Analysis of Suitable Security Protocols for Apply a Model of Identity in the Civil Registry of Ecuador

Authors

  • Moisés Toapanta Computer Science Department, Universidad Politécnica Salesiana del Ecuador Chambers 227 and 5 of Junio, Guayaquil, Ecuador
  • Enrique Mafla Bachelor in Engineering Systems, Escuela Politécnica Nacional Ladrón de Guevara E11-253, Quito, Ecuador
  • José Orizaga Information Systems Department CUCEA, Universidad de Guadalajara Periférico Norte N° 799, Núcleo Universitario Los Belenes, C.P. 45100, Zapopan, Jalisco, México

DOI:

https://doi.org/10.18488/journal.76/2016.3.4/76.4.65.68

Abstract

Different security protocols were analyzed are used for a centralized database with distributed architecture. The goal is identify adequate security protocols to mitigate the security of information through identity of a model without relying on technological infrastructures. In this phase the suitable security protocols for a model of identity authentication, authorization and auditing (AAA) was analyzed. Deductive method is used in exploratory research to analyze security protocols more used among the main mentioned: Feret, Kerberos, Radius, Dnssec, Ipsec, Pgp, Secure Rpc, Set, Ssl, Tls, Maille, Eap, Pap, Map, Diameter, Peap, among others. It turned out that security protocols should be adopted on a model of identity for a centralized data base. It was concluded that protocols and security algorithms must have a direct relation to the identity model; allowing mitigate the vulnerabilities and risks considering To mitigate the threats and risks of information with confidentiality, integrity and availability. The technological infrastructure should not influence the implementation of different security protocols.

Keywords:

Security protocols, Algorithms, Models of identity, Authentication, Authorization

Abstract Video

Downloads

Download data is not yet available.

Published

2016-12-07

How to Cite

Toapanta, M. ., Mafla, E. ., & Orizaga, J. . (2016). Analysis of Suitable Security Protocols for Apply a Model of Identity in the Civil Registry of Ecuador. Review of Computer Engineering Research, 3(4), 65–68. https://doi.org/10.18488/journal.76/2016.3.4/76.4.65.68

Issue

Section

Articles