\contentsline {chapter}{\numberline {}Declaration}{iii}{chapter*.1}
\contentsline {chapter}{\numberline {}Acknowledgements}{v}{chapter*.2}
\contentsline {chapter}{\numberline {1}Introduction}{1}{chapter.1}
\contentsline {section}{\numberline {1.1}Background}{1}{section.1.1}
\contentsline {section}{\numberline {1.2}Issues to be addressed}{3}{section.1.2}
\contentsline {chapter}{\numberline {2}Related work}{5}{chapter.2}
\contentsline {section}{\numberline {2.1}Role-based Access Control}{5}{section.2.1}
\contentsline {section}{\numberline {2.2}EPCglobal Network}{13}{section.2.2}
\contentsline {section}{\numberline {2.3}X.509}{16}{section.2.3}
\contentsline {section}{\numberline {2.4}Supply Chain Agent Decision Aid System (SCADAS)}{19}{section.2.4}
\contentsline {subsection}{\numberline {2.4.1}General mobile agent}{19}{subsection.2.4.1}
\contentsline {subsection}{\numberline {2.4.2}Mobile agent in the supply chain}{20}{subsection.2.4.2}
\contentsline {subsection}{\numberline {2.4.3}SCADAS use case}{21}{subsection.2.4.3}
\contentsline {chapter}{\numberline {3}Requirement Analysis}{23}{chapter.3}
\contentsline {section}{\numberline {3.1}Use cases}{25}{section.3.1}
\contentsline {subsection}{\numberline {3.1.1}General use case}{26}{subsection.3.1.1}
\contentsline {subsection}{\numberline {3.1.2}Integrating ERBAC concept to an existing system}{28}{subsection.3.1.2}
\contentsline {chapter}{\numberline {4}Concepts}{31}{chapter.4}
\contentsline {section}{\numberline {4.1}ERBAC infrastructures}{33}{section.4.1}
\contentsline {subsection}{\numberline {4.1.1}Database Design}{34}{subsection.4.1.1}
\contentsline {subsubsection}{Data schemas in ERBAC servers}{34}{section*.26}
\contentsline {subsubsection}{Data schemas in RSS}{37}{section*.29}
\contentsline {subsection}{\numberline {4.1.2}Role Hierarchy}{38}{subsection.4.1.2}
\contentsline {section}{\numberline {4.2}Role types}{39}{section.4.2}
\contentsline {section}{\numberline {4.3}Role Constraints}{40}{section.4.3}
\contentsline {section}{\numberline {4.4}Role Administration}{41}{section.4.4}
\contentsline {subsection}{\numberline {4.4.1}Grant roles}{41}{subsection.4.4.1}
\contentsline {subsection}{\numberline {4.4.2}Revoke roles}{46}{subsection.4.4.2}
\contentsline {subsubsection}{Historical record access issue}{48}{section*.36}
\contentsline {subsection}{\numberline {4.4.3}Add roles}{49}{subsection.4.4.3}
\contentsline {subsection}{\numberline {4.4.4}Delete roles}{49}{subsection.4.4.4}
\contentsline {chapter}{\numberline {5}Implementation and Evaluation}{55}{chapter.5}
\contentsline {section}{\numberline {5.1}Database Design}{55}{section.5.1}
\contentsline {section}{\numberline {5.2}Role Administration Web Services}{58}{section.5.2}
\contentsline {section}{\numberline {5.3}Implementation Details}{58}{section.5.3}
\contentsline {subsection}{\numberline {5.3.1}Role Hierarchy}{59}{subsection.5.3.1}
\contentsline {subsection}{\numberline {5.3.2}Vote Algorithm}{60}{subsection.5.3.2}
\contentsline {section}{\numberline {5.4}Evaluation: Compare ERBAC with a current authorization concept}{62}{section.5.4}
\contentsline {chapter}{\numberline {6}Summary and future work}{63}{chapter.6}
\contentsline {section}{\numberline {6.1}Summary and contributions}{63}{section.6.1}
\contentsline {section}{\numberline {6.2}Future work}{64}{section.6.2}
\contentsline {chapter}{\numberline {}Bibliography}{65}{section.6.2}
