DOI QR코드

DOI QR Code

Universal Description of Access Control Systems

  • 투고 : 2024.08.05
  • 발행 : 2024.08.30

초록

Access control systems are used to control the access of people to assets. In practice, assets are either tangible (e.g. goods, cash, etc.) or data. In order to handle tangible assets, a person must physically access the space in which the assets are located (e.g. a room or a building). Access control systems for this case have been known since antiquity and are based either on mechanical locks or on certificates. In the middle of the 20th century, systems based on electromagnetic phenomena appeared. In the second half of the same century, the need to control access to data also arose. And since data can also be accessed via a computer network, it was necessary to control not only the access of persons to areas with data storage, but also to control the electronic communication of persons with these storage facilities. The different types of the above systems have developed separately and more or less independently. This paper provides an overview of the current status of different types of systems, showing that these systems are converging technologically based on the use of electronics, computing and computer communication. Furthermore, the terminology and architecture of these systems is expanded in the article to allow a unified description of these systems. The article also describes the most common types of access control system configurations.

키워드

참고문헌

  1. GARCIA, M. L. The design and evaluation of physical protection systems. 2. Amsterdam: Butterworth-Heinemann, 2008. ISBN 978-0-7506-8352-4.
  2. FERRAIOLO, H. et al. Guidelines for the Use of PIV Credentials in Facility Access. Gaithersburg: National Institute of Standards and Technology, 2008.
  3. International Electrotechnical Commission. IEC 60839-11-1, Alarm and electronic security systems - Part 11-1: Electronic access control systems - System and components requirements. International Electrotechnical Commission, Geneva 2013.
  4. International Electrotechnical Commission. ISO/IEC 10181-3, Information technology -- Open Systems Interconnection -- Security frameworks for open systems: Access controlframework. Geneva, 1998.
  5. ISO. ISO 7498-2:1989, Information processing systems -Open Systems Interconnection - Basic Reference Model - Part 2: Security Architecture. Geneva, 1989.
  6. SHIREY, R. RFC 4949, Internet Security Glossary, Version 2. Fremont: Internet Engineering Task Force, 2007. Available at: https://datatracker.ietf.org/doc/html/rfc4949.
  7. LE GUET TULLY, F. Science and the Design of Mechanical and Optical Devices: A Few Case Studies. In: DE VRIES, M. J.; CROSS, N. and GRANT, D. P. Design Methodology and Relationships with Science: Introduction. Eindhoven: Kluwer Academic Publishers, 1993, pp. 29-61. ISBNa978-90-481-4252-1. Available at: https://doi.org/10.1007/978-94-015-8220-9.
  8. Mechanics of The World's Oldest Lock, From Ancient - Ancient Egyptian Door Lock. Online. In: Clipartmax. Available at: https://www.clipartmax.com/middle/m2H7i8G6K9H7G6H7_mechanics-of-the-worlds-oldest-lock-from-ancientancient-egyptian-door-lock/.
  9. MANGION, N. The Passport Throughout History - The Evolution of a Document. Online. In: Investment Migration Insider. IMI. 2020. Available at: https://www.imidaily.com/editors-picks/the-passportthroughout-history-the-evolution-of-a-document/.
  10. AMIN, U. S. M. Arabic papyrus with an exit permit. Online. In: Wikipedia. 2019. Available at: https://commons.wikimedia.org/wiki/File:Arabic_papyrus_with_an_exit_permit,_dated_January_24,_722_CE,_pointing_to_the_regulation_of_travel_activities._From_Hermopolis_Magna,_Egypt.jpg.
  11. ENIKEIEFF, O.; WEST, W. and DYE, D. Electronic identification system employing a data bearing identification card (USA). US3221304A. Available at: https://patents.google.com/patent/US3221304A/en.
  12. BOWERS, D. M. Access control and personal identification systems. Boston: Butterworth Publishers, 1988. ISBN 0-409-90083-4.
  13. FOWLER, M. ANSI/BHMA A156.25-2023: Electrified Locking Devices. In: ANSI. ANSI blog. 2018. Available at: https://blog.ansi.org/ansi-bhma-a156-25-2023-electrifiedlocking-devices/.
  14. GATE MOTORS. Let's find the perfect Access Control System Installation companies in your local area. Gate Motors. Available at: https://libsa.co.za/access-controlsystem/.
  15. MAGUIRE, M. The birth of biometric security. Anthropology Today. 2009, Vol. 25, No. 2, pp. 9-14. ISSN 0268540X.
  16. WHITNEY, L. How to Set Up and Use Face ID on Your iPhone. PCmag. 2022. ISSN 2373-2830. Available at: https://www.pcmag.com/how-to/set-up-use-face-id-iphone.
  17. TAYLOR, G. Flawed Laptop Fingerprint Readers Make Your Windows Password Vulnerable to Hackers. In: Wonder How To. Available at: https://null-byte.wonderhowto.com/news/flawed-laptopfingerprint-readers-make-your-windows-passwordvulnerable-hackers-0139037/.
  18. IDEMIA. MorphoWave XP: Contactless fingerprint terminal with extended performance. Available at: https://www.idemia.com/wpcontent/uploads/2022/01/morphowave-xp-idemia-brochure202201.pdf.
  19. Half euro lock cylinder (Wilka). In: GRABCAD. GrabCAD. Available at: https://grabcad.com/library/half-euro-lockcylinder-wilka-1.
  20. ASSA ABLOY. Access Control and Net-Ctrl Educate Bett Show on Aperio. The Locksmith Magazine. 2016. Available at: https://www.locksmithjournal.co.uk/assa-abloy-accesscontrol-net-ctrl-educate-bett-show-aperio.
  21. SALTO. Product brochure. SALTO Systems, 2014. Available at: https://www.masterkey.pl/files/starter/SALTO-PRODUCT-CATALOGUEENG_2015.pdf.
  22. Automated Border Control. Secunet Security Networks. Available at: https://www.secunet.com/fileadmin/user_upload/02_Downloads/Produkt-_und_Serviceseiten_Brosch%C3%BCren_und_Factsheets/easygate/secunet_easygate_Factsheet_EN.pdf.
  23. LOPEZ, M. Nueva herramienta para ingresar a Estados Unidos mas rapido. Cuba en miami. 2024. Available at: https://www.cubaenmiami.com/nueva-herramienta-paraingresar-a-estados-unidos-mas-rapido/.
  24. ROSSLARE. AxTraxPro: The All-purpose Access Control Managementa Software. Available at: https://rosslaresecurity.com/wpcontent/uploads/2023/12/AxTraxPro-brochure-updV009.pdf.
  25. NetAXS-123: Stand-alone, modular, web-enabled access control system. Dubai: Honeywell Security Group, 2014. Available at: https://prodedam.honeywell.com/content/dam/honeywell-edam/hbt/enus/documents/literature-and-specs/datasheets/HAS-NA123- ME-DS-E%2520pdf.pdf.
  26. SHEPPARD, S. Wiegand? Farpointe Data, 2018. Available at: https://www.farpointedata.com/downloads/pr/Understanding_Wiegand.pdf.
  27. SHEPPARD, S. The Power of an OPEN PROTOCOL. Security Sales & Integration. 2021, Vol. 43, No. 4, pp. 5. ISSNa1539-0071. Available at: https://www.farpointedata.com/downloads/pr/The_Power_of_an_Open_Protocol.pdf.
  28. IDEMIA. SIGMA Extreme Series: Quick User Guide. 2022. Available at: https://biometricdevices.idemia.com/sfc/servlet.shepherd/document/download/0690X00000DpySZQAZ.
  29. EAccess Product Book. Solothurn, Schweiz: Glutz. Available at: https://media1-glutz.myassets.ch/A/glutz/82549.
  30. RIGNEY, C. et al., RFC 2865, Remote Authentication Dial InaUseraServicea(RADIUS). 2000. Available at: https://datatracker.ietf.org/doc/html/rfc2865.
  31. RECORDON, D. and REED, D. OpenID 2.0: a platform for user-centric identity management. DIM '06: Proceedings of the second ACM workshop on Digital identity management. 2006, pp. 11-16.
  32. WIERENGA, K. and FLORIO, L. Eduroam: past, present and future. Computational Methods in Science and Technology. 2005, Vol. 11(2), pp. 5. ISSN 1505-0602.
  33. D. He, C. Chen, J. Bu, S. Chan and Y. Zhang. Security and efficiency in roaming services for wireless networks: challenges, approaches, and prospects. IEEE Communications Magazine, Vol. 51, No. 2, pp. 142-150, February 2013.