Tham khảo tài liệu 'designing and deploying rfid applications part 9', kỹ thuật - công nghệ, cơ khí - chế tạo máy phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả | 228 Designing and Deploying RFID Applications compromising security if only symmetric cryptosystem is used without any provisions made in terms of a secure server s communication setup. Hargraves and Shafer 2004 suggested that identifiability observe-ability and link-ability of RFID tags with associated data should be minimised and the RFID system should be developed with authorisation authentication and encryption on a routine basis to ensure trustworthiness of the RFID system. In VeriSign 2008 an innovative way to minimise the sharing of information is by applying distributed network architecture. This type of networked RFID system ensures that partners only store their serialised information about each product in a database and this information is only accessible to authenticated and trusted partners. Another approach will be to apply policies Garfinkel et al. 2005 . Garfinkel et al. 2005 emphasise the need for guidelines which require human and technology intervention and the need to educate humans in accessing RFID technology and facilitate understandings of how privacy threat can be handled. Fig. 2. RFID Privacy Concerns Categorisation In the seven-layer trust framework Mahinderjit-Singh Li 2009 both security and privacy are integrated in the first 5 layers. The trust framework could be applied to maintain an RFID system which is able to handle security threats without compromising privacy effects. Layer 2 - privacy looks into time and locality factors which are related to the privacy of data and location. Mahinderjit-Singh and Li 2009 argued that the privacy component is necessary to support the handling of cloning attacks because tracking of tags is an essential step towards cloning-detection and this may compromise a partner s privacy. Thus this layer is to ensure the privacy protection while dealing with cloning attacks. We also believe Security Control and Privacy Preservation in RFID enabled Wine Supply Chain 229 trust management is the key for the .