Design patterns: elements of reusable object-oriented software
Design patterns: elements of reusable object-oriented software
Designing object-oriented C++ applications: using the Booch method
Designing object-oriented C++ applications: using the Booch method
Pattern-oriented software architecture: a system of patterns
Pattern-oriented software architecture: a system of patterns
The Object Constraint Language: Getting Your Models Ready for MDA
The Object Constraint Language: Getting Your Models Ready for MDA
Implementing access control to people location information
Proceedings of the ninth ACM symposium on Access control models and technologies
Context-Based Access Control Management in Ubiquitous Environments
NCA '04 Proceedings of the Network Computing and Applications, Third IEEE International Symposium
Context sensitive access control
Proceedings of the tenth ACM symposium on Access control models and technologies
Security Patterns: Integrating Security and Systems Engineering
Security Patterns: Integrating Security and Systems Engineering
A Pattern Language for Identity Management
ICCGI '07 Proceedings of the International Multi-Conference on Computing in the Global Information Technology
Efficient enforcement of security policies based on tracking of mobile users
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
Privacy sensitive location information systems in smart buildings
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
On building secure SCADA systems using security patterns
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
WSEAS Transactions on Systems and Control
Physical access control administration using building information models
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Hi-index | 0.00 |
Physical security has received increased attention after 9/11. However, access control to physical units has not been explored much. On the other hand, there is a rich literature on access control to information. These two areas appear converging as seen by recent products and studies. However, use of different notations and implementation details make this convergence harder. We need to try to take this convergence at a more abstract level first. Although introduced about 10 years ago, security patterns have recently become accepted by industry and two books on this topic have appeared recently. Security patterns for information access control have appeared but now we extend this concept to access for physical units. The unification of information and physical access control is just beginning but the strong requirements of infrastructure protection will make this convergence to happen rapidly. Examining existing systems, industry standards and government regulations, we describe, in the form of patterns, the core set of features a physical access control system should have. The paper illustrates the structure and use of these patterns.