Mostrando 8 resultados de: 8
Filtros aplicados
Subtipo de publicación
Conference Object(8)
Publisher
CITS 2018 - 2018 International Conference on Computer, Information and Telecommunication Systems(4)
IOP Conference Series: Materials Science and Engineering(2)
AIP Conference Proceedings(1)
Materials Today: Proceedings(1)
Área temáticas
Ciencias de la computación(3)
Funcionamiento de bibliotecas y archivos(3)
Ciencia militar(1)
Derecho(1)
Existencia, conocibilidad y atributos de Dios(1)
Área de conocimiento
Ciencias de la computación(6)
Base de datos(4)
Red informática(1)
Visualización de información(1)
Origen
scopus(8)
Biometric systems approach applied to a conceptual model to mitigate the integrity of the information
Conference ObjectAbstract: The security of information is important in all public or private institutions or organizations; onPalabras claves:authentication, Biometrics, identify, Integrity, security, verifyAutores:Luis Enrique Gallegos Mafia, Mayra Alejandra Mendez Anchundia, Segundo Moisés Toapanta Toapanta, Trejo J.A.O.Fuentes:scopusAnalysis of HIPAA for adopt in the information security in the civil registry of the ecuador
Conference ObjectAbstract: It was determined that institutions, public and private worldwide have problems in confidentiality,Palabras claves:algorithm, Data integrity, HIPAA, MD5, Security InformationAutores:Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta Toapanta, Stefany Joan Moran Paredes, Trejo J.A.O.Fuentes:scopusAnalysis of efficient processes for optimization in a distributed database
Conference ObjectAbstract: Distributed databases (DDB) help store and process data, which grows due to the current demand for vPalabras claves:ACID, distributed database, Optimization, performance, throughputAutores:Félix Gustavo Mendoza Quimí, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta Toapanta, Trejo J.A.O.Fuentes:scopusAnalysis of the Appropriate Security Models to Apply in a Distributed Architecture
Conference ObjectAbstract: The availability of information generated on a large scale has allowed sharing without considering tPalabras claves:Autores:Enrique Mafla, Mendoza F., Nazareno J., Raúl Segundo Tingo Soledispa, Segundo Moisés Toapanta Toapanta, Trejo J.A.O.Fuentes:scopusA Blockchain Approach to Mitigate Information Security in a Public Organization for Ecuador
Conference ObjectAbstract: It was analysed in a general way and the security problem of the public organizations of Ecuador wasPalabras claves:Autores:Dario Dario Fernando Huilcapi, Enrique Mafla, Mero J., Segundo Moisés Toapanta Toapanta, Tandazo M., Trejo J.A.O.Fuentes:scopusConceptual model for identity management to mitigate the database security of the registry civil of Ecuador
Conference ObjectAbstract: Were analyzed different conceptual models that apply identity management for authentication, authoriPalabras claves:authentication, authorization, conceptual models, Confidentiality, Identity management models, Integrity, securityAutores:Enrique Mafla, Segundo Moisés Toapanta Toapanta, Trejo J.A.O.Fuentes:scopusAdoption of the Hash algorithm in a conceptual model for the civil registry of Ecuador
Conference ObjectAbstract: The Hash security algorithm was analyzed in order to mitigate information security in a distributedPalabras claves:Autores:Enrique Mafla, Segundo Moisés Toapanta Toapanta, Trejo J.A.O.Fuentes:scopusAlgorithms for efficient biometric systems to mitigate the integrity of a distributed database
Conference ObjectAbstract: The problems of information security are persistent in the business environment and public and privaPalabras claves:algorithm, biometric, DTW, HMM, Integrity, ORB, SIFT, SurfAutores:Alvaro Andres Coca Cruz, Luis Enrique Mafla Gallegos, Segundo Moisés Toapanta Toapanta, Trejo J.A.O.Fuentes:scopus