Determining and Implementing Successful Access Control Solutions

Scaglione, Bernard
January 2009
Security: Solutions for Enterprise Security Leaders;Jan2009, Vol. 46 Issue 1, p42
Trade Publication
The article discusses ways in determining and implementing successful access control solutions. It mentions that chief strategy officers (CSOs) have the responsibility to protect huge amounts of electronic and paper information. It states that security practitioners need to survey to determine if access control principles are integrated in their security program and should use the Crime Prevention through Environmental Design (CPTED).


Related Articles

  • Access control with added reserve.  // International Fire & Security Product News;Oct2004, Vol. 29 Issue 5, p4 

    Features the Bewator Entro access control system developed for organisations which require a high level of security but also need a user-friendly system. Advantage of using the reservation facility of the system; Applications of the system; Importance of the access control card.

  • Combining Biometrics with ESSO.  // Security: Solutions for Enterprise Security Leaders;Oct2006, Vol. 43 Issue 10, p46 

    The article presents the advantages of combining a biometrics with ESSO solution. A biometric-enabled ESSO solution matches each user by correlating against known set of references taking into account. The solution captures images at higher speeds resulting in less image blur distortion. The...

  • The fine art of patience. Ollman, Gunter // SC Magazine: For IT Security Professionals (UK Edition);Oct2004, p24 

    This article focuses on the advantages of an early security system testing. As businesses attempt to improve their development processes by accelerating their release schedules, there can often be a detrimental knock-on effect to the security of the application. Whether the application is...

  • A BELÉPTETŐ RENDSZEREK HELYE ÉS SZEREPE A VAGYONVÉDELEMBEN. Ákos, Bunyitai // Hadmérnök;dec2011, Vol. 6 Issue 4, p17 

    This short article is for investigate the access control system's functions in security. It gives a brief summary of the main definitions. Beyond the theoretical negotiation also includes practical support.

  • Requirements For Card-to-Exit. Deteinne, Scott // Security: Solutions for Enterprise Security Leaders;Jun2004, Vol. 41 Issue 6, p18 

    Reports on the evolution of code provisions to indirectly permit use of card-to-exit systems for access-controlled egress doors. Request by owners and managers of secured facilities for a card-to-exit system for select doors in an effort to monitor persons leaving the secured room; Unlocking of...

  • Consistency Adds to Access Effectiveness. Dingle, Jeffrey // Security: Solutions for Enterprise Security Leaders;Apr2008, Vol. 45 Issue 4, p52 

    The article reports on the implications of an access control system. Access control varies from specifically controlling access to assuring that people entering a facility do not have weapons or explosives. The U.S. government has developed an access control system that requires positive...

  • Top View: 'Intelligent' Dawn. DeFina, Frank // Security: Solutions for Enterprise Security Leaders;Jun2005, Vol. 42 Issue 6, p42 

    This article presents information on modern surveillance systems. The security industry is on the cusp of a new era in technology that will have a significant impact the way security systems will be designed, implemented and controlled. People believe that systems integration is one of the key...

  • Information Security: Vulnerabilities in DOE's Systems for Unclassified Civilian Research: AIMD-00-140.  // GAO Reports;6/9/2000, p1 

    Unclassified information systems for scientific research are not consistently protected at all Department of Energy (DOE) laboratories. Although some laboratories are taking significant steps to strengthen access controls, many systems remain vulnerable. In four recent cases, Internet attacks...

  • IMPROVED & EXTENDED-RBAC (JV-RBAC) MODEL WITH X.509 AUTHENTICATION. Joshi, Jyoti; Vaisla, Kunwar Singh // Computer Science & Engineering;Jun2012, Vol. 2 Issue 3, p57 

    Role-based access control models have attracted appreciable research interest in past time due to their providing some flexibility to security management and ability to model organizational structure and their capability to reduce administrative expenses. In this paper, we explains the drawbacks...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics