Por favor, use este identificador para citar o enlazar este ítem: https://repositorio.uti.edu.ec//handle/123456789/6956
Registro completo de metadatos
Campo DC Valor Lengua/Idioma
dc.contributor.authorNavarro, Fauricio Alban Conejo-
dc.contributor.authorGarcía, Melvin-
dc.contributor.authorJadán-Guerrero, Janio-
dc.date.accessioned2024-07-29T20:16:13Z-
dc.date.available2024-07-29T20:16:13Z-
dc.date.issued2024-
dc.identifier.urihttps://link.springer.com/chapter/10.1007/978-3-031-45642-8_18-
dc.identifier.urihttps://repositorio.uti.edu.ec//handle/123456789/6956-
dc.description.abstractWe can say technological security is in constant change. Security is constantly changing by the industry, because it is necessary to improve the integrity of technological security. These changes in technology come with new methods, processes, and technologies which lead to the need to be ahead in the new trends. The AAAA (Authentication, Authorization, Administration, Audit) is a topic of great relevance in organizations, it is a matter for everyone. This paper attempts to evaluate the variation presented in the Access Management after implementing digital security plans. The evaluation is visualized as an accompaniment for the improvement of the effectiveness in future decisions-making processes. The result of this analysis aims to find new improvement opportunities, due to the positive impact to growth in this field. The intention is to close the gap between the financial and technological security issues. Nowadays these issues are evaluated individually, and we pretend to unify these subjects.es
dc.language.isoenges
dc.publisherLecture Notes in Networks and Systems. Volume 799 LNNS, Pages 187 - 193es
dc.rightsopenAccesses
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/es
dc.titleAuthentication, Authorization, Administration and Audit Impact on Digital Securityes
dc.typearticlees
Aparece en las colecciones: Artículos Científicos Indexados

Ficheros en este ítem:
Fichero Descripción Tamaño Formato  
Dspace.docx11,75 kBMicrosoft Word XMLVisualizar/Abrir


Este ítem está sujeto a una licencia Creative Commons Licencia Creative Commons Creative Commons