IDEAS home Printed from https://ideas.repec.org/a/pkp/rocere/v3y2016i4p65-68id1448.html
   My bibliography  Save this article

Analysis of Suitable Security Protocols for Apply a Model of Identity in the Civil Registry of Ecuador

Author

Listed:
  • Moisés Toapanta
  • Enrique Mafla
  • José Orizaga

Abstract

Different security protocols were analyzed are used for a centralized database with distributed architecture. The goal is identify adequate security protocols to mitigate the security of information through identity of a model without relying on technological infrastructures. In this phase the suitable security protocols for a model of identity authentication, authorization and auditing (AAA) was analyzed. Deductive method is used in exploratory research to analyze security protocols more used among the main mentioned: Feret, Kerberos, Radius, Dnssec, Ipsec, Pgp, Secure Rpc, Set, Ssl, Tls, Maille, Eap, Pap, Map, Diameter, Peap, among others. It turned out that security protocols should be adopted on a model of identity for a centralized data base. It was concluded that protocols and security algorithms must have a direct relation to the identity model; allowing mitigate the vulnerabilities and risks considering To mitigate the threats and risks of information with confidentiality, integrity and availability. The technological infrastructure should not influence the implementation of different security protocols.

Suggested Citation

  • Moisés Toapanta & Enrique Mafla & José Orizaga, 2016. "Analysis of Suitable Security Protocols for Apply a Model of Identity in the Civil Registry of Ecuador," Review of Computer Engineering Research, Conscientia Beam, vol. 3(4), pages 65-68.
  • Handle: RePEc:pkp:rocere:v:3:y:2016:i:4:p:65-68:id:1448
    as

    Download full text from publisher

    File URL: https://archive.conscientiabeam.com/index.php/76/article/view/1448/2022
    Download Restriction: no
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:pkp:rocere:v:3:y:2016:i:4:p:65-68:id:1448. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Dim Michael (email available below). General contact details of provider: https://archive.conscientiabeam.com/index.php/76/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.