USER ACCESS CONTROL SOFTWARE USABILITY ENGINEERING

Authors

  • Marija Stajić Autor

DOI:

https://doi.org/10.24867/20BE14Stajic

Keywords:

Access control, biometric technologies, security, identification, authentification

Abstract

Analysis of the structure, design, usability, advantages and disadvantages of an access control application. Reasons for introducing access control and modern solutions that include smartphones as well as biometric technologies.

References

[1] H. Zhang, J. Wang, and J. Chang: An access control model for multi-level security in multi-domain networking environments, Kunming, China, July 2017
[2] ButterflyMX: https://butterflymx.com/ (pristupljeno u junu 2022.)
[3] https://www.pearsonitcertification.com/articles/article.aspx?p=1718488 (pristupljeno u avgustu 2022.)
[4] https://engagis.com/ (pristupljeno u junu 2022.)
[5] ProdataKey: https://www.prodatakey.com/software; (pristupljeno u avgustu 2022.)
[6] https://butterflymx.com/blog/brivo-review/; (pristupljeno u avgustu 2022.)
[7] https://www.hidglobal.com/products/software/easylobby/svm (pristupljeno u junu 2022.)
[8] https://www.nedapsecurity.com/insight/biometric-access-control/ (pristupljeno u avgustu 2022.)
[9] https://www.openpath.com/blog-post/access-control-security-trends (pristupljeno u avgustu 2022.)
[10] https://thekccgroup.com/solution/automatics-and-access-control/access-control-solutions/biometric-access-control-systems/ (pristupljeno u avgustu 2022.)

Published

2022-11-05

Issue

Section

Electrotechnical and Computer Engineering