2007
DOI: 10.1007/978-3-540-73538-0_19
|View full text |Cite
|
Sign up to set email alerts
|

Security Patterns for Physical Access Control Systems

Abstract: Physical security has received increased attention after 9/11. However, access control to physical units has not been explored much. On the other hand, there is a rich literature on access control to information. These two areas appear converging as seen by recent products and studies. However, use of different notations and implementation details make this convergence harder. We need to try to take this convergence at a more abstract level first. Although introduced about 10 years ago, security patterns have … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2008
2008
2023
2023

Publication Types

Select...
3
3
3

Relationship

2
7

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 9 publications
0
7
0
Order By: Relevance
“…Another direction is to add constraints to the patterns to make them more precise and rigorous. Physical access control can also be integrated by using appropriate patterns [17]. In this paper, we have merely shown the idea of security patterns.…”
Section: Resultsmentioning
confidence: 99%
“…Another direction is to add constraints to the patterns to make them more precise and rigorous. Physical access control can also be integrated by using appropriate patterns [17]. In this paper, we have merely shown the idea of security patterns.…”
Section: Resultsmentioning
confidence: 99%
“…Applying a continuous learning mode, no dedicated training phase exists. Here the main question is after how many bookings (the so called 'init phase' 6 , the card usage behavior is expected to be stable, 6. Notice, we carefully distinguish the init phase from the training phase, since after the init phase the model is still extended with every new card-door combination, while after a training phase, the model is frozen.…”
Section: Model Stability and Agingmentioning
confidence: 99%
“…Specifically, methods from user entity behavior analytics (UEBA) [5], used to determine fraudulent behavior on enterprise endpoints, are a boon to CPS by determining behavior profiles of entities within a CPS -and pinpoint any kinds of behavior anomalies on top of that. In this paper, we take a closer look into the application of AD in physical access control systems [6]. Here, key cards allow users to enter areas of a building for which they have been authorized.…”
mentioning
confidence: 99%
“…Here, it was identified that policies are made by multiple people which is a problem our approach of global control solves. Types of access patterns are also studied [8,14,19]: Access policies according to time schedules and emergencies, access policies for people without RFID cards, and dependent access are of great importance. The first and the third problem are solvable by our approach and the second one seems like an intrinsic problem to physical access control.…”
Section: Related Workmentioning
confidence: 99%