The Security Evaluation Index Architecture and Evaluation Model with RFID System

Article Preview

Abstract:

People pay more attention to the security of RFID, this paper establishes the evaluation index architecture of RFID security, Then according to these indexes for the evaluation of the RFID system security which based on fuzzy synthetic evaluation model, all of this is to evaluate the security of RFID system.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

399-404

Citation:

Online since:

November 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Schadschneider A, Klingsch W, Klüpfel H, et al. Encyclopedia of Complexity and System Science[J]. Berlin Heidelberg, New York, (2009).

Google Scholar

[2] Wu C G, Wang Y M, Tang Y M, et al. Variable fuzzy recognition model for the flood hazard evaluation based on set pair analysis[J]. J Northwest A&F Univ, 2012, 40(1): 221-226.

Google Scholar

[3] Zhang M, Yang Y Q. Performance Analysis of Automobile Friction Clutch Based on Entropy Fuzzy Comprehensive Evaluation[J]. Advanced Materials Research, 2012, 479: 2301-2304.

DOI: 10.4028/www.scientific.net/amr.479-481.2301

Google Scholar

[4] HUANG S, XIA H, TAN L. The Fuzzy Comprehensive Evaluation for Information Security[J]. Computer Technology and Development, 2010, 1: 048.

Google Scholar

[5] Anastassiou G A. Fuzzy mathematics: Approximation theory[M]. Springer, (2010).

Google Scholar

[6] Liu X, Pedrycz W. Axiomatic fuzzy set theory and its applications[M]. Springer, (2009).

Google Scholar

[7] Liu S, Proctor W, Cook D. Using an integrated fuzzy set and deliberative multi-criteria evaluation approach to facilitate decision-making in invasive species management[J]. Ecological Economics, 2010, 69(12): 2374-2382.

DOI: 10.1016/j.ecolecon.2010.07.004

Google Scholar