scholarly journals Model of the state of threats to the Access Control System

This article is devoted to the presentation of the threat state model of access control, which allows calculating the probabilities of the impact of threats on the access control system and the probability of opening this system based on taking into account the generalized algorithm for the implementation of external threats, and determines the need to develop additional components of the access control system designed to identify and classify attacks.

2021 ◽  
Vol 92 ◽  
pp. 07009
Author(s):  
Martin Boroš ◽  
Filip Lenko ◽  
Andrej Velas

Research background: The research, which is the subject of the paper, is based on the global expansion of the use of electronic access control systems using biometric data for user verification. Due to the globalization of products from foreign markets to Slovakia, there is a competition between suppliers. The disadvantage is that organizations that are considering procuring an electronic access control system focus their attention only on its price. Globalization and global use have neglected the skills gap between European, American, and Asian markets. Purpose of the article: The paper will aim to point out, through a case study, the financial and functional differences of electronic access control systems. In the case study, a comparison of three different systems with the possibility of procurement on the European, American, and Asian markets will be performed on the building - administrative building. Methods: The article will mainly use methods such as the global method and the optimization model of the financial plan. As well as a case study, the cooperation of achieved results and analysis of possibilities of foreign markets. Findings & Value added: The results achieved by the paper will be globally usable in the conditions of European countries. These will be the conclusions of a case study that will point to the appropriateness of choosing an electronic access control system using biometric features in a standard office building. We can also consider the creation of a project budget usable for organizations as one of the added values.


2020 ◽  
Vol 2020 ◽  
pp. 1-13
Author(s):  
Siwan Noh ◽  
Sang Uk Shin ◽  
Kyung-Hyune Rhee

Blockchain is a technology that enables the implementation of a decentralized system by replacing the role of the centralized entity with the consensus of participants in the system to solve the problem of subordination to the centralized entity. Blockchain technology is being considered for application in numerous fields; however, the scalability limitation of a public blockchain has led many researchers to consider private blockchains, which reduce the security of the system while improving scalability. A state channel represents a leading approach among several scalability solutions, intended to address public blockchain scalability challenges while ensuring the security of the blockchain network. Participants in the channel perform the process of updating the state of the channel outside the blockchain. This process can proceed very quickly because it does not require the consensus of the blockchain network, but still, like on-chain, it can guarantee features such as irreversibility. In this paper, we propose the PyRos protocol, an access control system that supports the trading and sharing of data between individuals on a public blockchain based on the state channel. As far as we know, the research using the off-chain state channel for access control has not been proposed yet, so PyRos is a new approach in this field. In PyRos, user-defined access control policies are stored off-chain, and policy updates are always rapid regardless of the performance of the blockchain network. Moreover, PyRos provides means to prevent malicious participants from arbitrarily using the channel’s previous state while resolving constraints due to scalability problems, along with privacy guarantees for the transaction content. To evaluate the efficiency and security of PyRos, we provide qualitative analysis of security requirements and analysis in terms of the performance of public blockchain platforms.


2021 ◽  
Vol 1748 ◽  
pp. 042031
Author(s):  
Zheming Yang ◽  
Di Shao ◽  
Liangyong Qu ◽  
Mei Zhang

Sign in / Sign up

Export Citation Format

Share Document