Mostrando 8 resultados de: 8
Filtros aplicados
Publisher
CITS 2018 - 2018 International Conference on Computer, Information and Telecommunication Systems(3)
IOP Conference Series: Materials Science and Engineering(2)
AIP Conference Proceedings(1)
Journal of Engineering and Applied Sciences(1)
Proceedings of the 2022 International Conference on Computer, Information and Telecommunication Systems, CITS 2022(1)
Área temáticas
Ciencias de la computación(4)
Dirección general(2)
Interacción social(2)
Programación informática, programas, datos, seguridad(2)
Comunidades(1)
Origen
scopus(8)
Biometric systems approach applied to a conceptual model to mitigate the integrity of the information
Conference ObjectAbstract: The security of information is important in all public or private institutions or organizations; onPalabras claves:authentication, Biometrics, identify, Integrity, security, verifyAutores:Luis Enrique Gallegos Mafia, Mayra Alejandra Mendez Anchundia, Segundo Moisés Toapanta Toapanta, Trejo J.A.O.Fuentes:scopusAn approach to information security by applying a conceptual model of identities in smart cities projects
ArticleAbstract: It analyzed different projects of intelligent cities related to information security were analyzed tPalabras claves:Identity Models, INFORMATION MANAGEMENT, information security, Integrity of information, SmaJt cities, vulnerabilitiesAutores:Enrique Mafla, Segundo Moisés Toapanta Toapanta, Trejo J.A.O.Fuentes:scopusAnalysis of efficient processes for optimization in a distributed database
Conference ObjectAbstract: Distributed databases (DDB) help store and process data, which grows due to the current demand for vPalabras claves:ACID, distributed database, Optimization, performance, throughputAutores:Félix Gustavo Mendoza Quimí, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta Toapanta, Trejo J.A.O.Fuentes:scopusAnalysis of the Appropriate Security Models to Apply in a Distributed Architecture
Conference ObjectAbstract: The availability of information generated on a large scale has allowed sharing without considering tPalabras claves:Autores:Enrique Mafla, Mendoza F., Nazareno J., Raúl Segundo Tingo Soledispa, Segundo Moisés Toapanta Toapanta, Trejo J.A.O.Fuentes:scopusA Blockchain Approach to Mitigate Information Security in a Public Organization for Ecuador
Conference ObjectAbstract: It was analysed in a general way and the security problem of the public organizations of Ecuador wasPalabras claves:Autores:Dario Dario Fernando Huilcapi, Enrique Mafla, Mero J., Segundo Moisés Toapanta Toapanta, Tandazo M., Trejo J.A.O.Fuentes:scopusAdoption of the Hash algorithm in a conceptual model for the civil registry of Ecuador
Conference ObjectAbstract: The Hash security algorithm was analyzed in order to mitigate information security in a distributedPalabras claves:Autores:Enrique Mafla, Segundo Moisés Toapanta Toapanta, Trejo J.A.O.Fuentes:scopusAlgorithms for efficient biometric systems to mitigate the integrity of a distributed database
Conference ObjectAbstract: The problems of information security are persistent in the business environment and public and privaPalabras claves:algorithm, biometric, DTW, HMM, Integrity, ORB, SIFT, SurfAutores:Alvaro Andres Coca Cruz, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta Toapanta, Trejo J.A.O.Fuentes:scopusSuitable Professional Identity Analysis to Improve Information Security Governance
Conference ObjectAbstract: Information security and cybersecurity governance problems are persistent worldwide in all public anPalabras claves:information security, It governance, Professional identity, Security management, suitable professionals.Autores:Arellano M.R.M.I., Hifóng M.M.B., Luis Enrique Mafla Gallegos, Rodrigo Humberto Del Pozo Durango, Segundo Moisés Toapanta Toapanta, Trejo J.A.O.Fuentes:scopus