Privacy for RFID-enabled Distributed Applications - Design Notes

The concern of this paper is RFID systems coupled with distributed applications. We do not treat known RFID attacks, we rather focus on the best way to protect the identity mapping, i.e. the association of a tag identifier, which can be obtained or deduced from the tags or communications including the tags, and the real identity of its carrier. We rely on a common use case of a distributed application and a modelling approach.