TITLE

Under the Wire

PUB. DATE
March 2007
SOURCE
Security: Solutions for Enterprise Security Leaders;Mar2007, Vol. 44 Issue 3, p54
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article reports on a trend in which universities adopt wireless access control and electronic security systems with smart cards. Wireless systems eliminate the need to run miles of conduit and to install multiple power supplies. Biometric identification is a technology that will expand in use among enterprises. Vendors include PEI Systems Inc. and Sonitrol.
ACCESSION #
24529629

 

Related Articles

  • Accessing the Old College Try.  // Security: Solutions for Enterprise Security Leaders;Mar2007, Vol. 44 Issue 3, p48 

    The article discusses the installation and implementation of electronic access control and smart card technologies at Bryn Mawr College, Pennsylvania. King of Prussia-based Pabec Systems conducted the installation work. The system addresses visual identification needs in three libraries,...

  • Program Grows at Columbus State University.  // Security: Solutions for Enterprise Security Leaders;Mar2007, Vol. 44 Issue 3, p62 

    The article discusses the installation and implementation of an identification smart-card electronic security system at Columbus, Georgia-based Columbus State University under the leadership of campus recreation director Rick Cravens. The system features access control, connection to a student...

  • Tailor to the Application and Organization.  // SDM: Security Distributing & Marketing;Aug2003, Vol. 33 Issue 8, p52 

    Focuses on the ways of using biometrics to verify the identity of an individual. Biometric access with single door control; Use of Smart card systems to leverage the secure data storage; Integration of biometrics into conventional access control systems.

  • Are Smart Cards a No-Brainer? Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Jun2010, Vol. 47 Issue 6, p56 

    The article discusses the significance of smart cards which help enhance security systems implemented by business organizations in the U.S. It highlights the increasing acceptance of smart card use in companies and educational institutions in the country due to its capability of easily...

  • SECURITY WATCH. LORENZI, NEAL // Health Facilities Management;Jan2014, Vol. 27 Issue 1, p31 

    The article reports on innovations for increased safety and security in healthcare facility operations as of January 2014. It states that two access control trends include multipurpose smart cards for providing access control, identification, and time and attendance functionality, and systems...

  • Reading the Future. Hodgson, Karyn // SDM: Security Distributing & Marketing;Jun2013, Vol. 43 Issue 6, p75 

    The article presents information on several developments related reader technologies. It is stated that near field communications (NFC) has a great potential to change the access control card and reader market in the future. North Carolina-based firm Strategic Security Solutions is installing...

  • Single round-trip SIP authentication scheme with provable security for Voice over Internet Protocol using smart card. Kumari, Saru; Wu, Fan; Li, Xiong; Farash, Mohammad; Jiang, Qi; Khan, Muhammad; Das, Ashok // Multimedia Tools & Applications;Dec2016, Vol. 75 Issue 24, p17215 

    In recent years, Voice over Internet Protocol (VoIP) has gained more and more popularity as an application of the Internet technology. For various IP applications including VoIP, the topic of Session Initiation Protocol (SIP) has attracted major concern from researchers. SIP is an advanced...

  • A Secure and Efficient User Anonymity-Preserving Three-Factor Authentication Protocol for Large-Scale Distributed Wireless Sensor Networks. Das, Ashok // Wireless Personal Communications;Jun2015, Vol. 82 Issue 3, p1377 

    Critical applications in wireless sensor network (WSN) are real-time based applications. Therefore, users are generally interested in accessing real-time information. This is possible, if the users (called the external parties) are allowed to access the real-time data directly from the sensor...

  • Educational Institutions and Secure BYOD Environments. Bulman, Louise // Credit Control;2014, Vol. 35 Issue 3/4, p81 

    Universities were the first enterprises to take on Bring Your Own Device (BYOD) security challenges as these organizations support university-managed systems, as well as a diverse range of unmanaged student devices. By their very nature, education networks are more open and susceptible to...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics