study in the retail industry},
 booktitle = {ICEC '06: Proceedings of the 8th international conference on Electronic commerce},
 year = {2006},
 isbn = {1-59593-392-1},
 pages = {281--288},
 location = {Fredericton, New Brunswick, Canada},
 doi = {http://doi.acm.org/10.1145/1151454.1151502},
 publisher = {ACM},
 address = {New York, NY, USA},
 }


@misc{floerkemeier03pml,
  author = "C. Floerkemeier and D. Anarkat and T. Osinski and M. Harrison",
  title = "PML Core Specification",
  text = "C. Floerkemeier, D. Anarkat, T. Osinski, and M. Harrison. PML Core Specification
    1.0. Technical report, Auto-ID Center, September 2003.",
  year = "2003",
  url = "citeseer.ist.psu.edu/floerkemeier03pml.html" }
  
@Article{RePEc:eee:bushor:v:47:y:2004:i:6:p:60-68,
  author={Srivastava, Bharatendu},
  title={Radio frequency ID technology: The next revolution in SCM},
  journal={Business Horizons},
  year=2004,
  volume={47},
  number={6},
  pages={60-68},
  month={},
  url={http://ideas.repec.org/a/eee/bushor/v47y2004i6p60-68.html}
}

@misc{strassner-todays,
  author = "Processes Martin Strassner",
  title = "Today's Impact of Ubiquitous Computing on Business",
  url = "citeseer.ist.psu.edu/706299.html" }
  
  @inproceedings{1080805,
 author = {Ari Juels},
 title = {Strengthening EPC tags against cloning},
 booktitle = {WiSe '05: Proceedings of the 4th ACM workshop on Wireless security},
 year = {2005},
 isbn = {1-59593-142-2},
 pages = {67--76},
 location = {Cologne, Germany},
 doi = {http://doi.acm.org/10.1145/1080793.1080805},
 publisher = {ACM},
 address = {New York, NY, USA},
 }

@inproceedings{1193855,
 author = {Rakesh Agrawal and Alvin Cheung and Karin Kailing and Stefan Schonauer},
 title = {Towards Traceability across Sovereign, Distributed RFID Databases},
 booktitle = {IDEAS '06: Proceedings of the 10th International Database Engineering and Applications Symposium},
 year = {2006},
 isbn = {0-7695-2577-6},
 pages = {174--184},
 doi = {http://dx.doi.org/10.1109/IDEAS.2006.47},
 publisher = {IEEE Computer Society},
 address = {Washington, DC, USA},
 }


@book{555188,
 author = {Carlisle Adams and Steve Lloyd},
 title = {Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations},
 year = {1999},
 isbn = {157870166X},
 publisher = {Macmillan Technical Publishing},
 }

@book{517289,
 author = {Tom Austin},
 title = {PKI: A Wiley Tech Brief},
 year = {2000},
 isbn = {0471353809},
 publisher = {John Wiley \& Sons, Inc.},
 address = {New York, NY, USA},
 }

@book{558370,
 author = {Russ Housley and Tim Polk},
 title = {Planning for PKI: Best Practices Guide for Deploying Public Key Infrastructure},
 year = {2001},
 isbn = {0471397024},
 publisher = {John Wiley \& Sons, Inc.},
 address = {New York, NY, USA},
 }

@inproceedings{sandhunist,
 author = {Ravi Sandhu and David Ferraiolo and Richard Kuhn},
 title = {The NIST model for role-based access control: towards a unified standard},
 booktitle = {RBAC '00: Proceedings of the fifth ACM workshop on Role-based access control},
 year = {2000},
 isbn = {1-58113-259-X},
 pages = {47--63},
 location = {Berlin, Germany},
 doi = {http://doi.acm.org/10.1145/344287.344301},
 publisher = {ACM},
 address = {New York, NY, USA},
 }

@misc{savvides02access,
  author = "G. Savvides",
  title = "Access control lists for the self-certifying filesystem",
  text = "George Savvides. Access control lists for the self-certifying filesystem.
    Master's thesis, Massachusetts Institute of Technology, August 2002.",
  year = "2002",
  url = "citeseer.ist.psu.edu/savvides02access.html" }

@article{775268,
 author = {Butler W. Lampson},
 title = {Protection},
 journal = {SIGOPS Oper. Syst. Rev.},
 volume = {8},
 number = {1},
 year = {1974},
 issn = {0163-5980},
 pages = {18--24},
 doi = {http://doi.acm.org/10.1145/775265.775268},
 publisher = {ACM},
 address = {New York, NY, USA},
 }

