1 Dirk Henrici Security and Privacy in Large-scale RFID Systems Challenges and Solutions Dissertation 2. April 2008 University of Kaiserslautern
3 Dedicated to all dear people accompanying me on the journey of life
5 Abstract RFID technology attracts strong interest worldwide: It provides a means for automatic identification of objects and is regarded as an indispensable part in the vision of the Internet of things. With the aid of RFID systems, life shall become more convenient and businesses shall become more productive. Regarding security, the technology shall help to prevent product counterfeiting. But besides all the promising applications, the technology s ability to provide detailed data about objects puts data security and privacy at risk. Opponents of the technology even consider it as a means for performing unwanted tracking and fear that it could become the technological base for creating a surveillance society. The vision of a world in which privacy persists and security is ensured but the full potential of the technology is nevertheless tapped guides this work. It is argued that security and privacy can be ensured using technical safeguards if the whole RFID system is designed properly. The challenge is immense since there exist various constraints for providing security and privacy in RFID systems: technically and economically but also ethically and socially. Not only security and privacy needs to be provided but the solutions also need to be inexpensive, practical, reliable, scalable, flexible, inter-organizational, and lasting. After analyzing the problem area in detail, a number of new concepts and protocols that provide security and ensure privacy in RFID systems by technical means are introduced in this work. The classic RFID model is extended and considerations in new directions are taken. This leads to innovative solutions with advantageous characteristics. Finally, a comprehensive framework including required protocols for operation is proposed. It can be used on a global scope, supports inter-organizational cooperation and data sharing, and adheres to all the architectural guidelines derived in this work. Security and privacy is provided by technical means in an economic manner. Altogether, the goal of building scalable and efficient RFID systems on a global, inter-organizational scale without neglecting security and privacy has been achieved well.
7 Preface In the beginning of 2003, I found a short article about the privacy implications of RFID technology in a newspaper. It raised my interest, and after reading some early research papers on the topic, I thought: There must exist better solutions. I concerned myself with the topic in my spare time. After having developed my first solutions, I asked my advisor, Prof. Dr. Paul Müller, whether I could write a paper about my results. As the topic did not fit into a running project or at least the overall research directions of his group, he could have answered no. But instead, he encouraged me to do it, the paper became a success, and many other papers about new concepts and solutions followed. Now the answer is obvious: There exist better solutions. This work is surely not a bedside reading. But with all the presented new concepts, it can broaden the mind of the reader concerning security, privacy, and RFID systems. I wish the reader many new insights. There are many people I would like to thank. First of all, my thanks go to my advisor, Prof. Dr. Paul Müller. He gave me room for creativity and plenty of rope to work on my own. Thereby, he always trusted in my skills, gave helpful hints, and his door stood open for me at all times. Further, I want to thank my second referee Prof. Dr. Karsten Berns for his interest in my work and the valuable discussion about his experiences. Many thanks go to my present and former colleagues for the pleasant and productive atmosphere as well as the lively discussions on scientific and other topics. I am glad that we had so much fun despite of the high workload. I also want to thank our courteous secretaries who disburdened me from much administrative work. Thanks also go to various persons that supported me in finishing this work. As representatives for all of them, I d like to mention Prof. Dr. Friedemann Mattern for spending his rare available time on rating my research and encouraging me to go on working and also Dr. habil. Bernd Schürmann for answering all my legal and administrative questions.
8 X Preface Thanks to Michaela Keßler for encouraging me to write this work in English. This makes the results of this work accessible to the international research community. My thanks also go to my friends, Sascha Paulus, Nadine Sumser, and the many others, for their long lasting friendship and their understanding that I was not as available as usual in the recent months. I am deeply grateful to my parents for their enduring support and all the other gifts that I received from them. I thank my sister Carina for distracting me from my work every now and then and for always giving me a hearty welcome each time I visited her. Very special thanks go to my girlfriend Annika Kohlhaas for her love and patience. She did not only show understanding for all the evenings and weekends that I spent sitting in front of my notebook but also did the proofreading of papers and this work. She is very special, and I am glad that she came into my life. Kaiserslautern, October 2007 Dirk Henrici Additional note With some modifications, this PhD thesis is published as a book. The title is RFID Security and Privacy Concepts, Protocols and Architectures. It appears in the series Lecture Notes of Electrical Engineering of the renowned Springer publishing company. The PhD thesis itself is published using the minimum number of printed copies only. Thanks go to my advisor, Prof. Dr. Paul Müller, for suggesting this dual publication scheme.
9 Contents 1 Introduction Motivation and vision Contribution Limitations Outline Fundamentals RFID History Tags RFID readers RFID communication Backend/middleware Overall system RFID summary Security Properties of secure systems Safeguards Security by design Security summary Privacy Historical overview Defining privacy The importance of privacy Privacy today Current development Perception of privacy Regulation approaches Design guidelines for technical regulation Privacy summary Cryptographic primitives
10 XII Contents Symmetric-key cryptography Public-key cryptography Hash functions Random number generation Implementation considerations Cryptographic primitives summary Summary Analysis and modeling Motivating examples Threats Goals Challenges Attacker capabilities Attacks on RFID systems Current situation Regulation approaches Assessment of EPC and Gen II tags Assessment of RFID security and privacy Summary Securing RFID systems Data management Discussion of security and privacy goals Overview of functionality regarding tags Implementation considerations Limitations for implementation Primitives for implementation Discussion of basic functionality Identification Authentication Modification Additional building blocks Distinguishing different tag states Evaluating lower layer information Alternative communication channels Evaluation criteria Hash-based ID variation Basic concepts Protocol realization Security analysis Variants Evaluation Hash-based ID variation summary Summary
11 Contents XIII 5 Pseudonymization infrastructures Motivation Basic idea for addressing the problem Pseudonymization: Introduction and related work Definition of requirements and common concepts Attack targets and attacker capabilities Approach based on asymmetric encryption Basic approach based on hash functions Advanced approach based on hash functions Hash collisions and pseudonym shortening in hash-based approaches Summary Extending the RFID system model Classic RFID model Untrusted reading entities Tag bearer as additional entity Personal manager Assembling the building blocks Summary Advanced solutions Partial solutions Identifier modification based on triggered hash chains Policy restricted key-value pair authentication ID-Zone Architecture Consideration of requirements The concept of location zones Device identifiers and certificates Basic considerations regarding tag identifiers Architectural overview Procedure of tag identifier alterations Elaboration of the architecture Evaluation ID-Zone Architecture summary Summary Summary References
13 1 Introduction In 1956, the Nobel Prize in physics was awarded to William B. Shockley, John Bardeen, and Walter Brattain for the invention of a functioning transistor. Their achievement, which can be seen as the most important invention of the 20th century [Rio05], set the foundation for a matchless technological development in the history of mankind: The size of transistors became smaller and smaller, the price of transistors lower and lower. This development took place and even today still takes place in an exponential manner so that a current CPU (central processing unit) with a cost of a hundred dollars and a die size of less than two square centimeters has about one billion gates now 1. The empirical observation of the exponential development [Moo65] is attributed to Gordon Moore, a co-founder of Intel, and therewith the rapid increase in the complexity of integrated circuits is called Moore s Law. The rapid progress in integrated circuits had far-reaching consequences: Computational resources became increasingly powerful and cheaply available so that many electronic devices make use of them today. For instance, integrated circuits or even complete embedded systems can be found in cars, in consumer electronics, and in home appliances (e.g. washing machines). The trend that many objects around us are equipped with complex integrated circuits continues and realizes the vision of ubiquitous computing which presumes that computational capabilities become ubiquitous. Mark Weiser was one of the people that formed this vision. But besides the ubiquitous availability of computational devices, the vision contains much more: The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it. Mark Weiser, 1991 This citation from [Wei91] focuses on another aspect of computation in the future: Here, not the capabilities stand in the foreground but the unobtrusiveness of the devices. To be unobtrusive, devices need to be smart enough to sense context and 1 source of numbers: Intel Corporation
14 2 1 Introduction to anticipate the goals of the users. This is well expressed by the term ambient intelligence [Aho01]/[Aho02], which is today often used more or less synonymously to the terms ubiquitous computing and the industry-initiated pervasive computing, respectively. An early publication from Satyanarayanan [Sat01] describes the vision and challenges of pervasive computing and its development history. The devices are often not stand-alone but are networked. A connection to the Internet, either directly or via a gateway device, enables sharing sensor data of the devices and also enables controlling the devices from hosts in the Internet. This internetworking of devices that are built into everyday items envisions an Internet of things, a vision that has for instance been promoted by Fleisch and Mattern [FM05]. The goal of the stated visions is always the same: One wants to harvest and share information, process it, and ultimately provide a service. This service could be to give humans assistance in the actions they take. With all the smart items being part of everyday life, life shall become easier, safer, and much more comfortable. From an economic point of view, productivity shall increase considerably. Envisioning how the world with such devices will look like in concrete, is theme of movies and lots of publications, but eventually the variety of applications and all the looming possibilities of the technology still remain unimaginable, see also [Mat01]. A very important technology in the context of ubiquitous computing is Radio- Frequency Identification, abbreviated RFID. Arbitrary objects, e.g. assets, can be equipped with RFID tags kinds of labels that can be used to uniquely identify the objects and that can be queried contactlessly and without a line of sight from some distance. Due to the miniaturization of integrated circuits and the decreasing cost, RFID tags could become ubiquitous in the near future and be used in a variety of applications. In a more abstract view, RFID tags link objects in the real, physical world to virtual counterparts, e.g. data in databases. This is illustrated in figure 1.1. Object RFID Tag Associated Data Real World Virtual World Fig RFID bridging real and virtual world Already this alone provides for a variety of applications, e.g. RFID can act as a replacement for optical barcodes. If tags have additional features (like additional storage or sensors) besides a means for identification, the looming possibilities become even much greater. RFID systems become thus an indispensable part in the vision of the Internet of things and can greatly raise comfort and productivity. But there are also negative sides of RFID technology as well as of the technological progress in general. These sides need to be considered carefully and be dealt with. It is obvious that technological advances and their deployment can and will
15 1.1 Motivation and vision 3 change our way of life completely like it has happened all over history. The impact upon society can be positive or negative depending on the way the technology is used. Some examples for this will be given in the following. Humans nowadays depend on the functioning of their technology. For instance, if a large part of the power grid or the Internet broke down due to natural disasters, war, or terrorist activity, the economic impact would be enormous and the life of people would be endangered. One is used to the functioning of the technology and a sufficient preparation for a longer malfunctioning is very difficult to achieve. Whoever can control or harm the important infrastructures has enormous power. Thus, as people rely on the proper functioning of the technology, characteristics like reliability, safety, and security of the built systems are of very high importance. As the envisioned systems collect, store, and process a vast amount of data, including personal information, privacy becomes important as well. We need to consider how much privacy we want to drop in exchange for the possibilities the systems offer. Here, a proper balance needs to be found and the societal impact of any changes needs to be considered carefully. Besides the impact on society, there are of course other consequences like the impact on the environment. Raw materials are needed for manufacturing devices and the materials should be properly disposed after use. Furthermore, a lot of energy is needed, not only for manufacturing but also for operation within the product life. Imagine how much power is needed to operate the Internet world-wide: Routers, switches, servers, etc. all over the world require an enormous amount of power for their operation. Consequently, beyond the technological matters there are a lot of other aspects, e.g. ethical or societal ones, to consider. The RFID technology is a technology that has the potential to change our way of life completely. This work deals mainly with the security and privacy aspects regarding RFID and intends to find dependable technical solutions for the issues caused by the use of that technology. 1.1 Motivation and vision In recent years, RFID became a hype technology. Many companies have already started to use the technology, first in pilots, later in productive environments. The rapid increase of RFID sales leaves no doubt that RFID will gain much more importance in the years to come. Due to the huge number of possible applications and the decreasing costs for tags, the technology will inevitably become ubiquitous in the near future. But besides the positive possibilities and the high expectations there are also fears that the technology could be abused. Newspaper headlines speak a clear language: Titles like Are you wearing track shoes?, Cradle-to-Grave Surveillance, or RFID tags: Big Brother in small packages are all but unusual. Not all of the articles are objective, but the message is clear. In sum there are two fears: One is
16 4 1 Introduction that RFID could be used for creating very detailed customer profiles leading to vast amounts of information that are used for marketing purposes. There are many scenarios imaginable in which such information could be abused. The second fear is that RFID could become an instrument for keeping people under surveillance. It could be the technological basis of a surveillance society that would outplay the scenario known from George Orwell s famous book Nineteen Eighty-Four [Orw49] considerably. A simple example of an unwanted privacy violation is the following scenario: If a person carries clothes, books, pharmaceuticals, banknotes, and other items all of which are equipped with unsecured RFID tags, anybody could read out the data from the tags unnoticed by the person just by passing by with a reader near enough. The brand of the clothes and other personal items could give information about the financial situation of the person; the information read about the books could reveal the person s interests or even problems (imagine a book title like Alcoholism at work ); the data about the pharmaceuticals could give information about the health status (diseases like infection with HIV); the amount of money the person carries would be interesting for a pickpocket; the content of a woman s handbag would be revealed. The problem with the RFID technology is that it has pros and cons. On the one hand, it has many applications making life more comfortable and companies more productive. But on the other hand, it can have negative implications regarding privacy. Another problem with most current RFID systems is that security is not addressed properly, see e.g. [HJSW06]. The ideal state would be that the power of RFID technology could be used without causing problems regarding security and privacy. This state is envisioned in this work. The theory is that security and privacy can be ensured using technical safeguards if the whole RFID system is designed properly. A security and privacy by design approach is demanded because otherwise the goals cannot be fulfilled, see [HM05] and [Lan01]. This vision of a world in which privacy persists and security is ensured but the full potential of the technology is nevertheless tapped shows the direction for this work. The goal is to find technical ways to provide security and privacy in RFID systems within the various given constraints: technically and economically but also ethically and socially. The solutions that shall be found need not only provide security and privacy but also need to be reliable, scalable, flexible, inter-organizational, and lasting. This is an immense challenge. 1.2 Contribution Past research in the RFID area focused mostly on securing the communication between tags and readers in an efficient manner. The published solutions are only usable within single organizations and do not protect the person who carries RFID tags
17 1.2 Contribution 5 from the organizations that own the tags. As no comprehensive technical solutions that can cope with the actual demand are available yet, the security and privacy problem is currently only treated by the interim solution to destroy ( kill ) tags before they reach the consumers. Additionally, voluntary self-control like marking tags and readers with signs and some postulations regarding legislation is under discussion. In this work, the problem of security and privacy in RFID systems as a whole is addressed. This means that the problem is discussed not only with regard to the tag and the entity operating the reader. Instead, functionalities are separated and all involved entities are discussed with respect to their role within the envisioned system model. Four different entities are distinguished: the owning entity of a tag, the entity currently carrying the tag or an object with a tag, the reading entity, and the tag itself. This separation enables a new logical RFID system architecture that not only better fulfills the security and privacy goals but also features new possibilities for inter-organizational data-sharing. Within the new system architecture, the security and privacy issues of RFID are addressed by technical means. Hash-functions are employed as the main security primitive within RFID tags. In this work it is shown that all the security requirements at the data protocol layer and above can be addressed with this primitive. Thus, no means of symmetrical encryption or even asymmetric encryption is needed in the tags. This saves costs and lowers the time required for processing. The entity that carries the RFID tags, i.e. the consumer, becomes a part of the system model. This way, it is possible to give the consumer control whether his tags are read or not by certain organizations in certain situations. The greater transparency and the possibility to prohibit unwanted read-outs effectively will possibly improve the attitude of consumers regarding RFID technology. Using the newly introduced system model, organizations no longer need to operate readers on their own and no longer need to share data with other organizations using proprietary interfaces. Instead, operators of readers and tag owners are separate entities, and readers of other organizations appear in the same way as own readers. Thus, all readers, including those of other organizations, can be used without additional effort. A number of new concepts and protocols that provide security and ensure privacy in RFID systems by technical means are introduced. First, alternatives to protocols discussed in the literature for securing the communication and for ensuring location privacy are presented. Second, a simple solution for preventing counterfeiting in the supply chain is presented. Third, a comprehensive framework including required protocols for operation is proposed. It adheres to all the derived architectural guidelines and provides security and privacy by technical means in an economic manner. At a glance, the following contributions are made in this work: An analysis of privacy with respect to RFID systems. A comprehensive model for security and privacy in RFID systems regarding threats, goals, and an attacker categorization. A model for the classification of solutions with an introduction to the concepts.
18 6 1 Introduction Identification of evaluation criteria for RFID systems. The Hash-based ID variation protocol with a security discussion. The concept of pseudonymization infrastructures for implementing open RFID systems that respect location privacy. Proposals for implementation of pseudonymization infrastructures based on hash functions. A push concept for open, inter-organizational RFID systems. Extension of the classic model of RFID systems to include and separate entities like owner, bearer, and reading party. The concept of a personal inventory that manages item representations and policies enabling identification and tracking of items based on context information. Proposal of Triggered hash chains as an interesting alternative to the Hashbased ID variation protocol. An approach for the detection of product counterfeiting in supply chains. Design of the ID-Zone Architecture that provides security and privacy in interorganizational RFID systems in a pragmatic and economical manner. The findings of this work are brought together in this architecture. 1.3 Limitations This work takes application scenarios into consideration but poses nevertheless fundamental research. It opens new research directions and advances the state-of-the-art. Nevertheless, research regarding security and privacy in RFID has a long way to go until a stage of maturity can be reached. This means that within this document it is not possible to solve all the problems completely and to work out the presented solutions in a detail that would enable rapid implementation. The concepts and protocols presented in this work focus on an implementation based on hash functions. Implementations based on other primitives are possible as well but are not explored here. One general problem is that it is not clear how much privacy is needed in the world of the near future. History shows that the perception of privacy changes. Thus, a proper balance between privacy and the effort needed for its protection needs to be found. This is research in social sciences that cannot be performed in engineering or in computer science. This means that the models presented for privacy in this work are only based on justified assumptions and not on extensive studies. 1.4 Outline Chapter 2 begins with an overview of RFID technology. It gives required background information for understanding RFID system components, their interplay, and their relevant characteristics. After a short subchapter regarding security, the core topic of the chapter is addressed: privacy. An introduction to privacy with respect to RFID
19 1.4 Outline 7 systems is given with the goal to derive design guidelines. The chapter closes with an introduction to important cryptographic primitives. The focus is laid on one-way hash functions and random number generation since these are the most important primitives within this work. The successive chapter 3 introduces into the security and privacy issues regarding RFID systems. After motivating the topic using some examples, the variety of threats that the systems is exposed to is identified. Based on these threats, goals for secure and privacy-respecting RFID systems are derived. Reaching these goals has many challenges, which are presented in the next subchapter. Afterwards, security and privacy in RFID systems is considered from an attacker s point of view: Classes of attacker capabilities are introduced and possible attacks on RFID systems presented. The chapter concludes with a presentation and an assessment of the current situation in today s application of RFID. In chapter 4, concepts for addressing the identified issues are presented. Following the current state-of-the-art in the literature, the presentation focuses on securing the communication between RFID tags and readers and on protecting location privacy despite eavesdropped or unauthorized tag queries. The different concepts are presented along a scheme for classification. As a comprehensive example of an RFID protocol that implements all tasks that are required for secure, privacy respecting RFID systems, the Hash-based ID variation protocol is presented and discussed. An evaluation of this protocol is performed based on evaluation criteria that have been proposed before in this chapter. Chapter 5 addresses a deficiency that has been found in RFID protocols that implement identifier modification based on message exchanges: For these protocols to operate, a central entity is required which limits scalability of the approaches. The problem is addressed using pseudonymization infrastructures that enable the building of distributed, inter-organizational systems that have the required security and privacy properties. After motivating the use of such infrastructures in RFID systems, the use of classic concepts for pseudonymization infrastructures in RFID systems is presented. Afterwards, pseudonymization infrastructures based on hash functions as cryptographic primitives are developed. In chapter 6, the necessity to extend the classic RFID system model that is presumed in current RFID literature and that is also used in chapter 4 is explained. After a discussion of the deficiencies of the classic model, that model is extended step by step: First, readers are regarded as untrusted entities. This leads to a push concept. RFID systems using this new model adhere much better to the practical requirements in inter-organizational systems than ones using the classic model. In a second step, the tag bearer is introduced as separate entity and the concept of a personal manager for managing tagged items is presented. The chapter concludes with an evaluation of the complete architecture with the presented protocols and concepts as building blocks. As the result are RFID systems that fulfill the requirements regarding security and privacy perfectly but that cannot be implemented economically, chapter 7 aims at more practical solutions. At first, a more elegant replacement for the Hash-based
20 8 1 Introduction ID variation protocol is considered. It is called Triggered hash chain protocol. Second, a partial solution for securing supply-chains against counterfeited products is presented. The main part of the chapter is the development of the ID-Zone architecture. It is an RFID system architecture that follows the practical requirements identified in chapter 2 instead of providing privacy in a perfect manner. In return, the architecture can be implemented much more economically. This work concludes with a summary in chapter 8. In that chapter, the findings are summed up and some open questions for further research are raised.
Reports & Publications Impact of Mobile Technologies on Enterprises: Strategies, Success Factors, Recommendations A study by Stefan Stieglitz and Tobias Brockmann published by the Vodafone Institute for
1 Integrating Conventional ERP System with Cloud Services From the Perspective of Cloud Service Type Shi Jia Department of Computer and Systems Sciences Degree subject (EMIS) Degree project at the master
Security Architecture for the TEAMDEC System Haiyuan Wang Thesis submitted to the Faculty of the Virginia Polytechnic Institute and State University in partial fulfillment of the requirements for the degree
Radio Frequency Identification (RFID) Tags and Reader Antennas Based on Conjugate Matching and Metamaterial Concepts Ph.D. Thesis written by Gerard Zamora González Under the supervision of Jordi Bonache
FRAUNHOFER RESEARCH INSTITUTION AISEC CLOUD COMPUTING SECURITY PROTECTION GOALS.TAXONOMY.MARKET REVIEW. DR. WERNER STREITBERGER, ANGELIKA RUPPEL 02/2010 Parkring 4 D-85748 Garching b. München Tel.: +49
Software-as-a-Service (SaaS) and Physical Security Management for Federal Systems Adapting to the forces of HSPD 12, Convergence, and FISMA April 18, 2008 1 Abstract Working to meet the requirements of
Business Analytics Big Data Next-Generation Analytics the way we see it Table of contents Executive summary 1 Introduction: What is big data and why is it different? 3 The business opportunity 7 Traditional
IEEE COMMUNICATIONS SURVEYS ACTIVE NETWORKS: APPLICATIONS, SECURITY, SAFETY, AND ARCHITECTURES KONSTANTINOS PSOUNIS STANFORD UNIVERSITY ABSTRACT Active networks represent a new approach to network architecture.
NESSI White Paper, December 2012 Big Data A New World of Opportunities Contents 1. Executive Summary... 3 2. Introduction... 4 2.1. Political context... 4 2.2. Research and Big Data... 5 2.3. Purpose of
12 The Internet of Things (IOT) 12.1 Moving toward a Smarter Internet Imagine a world where billions of objects can sense, communicate and share information, all interconnected over public or private Internet
Future Internet Roadmap Deliverable 1.1 Service Web 3.0 Public Roadmap Authors: Elena Simperl (UIBK) Ioan Toma (UIBK) John Domingue (OU) Graham Hench (STI) Dave Lambert (OU) Lyndon J B Nixon (STI) Emilia
ISO 14001, EMAS, OR BS 8555: AN ASSESSMENT OF THE ENVIRONMENTAL MANAGEMENT SYSTEMS FOR UK BUSINESSES By Bo Chen Thesis presented in part-fulfilment of the degree of Master of Science in accordance with
IDENTITY MANAGEMENT DEFINED How to position enterprises into the Identity Management framework Informatics & Economics Faculty of Economics Erasmus University Rotterdam Monday, 19 December 2005 Drs. (Master)
file:///f /Courses/2010-11/CGA/MS2/06course/m09intro.htm Module 9: IS operational and security issues Overview Firms that make extensive use of information systems must contend with a number of ongoing
Introduction to InfiniBand for End Users Industry-Standard Value and Performance for High Performance Computing and the Enterprise Paul Grun InfiniBand Trade Association INTRO TO INFINIBAND FOR END USERS
Mobile Identity Management: An Enacted View George Roussos, Don Peterson, and Uma Patel Abstract. Growth of mobile business requires the ability to provide context aware services when and where needed,
Intrusion Prevention and Detection in Wireless Sensor Networks Inauguraldissertation zur Erlangung des akademischen Grades eines Doktors der Naturwissenschaften der Universität Mannheim vorgelegt von Ioannis
A Security Architecture for Mobile Agent System by PENG FU B.Eng., Tsinghua University China, 1999 A THESIS SUBMITTED IN PARTIAL FULFILMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE in THE
Big Data The definitive guide to the revolution in business analytics shaping tomorrow with you THE WHITE BOOK OF... Big Data The definitive guide to the revolution in business analytics THE WHITE BOOK
THE PRESIDENT S NATIONAL SECURITY TELECOMMUNICATIONS ADVISORY COMMITTEE NSTAC Report to the President on the Internet of Things November 19, 2014 TABLE OF CONTENTS EXECUTIVE SUMMARY... ES-1 1.0 INTRODUCTION...
Institut für Informatik der Technischen Universität München Security Concepts for Robust and Highly Mobile Ad-hoc Networks Florian Dötzer Vollständiger Abdruck der von der Fakultät für Informatik der Technischen
Semester: Title: Cloud computing - impact on business Project Period: September 2014- January 2015 Aalborg University Copenhagen A.C. Meyers Vænge 15 2450 København SV Semester Coordinator: Henning Olesen
Institut für Technische Informatik und Kommunikationsnetze Kirila Adamova Anomaly Detection with Virtual Service Migration in Cloud Infrastructures Master Thesis 263-8-L October 22 to March 23 Tutor: Dr.
SMART CARD CONTENT SECURITY Defining tamperproof for portable smart media AUTHOR: Stefano Zanero ( firstname.lastname@example.org ) Dipartimento di Elettronica e Informazione Politecnico di Milano Version 1.0 This
A Survival Kit for European Project Management Advice for Coordinators of Centralised Socrates Projects 2 nd revised edition: For projects of selection round 1-3-2002 and later Contributors: Editor: Holger
IP TELEPHONY POCKET GUIDE BY BARRY CASTLE 2nd Edition September 2004 ShoreTel, Inc. 960 Stewart Drive Sunnyvale, CA 94085 408.331.3300 1.800.425.9385 www.shoretel.com email@example.com TABLE OF CONTENTS