skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 134422 Find in a Library
Title: Designing in a New Dimension
Journal: Security Management  Volume:36  Issue:1  Dated:(January 1992)  Pages:26,28-31
Author(s): D G Patterson
Date Published: 1992
Page Count: 5
Type: Report (Technical)
Format: Article
Language: English
Country: United States of America
Annotation: Suggestions are offered for implementing computerized access control in one or more facilities.
Abstract: The principal function of any access control system is to prohibit unauthorized individuals from entering controlled areas while allowing authorized persons access. Recognizing the person as authorized requires a method of identifying the individual. Several topics are important to access control: encoding and decoding; facilities and zones; antipassback; global antipassback; antitailgating; and intrinsic safety. Any new computerized access control systems should use a data base management system (DBMS) that allows security data and other important data to be integrated and maintained in a centralized computer, ready to be accessed by several users. Important criteria for the DBMS functions include security, data model, employee data, and data integrity. One of the major advantages of a computerized access control system is its ability to support an organization's overall operation. Considerations for an effective access control system include reliability and health monitoring, management information, data security, operations, maintenance, and performance.
Main Term(s): Personnel identification systems
Index Term(s): Computer aided operations; Computer privacy and security; Security management
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.