applications from completely different domains use similar high-level concepts which
are natively supported by ID-Services. An issue that has not been addressed so far is
security and privacy. Some applications will require ways to protect data that is stored
on the transponders or prevent that data which is stored on the mobile device or the
network is being accessed by non-authorized users [16]. The further development of
ID-Services will also focus on this issue, as well as the ability to allow a seamless
integration into existing mobile (business) processes which will be a part of the High
Level Concepts Layer.
References
1. ABI Research: “Near Field Communication (NFC): Leveraging Contactless for Mobile
Payments, Content and Access”, 2007
2. ABI research: RFID Annual Market Overview, 2007, http://
www.abiresearch.com/products/ market_research/RFID_Annual_Market_Overview
3. Ambler, W.S.; Mapping Objects to Relational Databases: O/R Mapping In Detail, 2006,
http://www.agiledata.org/essays/mappingObjects.html
4. Anshel, M. & Levitan, S. Reducing medical errors using secure RFID technology SIGCSE
Bull., ACM, 2007, 39, 157-159
5. Burnell, J. What Is RFID Middleware and Where Is It Needed? RFIDupdate.com, 2006
6. Chen, N.; Chang, T.; Chen, J.; Wu, C. & Tzeng, H. Reliable ALE Middleware for RFID
Network Applications CSREA EEE, 2007, 183-189
7. Dabkowski, A. XML-Based Middleware for Mobile Systems Berliner XML Tage, 2003,
432-438
8. Dortch, M., Aberdeen Group, Inc.: "Winning RFID Strategies for 2008", 2008,
http://www.aberdeen.com/summary/report/benchmark/4205-RA-winning-rfid-strats.asp
9. EPCglobal, "The Application Level Events (ALE) Specification, Version 1.0," Specifica-
tion, February 8, 2005
10. Finkenzeller, K. RFID Handbook: Fundamentals and Applications in Contactless Smart
Cards and Identification John Wiley & Sons, Inc., 2003
11. Floerkemeier, C. & Lampe, M. RFID middleware design - addressing both application
needs and RFID constraints GI Jahrestagung (1), 2005, 277-281
12. Hölzle, U. & Ungar, D. Reconciling responsiveness with performance in pure object-
oriented languages ACM Trans. Program. Lang. Syst., ACM, 1996, 18, 355-400
13. Jeffery, S.R.; Alonso, G.; Franklin, M.J.; Hong, W.; Widom, J. Virtual devices: an extensi-
ble architecture for bridging the physical-digital divide. Tech. Rep. UCB-CS-05-1375, UC
Berkeley CS Division, 2005
14. Kim, Y.; Moon, M. & Yeom, K. A Framework for Rapid Development of RFID Applica-
tions Computational Science and Its Applications - ICCSA 2006, 2006, 226-235
15. Kindberg, T. Implementing physical hyperlinks using ubiquitous identifier resolution
WWW '02: Proceedings of the 11th international conference on World Wide Web, ACM,
2002, 191-199
16. Konidala, D. & Kim, K. Mobile RFID Applications and Security Challenges Information
Security and Cryptology ICISC 2006, 2006, 194-205
17. Leaver, S. C.; Mendelsohn, T.; Spivey Overby, C. & Yuen, E. H. Evaluating RFID Mid-
dleware Forrester Research, Inc., 2004
18. Legner, C. & Thiesse, F. RFID-Based Facility Maintenance at Frankfurt Airport IEEE
Pervasive Computing, IEEE Computer Society, 2006, 5, 34-39
30