Access Control Management in Administrative Office with RFID Tagged Documents

The paper presents the system architecture for the access control subsystem for the RFID-equipped restricted access administrative office. The presented diagrams are the result of the analytical work performed by the multidisciplinary team of experts. The team was composed of IT specialist, security systems specialists and employees of the secret office. The presented models include the fact that the facilities in the secret office (cabinet, sluice, photocopier, desks) are equipped with the RFID reader, which allows to immediately read the documents that are within their reach. The logical architecture and the description of main functions of the privileges module has been presented in purpose to describe how to manage access control functionality in administrative office with RFID tagged documents.

[1]  Damith C. Ranasinghe,et al.  Networked RFID Systems and Lightweight Cryptography , 2008 .

[2]  Małgorzata Jasiulewicz-Kaczmarek Practical aspects of the application of RCM to select optimal maintenance policy of the production line , 2014 .

[3]  W. Marsden I and J , 2012 .

[4]  Maciej Kiedrowicz,et al.  Selected aspects of risk management in respect of security of the document lifecycle management system with multiple levels of sensitivity , 2015 .

[5]  Badri Nath Rfid Technology and Applications Rfid Technology and Applications , 2006 .

[6]  Craig Larman,et al.  Applying UML and Patterns: An Introduction to Object-Oriented Analysis and Design and Iterative Development (3rd Edition) , 1997 .

[7]  Tadeusz Nowicki,et al.  The Maintenance Management in the Macro-Ergonomics Context , 2017 .

[8]  Yvonne Schuhmacher,et al.  Rfid Handbook Fundamentals And Applications In Contactless Smart Cards And Identification , 2016 .

[9]  Robert Waszkowski,et al.  Access control system for rfid-tagged documents in supply chain management , 2017 .

[10]  Ivan Stojmenovic,et al.  RFID Systems: Research Trends and Challenges , 2011 .

[11]  Robert Waszkowski,et al.  Business rules automation standards in business process management systems , 2015 .

[12]  Eric J. Braude,et al.  Software Engineering: Modern Approaches , 2010 .

[13]  Dominique Paret,et al.  RFID at Ultra and Super High Frequencies , 2009 .

[14]  Jiming Chen,et al.  RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations , 2009 .