A security algorithms approach to apply to the civil registry database of the Ecuador

Segundo Moisés Toapanta Toapanta, Orizaga T. Antonio, Mafla G. Enrique

Research output: Contribution to conferencePaper

2 Scopus citations

Abstract

© 2017 IEEE. It was analyzed the most frequent security algorithms used for information security to mitigate the integrity, confidentiality and availability of the information. The objective is to have an approach on security algorithms and define a quantitative algorithm using flowchart techniques for a process of Ecuador civil registry database. The deductive method was used to analyze the information of the references and to identify the trends of the security algorithms; which allow mitigation of the security of a database under a distributed environment. Turned out the prototype of a process applying the technique of flowchart algorithms. It was concluded that to mitigate information vulnerabilities and risks with integrity, confidentiality and availability; it is necessary to have an identity management model, to identify a model of threats and risks, to select operational, tactical and strategic security policies, to define mechanisms for compliance with policies, to develop encryption algorithms using the flow diagram technique.
Translated title of the contributionUn enfoque de algoritmos de seguridad para aplicar a la base de datos del registro civil del Ecuador
Original languageEnglish
Pages287-290
Number of pages4
DOIs
StatePublished - 12 Sep 2017
EventIEEE CITS 2017 - 2017 International Conference on Computer, Information and Telecommunication Systems -
Duration: 12 Sep 2017 → …

Conference

ConferenceIEEE CITS 2017 - 2017 International Conference on Computer, Information and Telecommunication Systems
Period12/09/17 → …

Fingerprint

Dive into the research topics of 'A security algorithms approach to apply to the civil registry database of the Ecuador'. Together they form a unique fingerprint.

Cite this