Support of Interviewing Techniques in Physical Access Control Systems

Author(s):  
Svetlana N. Yanushkevich ◽  
Oleg Boulanov ◽  
Adrian Stoica ◽  
Vlad P. Shmerko
2019 ◽  
Vol 15 (2) ◽  
pp. 23-28
Author(s):  
Evgeny A. Godovnikov ◽  
Anatoliy V. Shicelov ◽  
Ruslan T. Usmanov

This article discusses the design of a physical access control system for an enterprise with various methods of authentication and user identification. A review of existing solutions in the design of physical access control systems was conducted. In the course of the work, a system design was proposed, and its components were described in detail.


Author(s):  
S. Chague ◽  
B. Droit ◽  
O. Boulanov ◽  
S. N. Yanushkevich ◽  
V. P. Shmerko ◽  
...  

2018 ◽  
Vol 2018 ◽  
pp. 1-12 ◽  
Author(s):  
Jan Hajny ◽  
Petr Dzurenda ◽  
Lukas Malina

Card-based physical access control systems are used by most people on a daily basis, for example, at work, in public transportation, or at hotels. Yet these systems have often very poor cryptographic protection. User identifiers and keys can be easily eavesdropped on and counterfeited. The privacy-preserving features are almost missing in these systems. To improve this state, we propose a novel cryptographic scheme based on efficient zero-knowledge proofs and Boneh-Boyen signatures. The proposed scheme is provably secure and provides the full set of privacy-enhancing features, that is, the anonymity, untraceability, and unlinkability of users. Furthermore, our scheme supports distributed multidevice authentication with multiple RFID (Radio-Frequency IDentification) user devices. This feature is particularly important in applications for controlling access to dangerous sites where the presence of protective equipment is checked during each access control session. Besides the full cryptographic specification, we also show the results of our implementation on devices commonly used in access control applications, particularly the smart cards and embedded verification terminals. By avoiding costly operations on user devices, such as bilinear pairings, we were able to achieve times comparable to existing systems (around 500 ms), while providing significantly higher security, privacy protection, and features for RFID multidevice authentication.


2013 ◽  
Vol 19 (4) ◽  
pp. 675-686 ◽  
Author(s):  
Leonardas Marozas ◽  
Nikolaj Goranin ◽  
Antanas Cenys ◽  
Lukas Radvilavičius ◽  
Zenonas Turskis

Currently, control of access to information and physical resources has become extremely important. Numerous methods and solutions for architecture of systems aimed at controlling physical access are available; however, there is little information about application of Multi-Criteria Decision Analysis methods when evaluating separate logical components, needed for the design of access control systems and their interconnection in the final architecture.This paper is the first part of a two-part article, discussing application of multi-criteria decision making for architecture of access control systems. The first part defines the problem and discusses the possibility to use Multi Criteria Decision Making techniques when designing access control systems, including risk analysis for specific criteria and practical application of the developed model. In the second part, the possible solution model will be presented.


Author(s):  
Eduardo B. Fernandez ◽  
Jose Ballesteros ◽  
Ana C. Desouza-Doucet ◽  
Maria M. Larrondo-Petrie

Sign in / Sign up

Export Citation Format

Share Document