Toapanta T. Moises, Orizaga T. Antonio, M. G. Enrique
{"title":"一种适用于厄瓜多尔民事登记数据库的安全算法方法","authors":"Toapanta T. Moises, Orizaga T. Antonio, M. G. Enrique","doi":"10.1109/CITS.2017.8035339","DOIUrl":null,"url":null,"abstract":"It was analyzed the most frequent security algorithms used for information security to mitigate the integrity, confidentiality and availability of the information. The objective is to have an approach on security algorithms and define a quantitative algorithm using flowchart techniques for a process of Ecuador civil registry database. The deductive method was used to analyze the information of the references and to identify the trends of the security algorithms; which allow mitigation of the security of a database under a distributed environment. Turned out the prototype of a process applying the technique of flowchart algorithms. It was concluded that to mitigate information vulnerabilities and risks with integrity, confidentiality and availability; it is necessary to have an identity management model, to identify a model of threats and risks, to select operational, tactical and strategic security policies, to define mechanisms for compliance with policies, to develop encryption algorithms using the flow diagram technique.","PeriodicalId":314150,"journal":{"name":"2017 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"A security algorithms approach to apply to the civil registry database of the Ecuador\",\"authors\":\"Toapanta T. Moises, Orizaga T. Antonio, M. G. Enrique\",\"doi\":\"10.1109/CITS.2017.8035339\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"It was analyzed the most frequent security algorithms used for information security to mitigate the integrity, confidentiality and availability of the information. The objective is to have an approach on security algorithms and define a quantitative algorithm using flowchart techniques for a process of Ecuador civil registry database. The deductive method was used to analyze the information of the references and to identify the trends of the security algorithms; which allow mitigation of the security of a database under a distributed environment. Turned out the prototype of a process applying the technique of flowchart algorithms. It was concluded that to mitigate information vulnerabilities and risks with integrity, confidentiality and availability; it is necessary to have an identity management model, to identify a model of threats and risks, to select operational, tactical and strategic security policies, to define mechanisms for compliance with policies, to develop encryption algorithms using the flow diagram technique.\",\"PeriodicalId\":314150,\"journal\":{\"name\":\"2017 International Conference on Computer, Information and Telecommunication Systems (CITS)\",\"volume\":\"66 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Conference on Computer, Information and Telecommunication Systems (CITS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CITS.2017.8035339\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Computer, Information and Telecommunication Systems (CITS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CITS.2017.8035339","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A security algorithms approach to apply to the civil registry database of the Ecuador
It was analyzed the most frequent security algorithms used for information security to mitigate the integrity, confidentiality and availability of the information. The objective is to have an approach on security algorithms and define a quantitative algorithm using flowchart techniques for a process of Ecuador civil registry database. The deductive method was used to analyze the information of the references and to identify the trends of the security algorithms; which allow mitigation of the security of a database under a distributed environment. Turned out the prototype of a process applying the technique of flowchart algorithms. It was concluded that to mitigate information vulnerabilities and risks with integrity, confidentiality and availability; it is necessary to have an identity management model, to identify a model of threats and risks, to select operational, tactical and strategic security policies, to define mechanisms for compliance with policies, to develop encryption algorithms using the flow diagram technique.