pm#process_supporting_the_security_of_some_RFID_reader
  exclusion:  pm#process_supporting_the_security_of_some_RFID_tag  pm#process_supporting_the_security_of_some_RFID_related_network  pm#process_supporting_the_security_of_some_RFID_related_application
  supertype:  pm#process_supporting_the_security_of_some_RFID_element
  object:  bridge#RFID_reader [49..*,49..*] (pm)
  subtype:  bridge#process_supporting_authentication_in_some_RFID_reader__id_req_rea_1___RC3  Mechanisms must be in place for an RFID reader to authenticate its identity and function, to tags and network components
  subtype:  bridge#process_supporting_the_access_control_of_some_RFID_reader__id_req_rea_6  The reader must implement access control on any interfaces that allow the modification of reader operation or access to internal information.
     subtype:  bridge#process_forbidding_corrupted_or_fake_readers_to_access_internal_business__RC2
  subtype:  bridge#process_supporting_the_integrity_of_information_in/from_some_RFID_reader__id_req_rea_7___R12__r12  Injection of data from readers needs to be controlled in order to avoid the data corruption with false information.
     subtype:  bridge#process_permitting_RFID_reader_to_read_and_correctly_transmit_tag_information__RI3
     subtype:  bridge#process_protecting_companies_internal_systems_from_attacks_by_corrupted_malicious_or_fake_RFID_readers__RI1
     subtype:  bridge#process_preventing_an_RFID_reader_to_allow_injection_attacks_from_malicious_tag_data__RO3
     subtype:  bridge#process_preventing_a_compromised_RFID_reader_to_provide_means_to_attack_other_IT_systems__RO2
  subtype:  bridge#process_supporting_the_confidentiality_of_communication_with_a_RFID_reader__id_req_rea_2
     subtype:  bridge#process_permitting_an_RFID_reader_to_identify_in_which_way_the_tag_information_is_encoded_and_to_implement_different_protocols_simultaneously__id_req_rea_2
     subtype:  bridge#process_forbidding_corrupted_readers_to_eavesdrop_on_tag_events__RC1
  subtype:  bridge#process_supporting_the_privacy_of_information_in_some_RFID_reader
     subtype:  bridge#identification_or_use_by_a_RFID_reader_of_the_right_password_or_shared_secret_for_communications__id_req_rea_4a  The reader must be able to identify which secret should be applied to encoded information. The right password or shared secret should be provided to the right reader with secure communication.
     subtype:  bridge#secure_storage_of_the_secret_information_by_a_RFID_reader__id_req_rea_4b  The secret information required to decode the tag must be maintained in a secure memory part of the reader. A secret can not be disclosed to the wrong application, user or reader owner.
  subtype:  bridge#process_supporting_interoperability_from/to_some_RFID_reader
     subtype:  bridge#process_supporting_the_compliance_of_some_RFID_reader_with_some_reading_policy__id_req_rea_8a  It is mandatory to provide a mechanism to guarantee that the RFID reader complies with a specific reading policy in support of fair information practice principles.
     subtype:  bridge#process_permitting_a_secure_RFID_reader_to_operate_with_secure_and_insecure_RFID_tags__id_req_rea_8b___RO1  Secure reader should be able to operate with secure and insecure RFID tags.

No statement uses or specializes pm#process_supporting_the_security_of_some_RFID_reader; click here to add one.


Another search (with same display options)?