Abstract
© 2016 IEEE. It considers at this stage to define the structure of reliability and safe future identification system and develop or adopt appropriate algorithms and security protocols to cover vulnerabilities and risks of information. The analysis applies to exploratory research and determined that the database is inconsistent. Finally, it is necessary to have established a system of identification, authentication, authorization and auditing to mitigate the confidentiality, integrity and availability of information to work in a distributed architecture.
Original language | English |
---|---|
Pages | 1024-1029 |
Number of pages | 6 |
DOIs | |
State | Published - 22 Nov 2016 |
Event | International Conference on Electrical, Electronics, and Optimization Techniques, ICEEOT 2016 - Duration: 22 Nov 2016 → … |
Conference
Conference | International Conference on Electrical, Electronics, and Optimization Techniques, ICEEOT 2016 |
---|---|
Period | 22/11/16 → … |