Analysis of New Methods for Access Monitoring