2012
DOI: 10.1007/978-3-642-35362-8_19
|View full text |Cite
|
Sign up to set email alerts
|

Physical Access Control Administration Using Building Information Models

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…Data can be stored in the BIM model indefinitely and can be analyzed from multiple perspectives to assist the facility management activities. In this respect, a few researchers have demonstrated the potential of BIM in facility management, and they thought that the early application of BIM for FM included seven aspects of BIM application in the O&M phase: maintenance and repair, change/relocation management, space management, emergency management, security management, energy management, and asset management [17][18][19][20][21][22][23][24][25][26].…”
Section: Current Practices On Bim Application Areas For Fmmentioning
confidence: 99%
“…Data can be stored in the BIM model indefinitely and can be analyzed from multiple perspectives to assist the facility management activities. In this respect, a few researchers have demonstrated the potential of BIM in facility management, and they thought that the early application of BIM for FM included seven aspects of BIM application in the O&M phase: maintenance and repair, change/relocation management, space management, emergency management, security management, energy management, and asset management [17][18][19][20][21][22][23][24][25][26].…”
Section: Current Practices On Bim Application Areas For Fmmentioning
confidence: 99%
“…In other words, they only focus on cyber security. Skandhakumar et al [9] proposed a method that utilizes Building Information Models (BIMs) to reduce the incidents of error in the physical space. Turkmen et al [10] concerned with computing relaxations of physical access policies to eliminate conflicting rules.…”
Section: Related Workmentioning
confidence: 99%
“…The security architecture of the open system interconnection reference model (ISO7492-2), which is proposed by the International Organization for Standardization, states that the access control service is an important component of security services and plays an irreplaceable role in the security architecture. The literature is rich in accounts of access control models [2][3][4][5][6][7][8][9][10][11] . However, to the best of our knowledge, no prior studies have considered the effect of the dynamic topology environment on the system access control model, including cyber and physical topologies.…”
Section: Introductionmentioning
confidence: 99%
“…There is no single platform/tool that captures all the requirements for each of these domains; instead, separate concepts are being discussed. For instance, object-oriented modeling extends to Bridge Information Modeling (e.g., BrIM [6]), Railway Infrastructure Information Modeling (e.g., RIIM [7]) and Airport Information Modeling (e.g., AIM [8]). These studies lead to domain-specific tools and in order to increase the success rates of such applications, the introduction of specific guidelines for each fragmented domain is needed.…”
Section: Introductionmentioning
confidence: 99%