Mostrando 10 resultados de: 11
Filtros aplicados
Publisher
CITS 2018 - 2018 International Conference on Computer, Information and Telecommunication Systems(2)
ACM International Conference Proceeding Series(1)
AIP Conference Proceedings(1)
Advances in Intelligent Systems and Computing(1)
IEEE Access(1)
Área temáticas
Programación informática, programas, datos, seguridad(5)
Ciencias de la computación(4)
Funcionamiento de bibliotecas y archivos(3)
Otros problemas y servicios sociales(3)
Ciencia militar(1)
Área de conocimiento
Ciencias de la computación(7)
Origen
scopus(11)
Analysis for the evaluation and security management of a database in a public organization to mitigate cyber attacks
ArticleAbstract: In data handling, security and privacy are essential for database administrators and users that ownPalabras claves:BLOCKCHAIN, Cyber attacks, Cyber Security, Data Base, PUBLIC ORGANIZATIONAutores:Escalante Quimis O.A., Maciel Arellano M.R., Mafla Gallegos L.E., Segundo Moisés Toapanta ToapantaFuentes:scopusAnalysis of Security Algorithms for a Distributed Database
Conference ObjectAbstract: We analyzed the security of a database considering the environment of distributed systems, there arePalabras claves:algorithm flowcharts, data security, distributed database, security algorithms, security of the informationAutores:Daniel Humberto Plua Moran, Félix Gustavo Mendoza Quimí, Maciel Arellano M.R., Mafla Gallegos L.E., Máximo Giovani Tandazo Espinoza, Segundo Moisés Toapanta ToapantaFuentes:scopusAnalysis of efficient processes for optimization in a distributed database
Conference ObjectAbstract: Distributed databases (DDB) help store and process data, which grows due to the current demand for vPalabras claves:ACID, distributed database, Optimization, performance, throughputAutores:Félix Gustavo Mendoza Quimí, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta Toapanta, Trejo J.A.O.Fuentes:scopusA hyperledger technology approach to mitigate the risks of the database in foreign trade management
Conference ObjectAbstract: It was analyzed blockchain proposals such as architectures and models applied in different areas whiPalabras claves:BLOCKCHAIN, Decentralized model, foreign trade, HYPERLEDGER, Mitigate the risksAutores:Guaman Villalta M.G., Mafla Gallegos L.E., Saltos N.S.M., Segundo Moisés Toapanta ToapantaFuentes:scopusA security algorithms approach to apply to the civil registry database of the Ecuador
Conference ObjectAbstract: It was analyzed the most frequent security algorithms used for information security to mitigate thePalabras claves:Algorithm flowchart, authentication, Database, encryption, Models the security, Security InformationAutores:Antonio O., Mafla G. Enrique, Segundo Moisés Toapanta ToapantaFuentes:scopusConceptual model for identity management to mitigate the database security of the registry civil of Ecuador
Conference ObjectAbstract: Were analyzed different conceptual models that apply identity management for authentication, authoriPalabras claves:authentication, authorization, conceptual models, Confidentiality, Identity management models, Integrity, securityAutores:Enrique Mafla, Segundo Moisés Toapanta Toapanta, Trejo J.A.O.Fuentes:scopusCryptographic Algorithms to Mitigate the Risks of Database in the Management of a Smart City
Conference ObjectAbstract: It was analyzed the information of databases, encryption algorithms, and information security that aPalabras claves:Cryptographic Algorithms, Database risks, information security, Security scheme, smart cityAutores:Félix Gustavo Mendoza Quimí, Luis Enrique Mafla Gallegos, Salazar R., Segundo Moisés Toapanta ToapantaFuentes:scopusAppropriate Security Algorithms to Mitigate the Risks in a Database of the National Customs Service of Ecuador
Conference ObjectAbstract: Currently, the use of technological resources, within public and private institutions, has become esPalabras claves:Computer security, Computer Theft, Encrypted Algorithms, Risk managementAutores:Karen Lissette Ponce Astudillo, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta ToapantaFuentes:scopusAdoption of the Hash algorithm in a conceptual model for the civil registry of Ecuador
Conference ObjectAbstract: The Hash security algorithm was analyzed in order to mitigate information security in a distributedPalabras claves:Autores:Enrique Mafla, Segundo Moisés Toapanta Toapanta, Trejo J.A.O.Fuentes:scopusAlgorithms for efficient biometric systems to mitigate the integrity of a distributed database
Conference ObjectAbstract: The problems of information security are persistent in the business environment and public and privaPalabras claves:algorithm, biometric, DTW, HMM, Integrity, ORB, SIFT, SurfAutores:Alvaro Andres Coca Cruz, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta Toapanta, Trejo J.A.O.Fuentes:scopus