Electrotechnical and Computer Engineering
Vol. 37 No. 11 (2022): Proceedings of Faculty of Technical Sciences
USER ACCESS CONTROL SOFTWARE USABILITY ENGINEERING
Abstract
Analysis of the structure, design, usability, advantages and disadvantages of an access control application. Reasons for introducing access control and modern solutions that include smartphones as well as biometric technologies.
References
[1] H. Zhang, J. Wang, and J. Chang: An access control model for multi-level security in multi-domain networking environments, Kunming, China, July 2017
[2] ButterflyMX: https://butterflymx.com/ (pristupljeno u junu 2022.)
[3] https://www.pearsonitcertification.com/articles/article.aspx?p=1718488 (pristupljeno u avgustu 2022.)
[4] https://engagis.com/ (pristupljeno u junu 2022.)
[5] ProdataKey: https://www.prodatakey.com/software; (pristupljeno u avgustu 2022.)
[6] https://butterflymx.com/blog/brivo-review/; (pristupljeno u avgustu 2022.)
[7] https://www.hidglobal.com/products/software/easylobby/svm (pristupljeno u junu 2022.)
[8] https://www.nedapsecurity.com/insight/biometric-access-control/ (pristupljeno u avgustu 2022.)
[9] https://www.openpath.com/blog-post/access-control-security-trends (pristupljeno u avgustu 2022.)
[10] https://thekccgroup.com/solution/automatics-and-access-control/access-control-solutions/biometric-access-control-systems/ (pristupljeno u avgustu 2022.)