Mostrando 10 resultados de: 11
Publisher
2014 1st International Conference on eDemocracy and eGovernment, ICEDEG 2014(1)
2015 International Conference on Computing, Communication and Security, ICCCS 2015(1)
ACM Transactions on Sensor Networks(1)
Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012(1)
Proceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016(1)
Área temáticas
Ciencias de la computación(4)
Funcionamiento de bibliotecas y archivos(4)
Programación informática, programas, datos, seguridad(3)
Consideraciones generales de la administración pública(2)
Dirección general(2)
Cloud-GMR: A Qualitative Framework for Governance and Risk Management of Cloud-hosted Public Services
Conference ObjectAbstract: The rapid adoption of Cloud Computing in the last decade has promoted the development and innovationPalabras claves:CLOUD COMPUTING, cobit, Governance, iso 27005, octave, Public Sector, Risk managementAutores:Denys A. Flores, Morocho G.Fuentes:googlescopusCombining digital forensic practices and database analysis as an anti-money laundering strategy for financial institutions
Conference ObjectAbstract: Digital forensics is the science that identify, preserve, collect, validate, analyse, interpret, andPalabras claves:BI, Business intelligence, database log, digital forensics, ETL, extractor, FTK, MySQL, SAP, store procedureAutores:Angelopoulou O., Denys A. Flores, Self R.J.Fuentes:googlescopusBring your own disclosure: Analysing BYOD threats to corporate information
Conference ObjectAbstract: Mobile device consumerisation has introduced the Bring-Your-Own-Device (BYOD) trend to the organisatPalabras claves:Attack, BYOD, contamination, Disclosure, Forensics, Insider, Outsider, STRIDE, Threat modelAutores:Denys A. Flores, Jhumka A., Qazi F.Fuentes:googlescopusAn authentication and auditing architecture for enhancing security on egovernment services
Conference ObjectAbstract: eGovernment deploys governmental information and services for citizens and general society. As the IPalabras claves:Architecture, AUDITING, authentication, Database, EGovernment, intrusion detection, log, SaltingAutores:Denys A. FloresFuentes:googlescopusAn integrated model for ICT Governance and Management applied to the Council for Evaluation, Accbkp_reditation and Quality Assurance of Higher Education Institutions in Ecuador (CEAACES)
Conference ObjectAbstract: As an effect of the modernization policy in the administrative processes inside the Ecuadorean CentrPalabras claves:cobit, Governance, ict, Iso, IT, management, Model, practices, StandardAutores:Carlos Montenegro, Denys A. FloresFuentes:scopusA Usability-focused Method to Design a Cybersecurity MOOC for Children
Conference ObjectAbstract: Teaching cybersecurity to children is not a trivial task due to the complexity of explaining online-Palabras claves:3D, addie, character design, CYBERSECURITY, DPIPE, Mooc, nielsen, STORYBOARD, sus, udl, Usability, VIRTUAL LEARNINGAutores:Cannon S.L., Daliana Zambrano, Denys A. Flores, Gomez C., Julián Andrés Galindo Losada, Luis Almeida, Martinez-Garcia G., Roberto Omar Andrade, Sergio JimenezFuentes:scopusCONDOR: A hybrid IDS to offer improved intrusion detection
Conference ObjectAbstract: Intrusion Detection Systems are an accepted and very useful option to monitor, and detect maliciousPalabras claves:Anomaly, false negative, false positive, hybrid, Ids, intrusion detection, NIDS, SignatureAutores:Day D.J., Denys A. Flores, Lallie H.S.Fuentes:googlescopusEvaluating social and ecological sustainability initiatives in global companies using text analysis techniques
Conference ObjectAbstract: Although several agencies in charge of promoting the adoption of a Sustainable Development have poinPalabras claves:Lda, Monte Carlo, Sustainable Development, TBL, text analysisAutores:Carlos Montenegro, Denys A. Flores, Edison Loza-Aguirre, Galo MoretaFuentes:scopusHybrid logical clocks for database forensics: Filling the gap between chain of custody and database auditing
Conference ObjectAbstract: Database audit records are important for investigating suspicious actions against transactional dataPalabras claves:causality, Chain of custody, Database audit, Database forensics, Database security, Hybrid logical clocks, Provenance, Role segregationAutores:Denys A. Flores, Jhumka A.Fuentes:googlescopusImplementing chain of custody requirements in database audit records for forensic purposes
Conference ObjectAbstract: During forensic database investigations, audit records become a crucial evidential element; particulPalabras claves:Admissibility, Architecture, Audit, causality, Chain of custody, Database forensics, Proactive, Provenance, Role segregation, Stored procedure, Timeline, Trigger, Vector clockAutores:Denys A. Flores, Jhumka A.Fuentes:googlescopus