Mostrando 7 resultados de: 7
Filtros aplicados
Publisher
Proceedings - 3rd International Conference on Information and Computer Technologies, ICICT 2020(2)
ACM International Conference Proceeding Series(1)
Advances in Science, Technology and Engineering Systems(1)
Frontiers in Artificial Intelligence and Applications(1)
Proceedings - 2019 2nd International Conference on Safety Produce Informatization, IICSPI 2019(1)
Área temáticas
Administración pública(2)
Derecho constitucional y administrativo(2)
El proceso político(2)
Funcionamiento de bibliotecas y archivos(2)
Programación informática, programas, datos, seguridad(2)
Área de conocimiento
Administración pública(3)
Ciencias de la computación(3)
Ciencia ambiental(1)
Gestión de riesgos(1)
Telecomunicaciones(1)
Origen
google(2)
Analysis of models of security to mitigate the risks, vulnerabilities and threats in a company of services of telecommunications
Conference ObjectAbstract: Different models in Information and Communication Technologies were analyzed for the creation of anPalabras claves:Matrix risks, Security Information, Security models, Telecommunications companies, vulnerabilitiesAutores:Chevez Moran M.J., Javier Gonzalo Ortiz Rojas, Mafla Gallegos L.E., Segundo Moisés Toapanta ToapantaFuentes:scopusAnalysis of new technologies in information security to mitigate data risks in a public organization
Conference ObjectAbstract: Were analyzed references on alternative technologies or new proposals to help mitigate data risks. TPalabras claves:foreign trade, information security, Mitigate the risks, New TechnologiesAutores:Javier Gonzalo Ortiz Rojas, Mafla Gallegos L.E., Medina Lara M.D., Segundo Moisés Toapanta ToapantaFuentes:googlescopusA Homomorphic Encryption Approach in a Voting System in a Distributed Architecture
Conference ObjectAbstract: It is considered that Electronic Votes is an alternative of safer systems, which provides greater coPalabras claves:cryptogram, encryption, Homomorphic, security database, Security InformationAutores:Chávez Chalén L.J., Javier Gonzalo Ortiz Rojas, Mafla Gallegos L.E., Segundo Moisés Toapanta ToapantaFuentes:googlescopusAn Approach to the Efficient Security Algorithms Used in Voting Scanning in an Electoral Process
Conference ObjectAbstract: It was considered that the security of information is an important factor in an electoral process inPalabras claves:ALGORITHMS, Cryptography, Electoral Process, electronic voting., SCANNING, security, voting platformAutores:Javier Gonzalo Ortiz Rojas, Lamar J.A.T., Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta ToapantaFuentes:scopusSecurity technologies to improve risk management against natural or anthropic disasters in Ecuador
Conference ObjectAbstract: The integration of three security technologies implemented in an event-based architectural style wasPalabras claves:Alerts, Detection systems, events, Mass notification, Security technologiesAutores:Javier Gonzalo Ortiz Rojas, Loor K.N.A., Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta ToapantaFuentes:scopusProposal of ledger technology to apply to a public organization in Ecuador
ArticleAbstract: Ledger technology has now changed financial systems around the world, applying this technology to thPalabras claves:algorithm, BLOCKCHAIN, Database, Distributed System, ECUADOR, Ledger Technology, PUBLIC ORGANIZATIONAutores:Adrian Alberto Chávez Monteverde, Javier Gonzalo Ortiz Rojas, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta ToapantaFuentes:scopusPrototype of an alignment model of the Ministry of Telecommunications and the Information Society to a public organization in Ecuador
Conference ObjectAbstract: This work contains information on technological advances in various public institutions in Ecuador,Palabras claves:Alignment model, Electronic Government, Information technologyAutores:Canales M.J.M., Javier Gonzalo Ortiz Rojas, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta ToapantaFuentes:scopus