Talk:Access control
This level-5 vital article is rated C-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
This article is substantially duplicated by a piece in an external publication. Since the external publication copied Wikipedia rather than the reverse, please do not flag this article as a copyright violation of the following source:
|
Archives (Index) |
This page is archived by ClueBot III.
|
Wiki Education Foundation-supported course assignment
[edit]This article was the subject of a Wiki Education Foundation-supported course assignment, between 17 May 2021 and 31 July 2021. Further details are available on the course page. Student editor(s): Fconteh02. Peer reviewers: Jonpcoombes.
Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT (talk) 13:18, 16 January 2022 (UTC)
Split into multiple articles?
[edit]I'm concerned that while physical and IT access control have similarities, they are very different domains. It's ok at a high-level, but once the article goes into specifics, the jump between the main sections is quite substantial. Anyone know the best way to reorganize this topic? — Preceding unsigned comment added by Zippydo121 (talk • contribs) 14:52, 26 October 2020 (UTC)
- I agree, I suggest sub paragraphs with "see main topic". Kerbless (talk) 15:32, 6 February 2023 (UTC)
This might be useful
[edit]Information security#Access control Kerbless (talk) 15:31, 6 February 2023 (UTC)
Semi-protected edit request on 31 August 2024
[edit]This edit request has been answered. Set the |answered= or |ans= parameter to no to reactivate your request. |
Access control is considered to be a significant aspect of privacy that should be further studied. Access control policy (also access policy) is part of an organization’s security policy. In order to verify the access control policy, organizations use an access control model.[1] Access control devices such as electronic locks can be more secure than traditional locks as they require authorized credentials, such as PIN codes or access cards, for entry. Shital12T (talk) 17:39, 31 August 2024 (UTC)
- Done - Emphasized security of EAC via use of authorized credentials here, added ref to Further reading here as it didn't bare much on the first claim but is a solid survey of IoT AC. Tule-hog (talk) 23:37, 4 September 2024 (UTC)
References
- ^ Ouaddah, Aafaf; Mousannif, Hajar; Abou Elkalam, Anas; Ait Ouahman, Abdellah (2017-01-15). "Access control in the Internet of Things: Big challenges and new opportunities". Computer Networks. 112: 237–262. doi:10.1016/j.comnet.2016.11.007. ISSN 1389-1286.
- C-Class level-5 vital articles
- Wikipedia level-5 vital articles in Society and social sciences
- C-Class vital articles in Society and social sciences
- C-Class Computer Security articles
- High-importance Computer Security articles
- C-Class Computer Security articles of High-importance
- C-Class Computing articles
- Mid-importance Computing articles
- All Computing articles
- All Computer Security articles
- C-Class Mass surveillance articles
- Low-importance Mass surveillance articles
- Start-Class military history articles
- Start-Class intelligence articles
- Intelligence task force articles
- Start-Class military science, technology, and theory articles
- Military science, technology, and theory task force articles