. . "deny unauthorized access" . . "Access control" . "access rights" . . "controlled access" . . "man traps" . "Access control" . . . . "control access" . . . . . . . . . "Access-Control" . . . . . . "controlling access" . . . "access control systems" . "restricts access" . "access control devices" . . . . . . "Physical Access Control" . . "Access_control#Computer_security" . "access control#Identification and Authentication (I&A)" . . . . . . "military access" . . "role based" . . . "Access control systems" . "the need-to-know rule" . . "Role-based access control" . . "electronic access control (EAC)" . "control human access" . . "Access" . . . . . . . . "security" . "subject" . . . . "perimeter security" . "access control" . "Access_control#Access_control_models" . . . "unauthorized access" . "security access" . . "logging in" . . "access control units" . . . . "basic access control readers" . "controls access" . . "request to exit" . . . . . "non-access-controlled" . . . . "Electronic card access" . "equal-access" . "selectively provided access to" . "Access Systems" . . . . "User authentication" . "Access control#Physical security" . "Personal access control system" . "'''''access''''' to secure systems" . . "authentication and authorization" . . . . . . . "Access Control" . . . "access" . . . "access control system" . . . . "functions" . . . . . . . . . "access controlled" . "Access_control#Computer security" . . "security perimeter" . "Access Control Systems" . . "access-control" .