Analysis of the Appropriate Security Models to Apply in a Distributed Architecture

Moisés Toapanta, Jean Nazareno, Raúl Tingo, Felix Mendoza, Antonio Orizaga, Enrique Mafla

Producción científica: Contribución a una conferenciaDocumento

8 Citas (Scopus)

Resumen

© 2018 Institute of Physics Publishing. All rights reserved. The availability of information generated on a large scale has allowed sharing without considering the levels of risk that can be caused by not considering the confidentiality, integrity and authenticity of the information; any misuse, destruction, modification or unauthorized access with confidentiality, integrity and authentication information in an organization may affect the privacy or well-being of individuals and society. The objective is to perform the analysis of security models to generate a prototype of model to mitigate information security problems. The deductive method was used to review and analyse the referenced information and identify the ideal security models that allow to improve the security of information in a distributed architecture. Turned out a prototype model merging the characteristics of the BiBa model and the Bell-Lapadula model, creating a new model that offers integrity, confidentiality and access control as an alternative to improve the security of information. It was concluded that it is necessary to have an appropriate security model that conforms to the objectives, operational, tactical and strategic of the organization to mitigate the confidentiality, integrity and authenticity.
Idioma originalInglés
DOI
EstadoPublicada - 6 nov. 2018
EventoIOP Conference Series: Materials Science and Engineering - , Reino Unido
Duración: 19 may. 2015 → …

Conferencia

ConferenciaIOP Conference Series: Materials Science and Engineering
País/TerritorioReino Unido
Período19/05/15 → …

Huella

Profundice en los temas de investigación de 'Analysis of the Appropriate Security Models to Apply in a Distributed Architecture'. En conjunto forman una huella única.

Citar esto