This article is within the scope of WikiProject Computer security, a collaborative effort to improve the coverage of computer security on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.Computer securityWikipedia:WikiProject Computer securityTemplate:WikiProject Computer securityComputer Security
Access control is within the scope of WikiProject Mass surveillance, which aims to improve Wikipedia's coverage of mass surveillance and mass surveillance-related topics. If you would like to participate, visit the project page, or contribute to the discussion.Mass surveillanceWikipedia:WikiProject Mass surveillanceTemplate:WikiProject Mass surveillanceMass surveillance
This article is within the scope of the Military history WikiProject. If you would like to participate, please visit the project page, where you can join the project and see a list of open tasks. To use this banner, please see the full instructions.Military historyWikipedia:WikiProject Military historyTemplate:WikiProject Military historymilitary history
This article is substantially duplicated by a piece in an external publication. Since the external publication copied Wikipedia rather than the reverse, please do not flag this article as a copyright violation of the following source:
Miller, F. P., Vandome, A. F., & McBrewster, J. (2009), Biometrics: Access control, automated fingerprint identification system, biometric passport, biometrics in schools, facial recognition system, fingerprint recognition, government database, Alphascript Publishing{{citation}}: CS1 maint: multiple names: authors list (link)
I'm concerned that while physical and IT access control have similarities, they are very different domains. It's ok at a high-level, but once the article goes into specifics, the jump between the main sections is quite substantial. Anyone know the best way to reorganize this topic? — Preceding unsigned comment added by Zippydo121 (talk • contribs) 14:52, 26 October 2020 (UTC)[reply]
This edit request has been answered. Set the |answered= or |ans= parameter to no to reactivate your request.
Access control is considered to be a significant aspect of privacy that should be further studied. Access control policy (also access policy) is part of an organization’s security policy. In order to verify the access control policy, organizations use an access control model.[1]Access control devices such as electronic locks can be more secure than traditional locks as they require authorized credentials, such as PIN codes or access cards, for entry. Shital12T (talk) 17:39, 31 August 2024 (UTC)[reply]
Done - Emphasized security of EAC via use of authorized credentials here, added ref to Further reading here as it didn't bare much on the first claim but is a solid survey of IoT AC. Tule-hog (talk) 23:37, 4 September 2024 (UTC)[reply]