Headaches in Parking Lots, Garages

Dingle, Jeffrey
September 2006
Security: Solutions for Enterprise Security Leaders;Sep2006, Vol. 43 Issue 9, p90
Trade Publication
The article provides information on the different access control methods that can be utilized to guarantee security. An access card provides a good option but it has disadvantages because anybody holding the card can use it and it can also be lost or stolen. The keypad system is oftentimes used in apartments and its disadvantages include potential leakage of security codes from pizza delivery drivers or from friends. Radio Frequency Identification unit attached to a vehicle is also an option. INSET: Want to Stop a 15,000 Pound Truck Going 50 mph?.


Related Articles

  • ACCESS CONTROL: CHALLENGES AND APPROACHES IN THE INTERNET OF THINGS. Grummt, Eberhard; Müller, Markus; Ackermann, Ralf // Proceedings of the IADIS International Conference on WWW/Interne;Nov2007, p89 

    Information about physical items gathered using automatic identification (Auto-ID) technologies such as RFID is envisioned to be available anywhere, anytime using an "Internet of Things". Novel applications can be built on the ability to track and trace real-world objects. Since the required...

  • Outwitting Card Forgers. Blank, Eric // Security: Solutions for Enterprise Security Leaders;May2004, Vol. 41 Issue 5, p36 

    Reports on the risk and potential liabilities of radio frequency identification technologies for card forgers. Aid of the technologies to security management of companies; Need for security to constantly look to more advance methods to protect companies, employees and customers; Offer of a...

  • Combo Those Cards. Blank, Eric // Security: Solutions for Enterprise Security Leaders;Feb2005, Vol. 42 Issue 2, p28 

    Focuses on combining radio frequency identification-enabled plastic cards with advanced card printing and manufacturing techniques for additional security in multiple operations. Addition of hidden patterns and information printed on the surface of a card for another level of security to assess...

  • FYI on RFID. Menzel, John // Security: Solutions for Enterprise Security Leaders;Sep2005, Vol. 42 Issue 9, p34 

    Presents a background on radio frequency identification (RFID) systems. Capability of incorporating the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to uniquely identify an object, animal or person; Main components of an RFID...

  • The Uproar Over RFID. Mandelblit, Bruce // Security: Solutions for Enterprise Security Leaders;May2004, Vol. 41 Issue 5, p38 

    Reports on the debate about radio frequency identification (RFID). Rapid growth of the technology in the security systems form card access to asset tracking; Benefits of the technology for manufacturers and retailers; Reliance of RFID on miniature and relatively inexpensive microchips.

  • Security Analyses for the Passive RFID Systems Deployed by HJM Model Tree. Xu Huang // International MultiConference of Engineers & Computer Scientists;2007, p1311 

    It is well known that the interest rate models discussed in the areas of "interest rate derivatives", such as standard market models, models of the short rate and some advanced models to predict the options, futures and other derivatives in the marketing, which will be first introduced in the...

  • Hash-based RFID Mutual Authentication Protocol. Liu Yang; Peng Yu; Wang Bailing; Qu Yun; Bai Xuefeng; Yuan Xinling; Yin zelong // International Journal of Security & Its Applications;May2013, Vol. 7 Issue 3, p183 

    With the development and application of RFID technology in Internet of Things (IOT), RFID system plays a more and more important role on privacy protection and information security of users. For the safety need of RFID system and the existing shortage of secure authentication protocols, we offer...

  • RFID: Dynamic Surveillance Approach. Singh, Indraveer; Patil, Harshawardhan // International Journal of Computer Science Issues (IJCSI);Jul2010, Vol. 7 Issue 4, p24 

    Most of the modern security and monitoring domain is based upon Camera based Surveillance Architecture. Prison cells, corporate offices, government buildings, stock market, supermarkets etc all the seats utilize this structure in core. Most CCTV systems are used for surveillance which can...

  • Trucks to Get ID Cards?  // Security: Solutions for Enterprise Security Leaders;Sep2005, Vol. 42 Issue 9, p30 

    Reports that Bob Cool, a Georgia Southern University professor is developing a nationwide system based on radio frequency identification (RFID) devices at truck weigh stations and law enforcement vehicles to gather information for a national truck tracking center; Existing RFID applications;...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics