Mostrando 10 resultados de: 34
Filtros aplicados
Publisher
Proceedings - 3rd International Conference on Information and Computer Technologies, ICICT 2020(6)
Proceedings of the 3rd World Conference on Smart Trends in Systems, Security and Sustainability, WorldS4 2019(6)
Advances in Science, Technology and Engineering Systems(4)
CITS 2018 - 2018 International Conference on Computer, Information and Telecommunication Systems(3)
2020 Asia Conference on Computers and Communications, ACCC 2020(2)
Área temáticas
Programación informática, programas, datos, seguridad(13)
Dirección general(9)
Funcionamiento de bibliotecas y archivos(9)
Ciencias de la computación(7)
Economía financiera(5)
Área de conocimiento
Ciencias de la computación(20)
Administración pública(7)
Base de datos(5)
Tecnologías de la información y la comunicación(5)
Visualización de información(4)
A Blockchain Approach to Mitigate Information Security in a Public Organization for Ecuador
Conference ObjectAbstract: It was analysed in a general way and the security problem of the public organizations of Ecuador wasPalabras claves:Autores:Dario Dario Fernando Huilcapi, Enrique Mafla, Mero J., Segundo Moisés Toapanta Toapanta, Tandazo M., Trejo J.A.O.Fuentes:scopusA Hyperledger Model for the Deployment of Smart Contracts in a Public Organization in Ecuador
Conference ObjectAbstract: Were analyzed the deployment of a Smart Contract in a Public Organization in Ecuador, also were analPalabras claves:BLOCKCHAIN, HYPERLEDGER, PUBLIC ORGANIZATION, SMART CONTRACTAutores:Javier Alfredo Espinoza Carpio, Mafla Gallegos L.E., Rocio MacIel Arellano M., Segundo Moisés Toapanta ToapantaFuentes:scopusA hyperledger technology approach to mitigate the risks of the database in foreign trade management
Conference ObjectAbstract: It was analyzed blockchain proposals such as architectures and models applied in different areas whiPalabras claves:BLOCKCHAIN, Decentralized model, foreign trade, HYPERLEDGER, Mitigate the risksAutores:Guaman Villalta M.G., Mafla Gallegos L.E., Saltos N.S.M., Segundo Moisés Toapanta ToapantaFuentes:scopusBiometric systems approach applied to a conceptual model to mitigate the integrity of the information
Conference ObjectAbstract: The security of information is important in all public or private institutions or organizations; onPalabras claves:authentication, Biometrics, identify, Integrity, security, verifyAutores:Luis Enrique Gallegos Mafia, Mayra Alejandra Mendez Anchundia, Segundo Moisés Toapanta Toapanta, Trejo J.A.O.Fuentes:scopusAn approach of efficient security algorithms for distribute architectures
Conference ObjectAbstract: We analyzed the security algorithms considered as more efficient to mitigate the vulnerabilities andPalabras claves:ALGORITHMS, Cryptography, Database, Distributed architecture, Security modelsAutores:Antonio O., Mafla G. Enrique, Segundo Moisés Toapanta ToapantaFuentes:scopusAn approach of models of information technologies suitable to optimize management in a public organization of Ecuador
Conference ObjectAbstract: Public institutions in Ecuador have problems to optimize the management of ICT in an appropriate andPalabras claves:Appropriate Models, Implementation of ICTs, management, Optimization of IT resources, PROCESS, Public Institutions of EcuadorAutores:Danny Wilfrido Barona Valencia, Luis Enrique Mafla Gallegos, Melania Alejandra Prado Sánchez, Segundo Moisés Toapanta ToapantaFuentes:scopusAnalysis of Security Algorithms for a Distributed Database
Conference ObjectAbstract: We analyzed the security of a database considering the environment of distributed systems, there arePalabras claves:algorithm flowcharts, data security, distributed database, security algorithms, security of the informationAutores:Daniel Humberto Plua Moran, Félix Gustavo Mendoza Quimí, Maciel Arellano M.R., Mafla Gallegos L.E., Máximo Giovani Tandazo Espinoza, Segundo Moisés Toapanta ToapantaFuentes:scopusAnalysis of adequate security algorithms oriented to cybersecurity management for a distributed architecture
Conference ObjectAbstract: It was analyzed an environment between the references of certain security models and algorithms basePalabras claves:Access Control, CYBERSECURITY, Distributed architecture, DISTRIBUTED SYSTEMS, Security algorithmAutores:Christian Andres Orozco Bonilla, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta ToapantaFuentes:scopusAnalysis of cyberattacks in public organizations in Latin America
ArticleAbstract: It was analyzed certain information about cyberattacks in Latin America and methods to counteract thPalabras claves:cyberattack, CYBERSECURITY, Denial of Service, Minimize he attack, PUBLIC ORGANIZATIONAutores:José David López Cobeña, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta ToapantaFuentes:scopusAnalysis of efficient processes for optimization in a distributed database
Conference ObjectAbstract: Distributed databases (DDB) help store and process data, which grows due to the current demand for vPalabras claves:ACID, distributed database, Optimization, performance, throughputAutores:Félix Gustavo Mendoza Quimí, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta Toapanta, Trejo J.A.O.Fuentes:scopus