All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Universal Description of Access Control Systems

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216305%3A26220%2F24%3APU151997" target="_blank" >RIV/00216305:26220/24:PU151997 - isvavai.cz</a>

  • Result on the web

    <a href="http://paper.ijcsns.org/07_book/202408/20240805.pdf" target="_blank" >http://paper.ijcsns.org/07_book/202408/20240805.pdf</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.22937/IJCSNS.2024.24.8.5" target="_blank" >10.22937/IJCSNS.2024.24.8.5</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Universal Description of Access Control Systems

  • Original language description

    Access control systems are used to control the access of people to assets. In practice, assets are either tangible (e.g. goods, cash, etc.) or data. In order to handle tangible assets, a person must physically access the space in which the assets are located (e.g. a room or a building). Access control systems for this case have been known since antiquity and are based either on mechanical locks or on certificates. In the middle of the 20th century, systems based on electromagnetic phenomena appeared. In the second half of the same century, the need to control access to data also arose. And since data can also be accessed via a computer network, it was necessary to control not only the access of persons to areas with data storage, but also to control the electronic communication of persons with these storage facilities. The different types of the above systems have developed separately and more or less independently. This paper provides an overview of the current status of different types of systems, showing that these systems are converging technologically based on the use of electronics, computing and computer communication. Furthermore, the terminology and architecture of these systems is expanded in the article to allow a unified description of these systems. The article also describes the most common types of access control system configurations.

  • Czech name

  • Czech description

Classification

  • Type

    J<sub>ost</sub> - Miscellaneous article in a specialist periodical

  • CEP classification

  • OECD FORD branch

    10200 - Computer and information sciences

Result continuities

  • Project

  • Continuities

    I - Institucionalni podpora na dlouhodoby koncepcni rozvoj vyzkumne organizace

Others

  • Publication year

    2024

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Name of the periodical

    International Journal of Computer Science and Network Security

  • ISSN

    1738-7906

  • e-ISSN

  • Volume of the periodical

    24

  • Issue of the periodical within the volume

    8

  • Country of publishing house

    KR - KOREA, REPUBLIC OF

  • Number of pages

    11

  • Pages from-to

    40-53

  • UT code for WoS article

  • EID of the result in the Scopus database