TITLE

Being in control

AUTHOR(S)
Lewis, Janine
PUB. DATE
December 2007
SOURCE
Management Services;Winter2007, Vol. 51 Issue 4, p40
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
The article explains an access control system. An access control system forms part of an organisation's security requirements. There are different technologies employed within the systems on the market, from swipe cards to keypads, proximity and biometric systems. But there is a whole new breed of access control systems that have been designed to cater for a much wider range of functions. When combined with vehicular gates and barriers, for instance, an access control system is not just able to control who enters and leaves a car park, but brings to bear some very clever parking solutions without the need for a custom built design. In the case of parking bays, using an access control system, organisations can limit the number of vehicles in a lot.
ACCESSION #
28067452

 

Related Articles

  • Biometrics as a Convenience. Capoor, Sapna // Security: Solutions for Enterprise Security Leaders;Dec2006, Vol. 43 Issue 12, p48 

    The article focuses on the implementation and adoption of fingerprint-enabled biometric solutions in the business world. It specifically highlights the use of biometrics solutions for physical access control and PCI network security applications in the business. Voice verification biometric...

  • Keyscan Inc.  // Security: Solutions for Enterprise Security Leaders;Oct2009 Supplement, p4 

    The article presents a corporate profile for Whitby, Ontario-based Keyscan Access Control Systems. The company provides a complete access control solution that meets the needs of customers. Its products include System VII Access Control Management Software, DSC software module for integration...

  • Intelligent High-Security Access Control. Gams, Matjaž; Tušar, Tea // Informatica (03505596);Dec2007, Vol. 31 Issue 4, p469 

    Access control is an important security issue in particular because of terrorist threats. Access points are increasingly becoming equipped with advanced input sensors often based on biometrics, and with advanced intelligent methods that learn from experience. We have designed a flexible modular...

  • Get the Upper Hand After-hours.  // Security: Solutions for Enterprise Security Leaders;Sep2004, Vol. 41 Issue 9, p26 

    Reports on the after-hours access control system at Mountain View High Scholl in Meridian, Idaho. Use of a biometric hand reader that simplifies the credentials management and ensures that only authorized individuals can enter the building; Sensitivity and precession of the biometric access...

  • PLANT SECURITY: Who Needs a PC?  // Security: Solutions for Enterprise Security Leaders;Feb2005, Vol. 42 Issue 2, p30 

    Features the USB finger-scan devices and relays for access control from Count Me In LLC, a biometrics manufacturer based in Mount Prospect, Illinois. Elimination of the expense of installing a computer biometrics terminal at each doorway; Utilization of the Ethernet infrastructure in place at...

  • Maximum Performance: For Biometric Readers, Image is Everything.  // SDM: Security Distributing & Marketing;Jan2008, Vol. 38 Issue 1, p93 

    The article focuses on the physical and performance related challenges facing biometrics as they grow in the access control arena. It is noted that biometric readers are challenged physically by weather conditions. When it comes to physical performance, biometrics is about capturing image more...

  • Combining Biometrics with ESSO.  // Security: Solutions for Enterprise Security Leaders;Oct2006, Vol. 43 Issue 10, p46 

    The article presents the advantages of combining a biometrics with ESSO solution. A biometric-enabled ESSO solution matches each user by correlating against known set of references taking into account. The solution captures images at higher speeds resulting in less image blur distortion. The...

  • Evaluation of Electrocardiogram for Biometric Authentication. Singh, Yogendra Narain; Singh, S. K. // Journal of Information Security;Jan2012, Vol. 3 Issue 1, p39 

    This paper presents an evaluation of a new biometric electrocardiogram (ECG) for individual authentication. We report the potential of ECG as a biometric and address the research concerns to use ECG-enabled biometric authentication system across a range of conditions. We present a method to...

  • Applying Biometrics. Spence, Bill; Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Sep2002, Vol. 39 Issue 7, p28 

    Part II. Looks at the practical side of where biometrics fit into access control systems. Applications of the biometric technology; Monitoring of all doors by an access control system; Gathering of credential against which future access attempts are compared; Storing of templates in the...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sign out of this library

Other Topics