'Platforming' Togetherness

February 2009
Security: Solutions for Enterprise Security Leaders;Feb2009, Vol. 46 Issue 2, p26
Trade Publication
The article discusses the access control security system designed by security experts Donald Sullivan and James Hofbauer. The access control system, installed at Flower Hospital, helps surgeons to get easy and speedy entry into the surgery room in critical situations. Another example is that of Toledo Hospital campus' 145-space physical parking lot. Earlier, physicians were supposed to swipe their identity cards to access entry, however, now they have transponders that allow a quicker entry.


Related Articles

  • Two Months to PIV II. Fickes, Michael // Government Security;Aug2006, Vol. 5 Issue 6, p22 

    The article reports on the smart card ID and access control system used by the members of the federal agencies. The new technology is being tested at different kinds of sites, doors, gates and computers. The Department of Defense is one of the federal departments and agencies that have been...

  • Optical Turnstiles as a Portal. Bordes, Roy N. // Security: Solutions for Enterprise Security Leaders;Aug2005, Vol. 42 Issue 8, p24 

    Focuses on the development of optical turnstile systems. Ability of the system to utilize the technology in a variety of applications; Availability of optical turnstile with retractable glass barriers; Importance of the system's development for security management. INSET: Entrance Technology...

  • Technology Assessment: Using Biometrics for Border Security: GAO-03-174.  // GAO Reports;11/14/2002, p1 

    As directed in the Fiscal Year 2002 Legislative Branch Appropriations Conference Report and subsequent support letters from interested members of Congress, GAO conducted a pilot program in technology assessment that examined the use of biometric technologies for border control. Biometric...

  • No Lulls in the Convergence Conversation. Hodgson, Karyn // SDM: Security Distributing & Marketing;Dec2012, Vol. 42 Issue 12, p61 

    The article focuses on the aspects and security challenges of convergence of physical and logical access control. It states that some of the greatest challenges of convergence for information technology (IT) and physical security integrators centers on policy and procedures and do not involve...

  • Controlling Entry Systems.  // SDM: Security Distributing & Marketing;Jul2005, Vol. 35 Issue 7, p37 

    The article presents a quiz related to topics on controlling entry systems. Controlling entry into apartment complexes and parking facilities is a good application of access control equipment. Frequently, the same equipment used to control access to internal doors can be expanded to these...

  • A Purpose Based Usage Access Control Model. Lili Sun; Hua Wang // International Journal of Computer & Information Engineering;Jan2010, Vol. 4 Issue 1, p44 

    As privacy becomes a major concern for consumers and enterprises, many research have been focused on the privacy protecting technology in recent years. In this paper, we present a comprehensive approach for usage access control based on the notion purpose. In our model, purpose information...

  • Asset management, Tracking Are Access Issues.  // Security: Solutions for Enterprise Security Leaders;Jul2000, Vol. 37 Issue 7, p27 

    Focuses on the growth of interest in asset management and tracking systems. Different forms and approaches to the integration of asset tracking and access control; Convergence of information technology and security management; Increase in the rise of laptop thefts; Three top drivers for asset...

  • Wireless Access Saves County Time, Money, and Peace of Mind.  // SDM: Security Distributing & Marketing;Apr2004, Vol. 34 Issue 4, p26 

    Discusses the assessment by the Clara County Board of its security practices after the September 11, 2001 terrorist attacks. Need for updating the access control to a single system in buildings; Use of a single card technology; Suggestion to increase the number of areas to be controlled.

  • Clarity or Conspiracy? Heiser, Jay G. // Information Security;Oct2006, Vol. 9 Issue 10, p20 

    The article focuses on the limited knowledge of information security professionals about information risk and security. It contends that building a technical infrastructure to control external attacks is a challenge for the industry. It suggests that a comfortable level of technical control over...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics