Mostrando 10 resultados de: 16
Filtros aplicados
Publisher
CITS 2018 - 2018 International Conference on Computer, Information and Telecommunication Systems(4)
IOP Conference Series: Materials Science and Engineering(3)
AIP Conference Proceedings(1)
IEEE 2nd International Smart Cities Conference: Improving the Citizens Quality of Life, ISC2 2016 - Proceedings(1)
International Conference on Electrical, Electronics, and Optimization Techniques, ICEEOT 2016(1)
Área temáticas
Ciencias de la computación(5)
Dirección general(5)
Funcionamiento de bibliotecas y archivos(5)
Programación informática, programas, datos, seguridad(3)
Administración pública(2)
Biometric systems approach applied to a conceptual model to mitigate the integrity of the information
Conference ObjectAbstract: The security of information is important in all public or private institutions or organizations; onPalabras claves:authentication, Biometrics, identify, Integrity, security, verifyAutores:Luis Enrique Gallegos Mafia, Mayra Alejandra Mendez Anchundia, Segundo Moisés Toapanta Toapanta, Trejo J.A.O.Fuentes:scopusAn approach to information security by applying a conceptual model of identities in smart cities projects
ArticleAbstract: It analyzed different projects of intelligent cities related to information security were analyzed tPalabras claves:Identity Models, INFORMATION MANAGEMENT, information security, Integrity of information, SmaJt cities, vulnerabilitiesAutores:Enrique Mafla, Segundo Moisés Toapanta Toapanta, Trejo J.A.O.Fuentes:scopusAnalysis of HIPAA for adopt in the information security in the civil registry of the ecuador
Conference ObjectAbstract: It was determined that institutions, public and private worldwide have problems in confidentiality,Palabras claves:algorithm, Data integrity, HIPAA, MD5, Security InformationAutores:Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta Toapanta, Stefany Joan Moran Paredes, Trejo J.A.O.Fuentes:scopusAnalysis of efficient processes for optimization in a distributed database
Conference ObjectAbstract: Distributed databases (DDB) help store and process data, which grows due to the current demand for vPalabras claves:ACID, distributed database, Optimization, performance, throughputAutores:Félix Gustavo Mendoza Quimí, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta Toapanta, Trejo J.A.O.Fuentes:scopusAnalysis of the Appropriate Security Models to Apply in a Distributed Architecture
Conference ObjectAbstract: The availability of information generated on a large scale has allowed sharing without considering tPalabras claves:Autores:Enrique Mafla, Mendoza F., Nazareno J., Raúl Segundo Tingo Soledispa, Segundo Moisés Toapanta Toapanta, Trejo J.A.O.Fuentes:scopusAnalysis of the Information Security of Public Organizations in Ecuador
Conference ObjectAbstract: Public organizations have the responsibility by law to manage sensitive data that must be shared; thPalabras claves:Information risks, information security, Key Factors, management model, PUBLIC ORGANIZATIONAutores:Izurieta R.R., Luis Enrique Mafla Gallegos, Morales L.J.C., Segundo Moisés Toapanta Toapanta, Trejo J.A.O.Fuentes:scopusAnalysis to define management of identities access control of security processes for the registration civil from Ecuador
Conference ObjectAbstract: The trends models identity management available, authentication, authorization and audit have been aPalabras claves:AUDITING, authentication, authorization, information security, Model identity management, Smart citiesAutores:Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta Toapanta, Trejo J.A.O.Fuentes:scopusA Blockchain Approach to Mitigate Information Security in a Public Organization for Ecuador
Conference ObjectAbstract: It was analysed in a general way and the security problem of the public organizations of Ecuador wasPalabras claves:Autores:Dario Dario Fernando Huilcapi, Enrique Mafla, Mero J., Segundo Moisés Toapanta Toapanta, Tandazo M., Trejo J.A.O.Fuentes:scopusConceptual model for identity management to mitigate the database security of the registry civil of Ecuador
Conference ObjectAbstract: Were analyzed different conceptual models that apply identity management for authentication, authoriPalabras claves:authentication, authorization, conceptual models, Confidentiality, Identity management models, Integrity, securityAutores:Enrique Mafla, Segundo Moisés Toapanta Toapanta, Trejo J.A.O.Fuentes:scopusAdequate security protocols adopt in a conceptual model in identity management for the Civil Registry of Ecuador
Conference ObjectAbstract: We analyzed the problems of security of the information of the civil registries and identification aPalabras claves:Audit, authentication, authorization, Identity Models, Security Protocols.Autores:Enrique Mafla, Segundo Moisés Toapanta Toapanta, Trejo J.A.O.Fuentes:scopus