2018
DOI: 10.1016/j.matpr.2017.11.127
|View full text |Cite
|
Sign up to set email alerts
|

Conceptual model for identity management to mitigate the database security of the registry civil of Ecuador

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…They analyzed how cybersecurity in organizations improves through the use of international standards and specific laws of a country [22]. They presented a conceptual model to manage the identity of the database of a public organization [23]. They present a prototype of a tool for security analysis and protection of organizations by joining component fault tree models and attack trees [24].…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…They analyzed how cybersecurity in organizations improves through the use of international standards and specific laws of a country [22]. They presented a conceptual model to manage the identity of the database of a public organization [23]. They present a prototype of a tool for security analysis and protection of organizations by joining component fault tree models and attack trees [24].…”
Section: Methodsmentioning
confidence: 99%
“…Within any strategic management it is important to know the current state of cybersecurity of the organization, to know what we must improve, always with the support of senior management, creating an organizational culture of security that includes all staff [26]. [17,18,20,23,24] We call the other group of variables "Technology, infrastructure and resources", which are essential to operate and implement any management or project in the organization, such as human, technological, material resources, among others, as well as the physical infrastructure, networks, etc.…”
Section: Internal Factorsmentioning
confidence: 99%
“…Indicator Model for measuring the Alignment between Institutional Strategies and ICT Strategies for a Public Sector Company [7], Las TIC en el Ecuador [8], Tecnologías de Información y Comunicación Impactan la Optimización de los Procesos para el Desarrollo Local [9], Analysis to define management of identities access control of security processes for the registration civil from Ecuador [10], security analysis of civil registry database of Ecuador [11], an approach to information security by applying a conceptual model of identities in smart cities projects [12], adequate security protocols adopt in a conceptual model in identity management for the civil registry of Ecuador [13], analysis of model Clark Wilson to adopt to the database of the civil registry of Ecuador [14], mitigating the security of the database by applying a conceptual model of integrity for the civil registry of Ecuador [15], a security algorithms approach to apply to the civil registry database of the Ecuador [16], conceptual model for identity management to mitigate the database security of the registry civil of Ecuador [17], adoption of the Hash algorithm in a conceptual model for the civil registry of Ecuador [18], an approach of efficient security algorithms for distribute architectures [19], biometric systems approach applied to a conceptual model to mitigate the integrity of the information [20], algorithms for efficient biometric systems to mitigate the integrity of a distributed database [21], analysis of efficient processes for optimization in a distributed database [22], analysis of HIPAA for adopt in the information security in the civil registry of the Ecuador [23], a blockchain approach to mitigate information security in a public organization for Ecuador [24], analysis of the appropriate security models to apply in a distributed architecture [25], optimization of an electronic signature scheme in a voting system in a distributed architecture [26], ensuring the blind signature for the electoral system in a distributed environment [27], analysis cryptographic for electronic votes in systems of distributed architectures [28], an approach to the efficient security algorithms used in voting scanning in an electoral process [29], a homomorphic encryption approach in a voting system in a distributed architecture…”
Section: Publications Related To the Research Topicmentioning
confidence: 99%