Universal Description of Access Control Systems
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216305%3A26220%2F24%3APU151997" target="_blank" >RIV/00216305:26220/24:PU151997 - isvavai.cz</a>
Result on the web
<a href="http://paper.ijcsns.org/07_book/202408/20240805.pdf" target="_blank" >http://paper.ijcsns.org/07_book/202408/20240805.pdf</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.22937/IJCSNS.2024.24.8.5" target="_blank" >10.22937/IJCSNS.2024.24.8.5</a>
Alternative languages
Result language
angličtina
Original language name
Universal Description of Access Control Systems
Original language description
Access control systems are used to control the access of people to assets. In practice, assets are either tangible (e.g. goods, cash, etc.) or data. In order to handle tangible assets, a person must physically access the space in which the assets are located (e.g. a room or a building). Access control systems for this case have been known since antiquity and are based either on mechanical locks or on certificates. In the middle of the 20th century, systems based on electromagnetic phenomena appeared. In the second half of the same century, the need to control access to data also arose. And since data can also be accessed via a computer network, it was necessary to control not only the access of persons to areas with data storage, but also to control the electronic communication of persons with these storage facilities. The different types of the above systems have developed separately and more or less independently. This paper provides an overview of the current status of different types of systems, showing that these systems are converging technologically based on the use of electronics, computing and computer communication. Furthermore, the terminology and architecture of these systems is expanded in the article to allow a unified description of these systems. The article also describes the most common types of access control system configurations.
Czech name
—
Czech description
—
Classification
Type
J<sub>ost</sub> - Miscellaneous article in a specialist periodical
CEP classification
—
OECD FORD branch
10200 - Computer and information sciences
Result continuities
Project
—
Continuities
I - Institucionalni podpora na dlouhodoby koncepcni rozvoj vyzkumne organizace
Others
Publication year
2024
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Name of the periodical
International Journal of Computer Science and Network Security
ISSN
1738-7906
e-ISSN
—
Volume of the periodical
24
Issue of the periodical within the volume
8
Country of publishing house
KR - KOREA, REPUBLIC OF
Number of pages
11
Pages from-to
40-53
UT code for WoS article
—
EID of the result in the Scopus database
—