New Developments in BACnet Integration

Swan, Bill
May 2007
Heating/Piping/Air Conditioning Engineering;May2007, Vol. 79 Issue 5, p48
The article discusses developments in the Building Automation Control Network (BACnet) integration. In 2006, the BACnet Life-Safety and Security Working Group (LSS-WG) launched the Access Door object, the first of its physical-access-control extensions. In March 2007, more proposals from the LSS-WG were published. The LSS-WG was able to leverage work already done by the BACnet committee by building a physical-access-control application on the BACnet platform.


Related Articles

  • CENTRAL STATION SERVICES: Small Office 'Condo' Outsources Access Control Management. Engebretson, Joan // SDM: Security Distributing & Marketing;Aug2009, Vol. 39 Issue 8, p86 

    The article offers information on the access control management system of an office condominium in Nashville, Tennessee. The development company selected the SecureDoor managed access control offering from ADS Security, a Nashville-based security company. The system at the condominium office...

  • This month on HPAC.com.  // Heating/Piping/Air Conditioning Engineering;Sep2011, Vol. 83 Issue 9, p4 

    The article offers information on the Optimum Buildings Conference from September 21-23, 2011 at the Indiana Convention Center in Indianapolis.

  • Improving User Management in Networked Systems. Tumin, Sharil; Encheva, Sylvia // AIP Conference Proceedings;11/6/2008, Vol. 1060 Issue 1, p257 

    The presented model is intended to improve user management in networked systems. An automated addition or removal of users from roles simplifies maintaining their membership to appropriate groups. Group-role relations are used to facilitate users with an access control and permissions to...

  • 30 seconds on...  // SC Magazine: For IT Security Professionals (15476693);Sep2014, Vol. 25 Issue 9, p17 

    The article offers suggestions on maintaining computer security.

  • Information Technology. Isaac, Peter // Chartered Accountants Journal;Apr2007, Vol. 86 Issue 3, p72 

    The article focuses on the security of passwords used by banks. A research shows that part of security problems is the vulnerability of the digital memory of the computer to store such passwords. Thus, the Chartered Accountants are advised to remove the digitally stored passkey numbers and to...

  • PROVIDING A SAFE EXECUTION ENVIRONMENT. Brannock, Kirk; Dewan, Prashant; McKeen, Frank; Savagaonkar, Uday // Intel Technology Journal;Jun2009, Vol. 13 Issue 2, p36 

    Providing a safe execution environment for an application requires meeting a number of complex requirements. In today's connected computer environment, it is necessary to provide a trusted environment to a wide variety of applications. This article describes research on creating a secure...

  • Protecting Windows Registry Directory and Hence Increasing the Security Level of the Windows Operating System. Nasir, M. H. N. M.; Hassan, N. H.; Fauzi, S. S. M. // Information Technology Journal;2008, Vol. 7 Issue 6, p840 

    This study will point out the major windows registry security issues in windows-based platforms and explain how the development of an automated tool can enhance the security level and optimize the performance of the system by tuning the windows registry settings. This security tool named...

  • Comments Sought on BACnet Access Control Standard. Gager, Russ // SDM: Security Distributing & Marketing;May2007, Vol. 37 Issue 5, p18 

    The article reports that Rob Zivney, member of the board of the Security Industry Associaiton, is seeking for comments regarding BACnet access control standard. According to the author BACnet is a data communication protocol for building automation and control networks. Its standard is a set of...

  • Semantics-based Access Control Approach for Web Service. Zhengqiu He; Lifa Wu; Huabo Li; Haiguang Lai; Zheng Hong // Journal of Computers;Jun2011, Vol. 6 Issue 6, p1152 

    Due to the open and distributed characteristics of web service, its access control becomes a challenging problem which has not been addressed properly. In this paper, we show how semantic web technologies can be used to build a flexible access control system for web service. We follow the...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics