Application and Efficacy of Access Control Systems – Report Example

Download full paperFile format: .doc, available for editing

The paper "Application and Efficacy of Access Control Systems " is a perfect example of a report on information technology.   Asset security is quite pivotal in any area of the business, institution, or even at homesteads and other points or places where the human property is subject to intrusion, theft, or destruction. Measures to curtail any possible mishap in an area with security concerns are indeed imperative before or after the establishment of a property. This can be individual property, an organizational holding, company assets, or a community property. Security issues are not only essential in these cases but also very necessary. Access control systems help in putting a check on those who use, reach, and control a property that belongs to someone or a group of people with shared benefits and concerns.

To enhance tight security measures, a number of ACS devices have been advanced for purposes of improving on security issues. Some of these devices include; electrical locks with integrated alarms, barriers, biometric readers, ancillaries, and credentials. They can either be external or internal access controllers. The use of biometric systems is based on who accesses a system.

It identifies physical traits such as one’ s fingerprints, face, veins, or irises and behavior types e. g. handwriting or the rhythm of typing and/or voice projection and characteristics. Some of these appliances or access control devices are not much effective and their uses are subject to other control issues. Some can be and have been vulnerable to extreme weather situations and destruction or unauthorized access by intruders due to failure in their functionality. Their effectiveness and harnessed security improvement are nonetheless indubitable. Their efficacy has actually produced more benefits than side effects.

Many of these ACS devices have different operational mechanisms based on scientific applications. Their computerization or automation has led to increased security checks and reduced human labor and/or cost. However, they are prone to mechanical faults and failures making their efficacy stand a ground test hence the need to enhance their operative mechanisms to increase security. OPERATION PRINCIPLES, MECHANISMS, AND APPLICATION OF THE ACCESS CONTROL SYSTEM DEVICES Biometric reader systems store basic information of the authorized user(s) on their first use of the systems. This is called system enrollment.

The information recorded includes names or identification numbers, images, or user’ s specific traits that are synthesized and translated into a graph or a code.    


2870 of Lecture Notes in Computer Science. Springer


Addison Wesley. Ellison, C. M.; Frantz, B.; Lampson, B.; Rivest, R. L.; Thomas, B. M.; and Ylonen, T. 1999a. Simple public key certificate˜cme/html/spki.html.

Ankolekar, A.; Burstein, M. H.; Hobbs, J. R.; Lassila,O.; Martin, D.; McDermott, D. V.; McIlraith, S. A.;Narayanan, S.; Paolucci, M.; Payne, T. R.; and Sycara, K. (2002). web service description for the semantic web. 1st international semantic web conference sardinia , 34b-363.

Berners-Lee, T.; Hendler, J.; and Lassila, O. (2001). the semantic web. scientific American .

Biskup J., & Wortman, S. (2003). Towards a credential Based Implementation of Compound access control policies. Dortmund: university of dortmund press.

Biskup J., & Wortman, S. (2003). Towards a credential Based Implementation of Compound access control policies. Dortmund: university of dortmund press.

Biskup, J., and Karabulut, Y. . (2002). A hybrid PKI model with an application for secure mediation. working conference on data and Application Security , IFIP WG 11.3.

Brands, S. 2000. Rethinking Public Key Infrastructures and Digital Certificates. MIT Press, Cambridge-London. Burstein,

C. R. Landau (1989.). Security in a Secure Capability-Based System.

Operating Systems Review, pages 2-4,

Chaum, D. 1985. Security without identification: transaction systems to make big brother obsolete. In Communications of the ACM 28, volume 10, 1030–1044. ACM

Clarke, D. E.; Elien, J.-E.; Ellison, C. M.; Fredette, M.; Morcos, A.; and Rivest, R. L. 2001. Certificate chain discovery in SPKI/SDSI. Journal of Computer Security

Conference, volume 2870 of Lecture Notes in Computer Science. Springer

Denker, G.; Kagal, L.; Finin, T.; Sycara, K.; and Paoucci, M. 2003. Security for daml web services: Annotation and matchmaking. In Second International Semantic Web

Denning, D. E. 1982. Cryptography and Data Security.

Design (FOSAD), volume 2171 of Lecture Notes in Computer Science, 137–196. FOSAD 2000, Bertinoro, Italy

Ellison, C. M.; Frantz, B.; Lampson, B.; Rivest, R. L.; Thomas, B. M.; and Ylonen, T. 1999b. SPKI certificate theory. Internet RFC 2693

Fensel, D.; Hendler, J.; Lieberman, H.; and Wahlster, W., Eds. 2002. Spinning the Semantic Web. MIT Press˜cis/sdsi.html.

J. Liedtke (1992). Clans and Chiefs. In Architectural von Rechensystemen. Springer-Verlag,

Jahrestagung der Gesellschaft f¨ur Informatik, volume P-19 of Lecture Notes in Informatics, 114–119. German Informatics Society (GI), Dortmund, Germany. ws/

K. Loepere. Mach 3 Kernel Interfaces. Open Software Foundation and Carnegie Mellon University, Nov. 1992.

Kagal, L.; Finin, T.; and Joshi, A. 2003. A policy based approach to security for the semantic web. In 2nd International Semantic Web Conference (ISWC2003), volume

Lecture Notes in Computer Science, 16–29. Springer

M.; Denker, G.; Hobbs, J.; Kagal, L.; Lassila, O.; Martin, D.; McDermott, D.; McIlraith, S.; Narayanan, S.; Paolucci, M.; Parsia, B.; Payne, T.; Sirin, E.; Srinivasan, N.; and ycara, K. 2003. Damls: Semantic markup for web services, version 0.9. Technical report, DAML-S Services Coalition.

Naur, P. 1960. Revised report on the algorithmic language algol 60. In ISWC2002: Ist International Semantic Web Conference, Sardinia, Italy, volume 3 of Communications

of the ACM, 299–314. ACM

P. A. Karger and A. J. Herbert. An Augmented Capability Architecture to Support Lattice Security and Traceability of Access. In Proceedings of the 1984 IEEE Symposium on Security and Privacy, pages 2-12, May 1984.

P. A. Karger. New Methods for Immediate Revocation.

In Proceedings of the 1989 IEEE Symposium on Security and Privacy, pages 48-55, May 1989.

Patel-Schneider, P., and Fensel, D. 2002. Layering the semantic web: Problems and directions. In ISWC2002: Ist International Semantic Web Conference, Sardinia, Italy,


R. Kane and C. Landwehr (1986). On Access Checking in Capability-Based Systems.

In Proceedings of the 1986 IEEE Symposium on Security and Privacy, pages 66-77, May.

R. Levin, E. Cohen, W. Corwin, P. F., and W. Wulf (1975). Policy/mechanism separation in Hydra. In Proceedings of the Fifth Symposium on Operating Systems Principles, pages 132-140, University of Texas at Austin, Nov. 1975. ACM/SIGOPS.

Rivest, R. L., and Lampson, B. 1996. SDSI- a simple distributed security infrastructure.

S. Kent and R. Atkinson (Nov. 1998) Security Architecture for the Internet Protocol.

RFC 2401, Internet Engineering Task Force.

S. R. Claimant. Vnodes: Architecture for Multiple File System Types in Sun UNIX.

In Proc. of the Summer 1986 USENIX Conf., pages 238-247, Atlanta, GA, June 1986.

Samarati, P. 2002. Enriching access control to support credential-based specifications. In Sigrid Schubert, B. R.,and Jesse, N., eds., “Informatik bewegt” Proc. of the 32.

Samarati, P., and Capitani di Vimercati, S. 2001. Access control: policies, models, and mechanisms. In Focardi, R.,and Gorrieri, R., eds., Foundations of Security Analysis and

T. Jaeger, J. Liedtke, and N. Islam (1998). Operating System Protection for Fine-Grained Programs. In Proceedings of the Seventh USENIX Security Symposium, pages 143-157,

Download full paperFile format: .doc, available for editing
Contact Us