{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T16:34:49Z","timestamp":1764174889353,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,5,15]],"date-time":"2020-05-15T00:00:00Z","timestamp":1589500800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,5,15]]},"DOI":"10.1145\/3404663.3404670","type":"proceedings-article","created":{"date-parts":[[2020,7,10]],"date-time":"2020-07-10T22:10:11Z","timestamp":1594419011000},"page":"43-50","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Security Model for the Integration of the Ministry of Telecommunications and the Information Society with a Public Organization of Ecuador"],"prefix":"10.1145","author":[{"given":"Segundo Mois\u00e9s T.","family":"Toapanta","sequence":"first","affiliation":[{"name":"Computer Science Department Salesian Polytechnic University, Guayaquil, Ecuador"}]},{"given":"Gary Xavier R\u00e1zuri","family":"Peralta","sequence":"additional","affiliation":[{"name":"Computer Science Department Salesian Polytechnic University, Guayaquil, Ecuador"}]},{"given":"Luis Enrique Mafla","family":"Gallegos","sequence":"additional","affiliation":[{"name":"Computer Science Department, National Polytechnic School, Quito, Ecuador"}]}],"member":"320","published-online":{"date-parts":[[2020,7,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5614\/itbj.ict.res.appl.2015.9.1.3"},{"key":"e_1_3_2_1_2_1","first-page":"1043","article-title":"Norma de gestion documental para entidades de administracion publica","year":"2016","unstructured":"Seccretar\u00eda Nacional de Administraci\u00f3n P\u00fablica , \" Norma de gestion documental para entidades de administracion publica ,\" Acuerdo Minist. 1043 , 2016 . Seccretar\u00eda Nacional de Administraci\u00f3n P\u00fablica, \"Norma de gestion documental para entidades de administracion publica,\" Acuerdo Minist. 1043, 2016.","journal-title":"Acuerdo Minist."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2873696"},{"key":"e_1_3_2_1_4_1","first-page":"1","article-title":"Sociedad de la Informaci\u00f3n","author":"Delgado R. C.","year":"2009","unstructured":"R. C. Delgado , Ministerio de Telecomunicaciones y de la Sociedad de la Informaci\u00f3n . Ecuador , 2009 , pp. 1 -- 6 . R. C. Delgado, Ministerio de Telecomunicaciones y de la Sociedad de la Informaci\u00f3n. Ecuador, 2009, pp. 1--6.","journal-title":"Ecuador"},{"key":"e_1_3_2_1_5_1","unstructured":"Ministerio de Telecomunicaciones y Sociedad de la Informaci\u00f3n \"Ecuador da un primer paso hacia la Estrategia Nacional de Comercio Electr\u00f3nico -- Ministerio de Telecomunicaciones y de la Sociedad de la Informaci\u00f3n \" MINTEL 2019. [Online]. Available: https:\/\/www.telecomunicaciones.gob.ec\/ecuador-da-un-primer-paso-hacia-la-estrategia-nacional-de-comercio-electronico\/. [Accessed: 29-Sep-2019].  Ministerio de Telecomunicaciones y Sociedad de la Informaci\u00f3n \"Ecuador da un primer paso hacia la Estrategia Nacional de Comercio Electr\u00f3nico -- Ministerio de Telecomunicaciones y de la Sociedad de la Informaci\u00f3n \" MINTEL 2019. [Online]. Available: https:\/\/www.telecomunicaciones.gob.ec\/ecuador-da-un-primer-paso-hacia-la-estrategia-nacional-de-comercio-electronico\/. [Accessed: 29-Sep-2019]."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1049\/oap-cired.2017.0799"},{"key":"e_1_3_2_1_7_1","first-page":"1","volume-title":"March","author":"Sierra Mendoza D. M.","year":"2017","unstructured":"D. M. Sierra Mendoza and M. A. Cadena Sierra , \" Modelo De Un Sistema De Gesti\u00f3n De La Seguridad De La Informaci\u00f3n Aplicada A Entidades Bancarias,\" no . March , pp. 1 -- 8 , 2017 . D. M. Sierra Mendoza and M. A. Cadena Sierra, \"Modelo De Un Sistema De Gesti\u00f3n De La Seguridad De La Informaci\u00f3n Aplicada A Entidades Bancarias,\" no. March, pp. 1--8, 2017."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.09.262"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2018EDL8068"},{"key":"e_1_3_2_1_10_1","first-page":"61","volume-title":"Conf. Sp. Mission Challenges Inf. Technol. SMC-IT 2017","volume":"2","author":"Beswick R. M.","year":"2017","unstructured":"R. M. Beswick , \"Computer security as an engineering practice: a system engineering discussion,\" Proc. - 6th IEEE Int . Conf. Sp. Mission Challenges Inf. Technol. SMC-IT 2017 , vol. 2017-Decem, no. 2 , pp. 61 -- 69 , 2017 . R. M. Beswick, \"Computer security as an engineering practice: a system engineering discussion,\" Proc. - 6th IEEE Int. Conf. Sp. Mission Challenges Inf. Technol. SMC-IT 2017, vol. 2017-Decem, no. 2, pp. 61--69, 2017."},{"key":"e_1_3_2_1_11_1","first-page":"5","volume-title":"Conf. Softw. Eng. Res. Manag. Appl. SERA 2017","author":"Jiameng S.","year":"2017","unstructured":"S. Jiameng , Z. Binrui , Q. Jing , and M. Jixin , \" A confidentiality preserving publicly verifiable computation for multivariate polynomials,\" Proc. - 2017 15th IEEE\/ACIS Int . Conf. Softw. Eng. Res. Manag. Appl. SERA 2017 , pp. 5 -- 12 , 2017 . DOI= http:\/\/dx.doi.org\/ 10.1109\/SERA.2017.7965700 10.1109\/SERA.2017.7965700 S. Jiameng, Z. Binrui, Q. Jing, and M. Jixin, \"A confidentiality preserving publicly verifiable computation for multivariate polynomials,\" Proc. - 2017 15th IEEE\/ACIS Int. Conf. Softw. Eng. Res. Manag. Appl. SERA 2017, pp. 5--12, 2017. DOI= http:\/\/dx.doi.org\/ 10.1109\/SERA.2017.7965700"},{"key":"e_1_3_2_1_12_1","volume-title":"Ser. Mater. Sci. Eng.","volume":"423","author":"Toapanta M.","unstructured":"M. Toapanta , J. Nazareno , R. Tingo , F. Mendoza , A. Orizaga , and E. Mafla , \" Analysis of the Appropriate Security Models to Apply in a Distributed Architecture,\" IOP Conf . Ser. Mater. Sci. Eng. , vol. 423 , no. 1, 2018. DOI= http:\/\/dx.doi.org\/10.1088\/1757-899X\/423\/1\/012165 10.1088\/1757-899X M. Toapanta, J. Nazareno, R. Tingo, F. Mendoza, A. Orizaga, and E. Mafla, \"Analysis of the Appropriate Security Models to Apply in a Distributed Architecture,\" IOP Conf. Ser. Mater. Sci. Eng., vol. 423, no. 1, 2018. DOI= http:\/\/dx.doi.org\/10.1088\/1757-899X\/423\/1\/012165"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2810243"},{"key":"e_1_3_2_1_14_1","first-page":"731","volume-title":"Conf. Inf. Technol. New Gener. ITNG 2015","author":"Alnatheer M. A.","year":"2015","unstructured":"M. A. Alnatheer , \"Information security culture critical success factors,\" Proc. - 12th Int . Conf. Inf. Technol. New Gener. ITNG 2015 , pp. 731 -- 735 , 2015 . DOI= http:\/\/dx.doi.org\/10.1109\/ITNG.2015.124 10.1109\/ITNG.2015.124 M. A. Alnatheer, \"Information security culture critical success factors,\" Proc. - 12th Int. Conf. Inf. Technol. New Gener. ITNG 2015, pp. 731--735, 2015. DOI= http:\/\/dx.doi.org\/10.1109\/ITNG.2015.124"},{"key":"e_1_3_2_1_15_1","volume-title":"Study of the Maturity of Information Security in Public Organizations of Ecuador","author":"\u00eda R.","year":"2018","unstructured":"R. Valencia-garc \u00eda , G. Alcaraz-m \u00e1rmol , J. Del Cioppomorstadt , and N. Vera-lucio , \" Study of the Maturity of Information Security in Public Organizations of Ecuador ,\" vol. 883 , no. January , 2018 . DOI= http:\/\/dx.doi.org\/10.1007\/978-3-030-00940-3 10.1007\/978-3-030-00940-3 R. Valencia-garc\u00eda, G. Alcaraz-m\u00e1rmol, J. Del Cioppomorstadt, and N. Vera-lucio, \"Study of the Maturity of Information Security in Public Organizations of Ecuador,\" vol. 883, no. January, 2018. DOI= http:\/\/dx.doi.org\/10.1007\/978-3-030-00940-3"},{"key":"e_1_3_2_1_16_1","first-page":"564","volume-title":"Conf. Comput. Inf. Sci. ICCOINS 2016 - Proc.","author":"Hina S.","year":"2016","unstructured":"S. Hina and D. D. Dominic , \" Information security policies: Investigation of compliance in universities,\" 2016 3rd Int . Conf. Comput. Inf. Sci. ICCOINS 2016 - Proc. , pp. 564 -- 569 , 2016 . DOI= http:\/\/dx.doi.org\/10.1109\/ICCOINS.2016.7783277 10.1109\/ICCOINS.2016.7783277 S. Hina and D. D. Dominic, \"Information security policies: Investigation of compliance in universities,\" 2016 3rd Int. Conf. Comput. Inf. Sci. ICCOINS 2016 - Proc., pp. 564--569, 2016. DOI= http:\/\/dx.doi.org\/10.1109\/ICCOINS.2016.7783277"},{"key":"e_1_3_2_1_17_1","first-page":"405","article-title":"Assets dependencies model in information security risk management","volume":"8407","author":"Breier J.","year":"2014","unstructured":"J. Breier and F. Schindler , \" Assets dependencies model in information security risk management ,\" Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics) , vol. 8407 LNCS, pp. 405 -- 412 , 2014 . DOI= http:\/\/dx.doi.org\/10.1007\/978-3-642-55032-4_40 10.1007\/978-3-642-55032-4_40 J. Breier and F. Schindler, \"Assets dependencies model in information security risk management,\" Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 8407 LNCS, pp. 405--412, 2014. DOI= http:\/\/dx.doi.org\/10.1007\/978-3-642-55032-4_40","journal-title":"Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics)"},{"issue":"2009","key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","first-page":"691","DOI":"10.1016\/j.procs.2017.12.089","article-title":"Exploring Data Security Issues and Solutions in Cloud Computing","volume":"125","author":"Kumar P. R.","year":"2018","unstructured":"P. R. Kumar , P. H. Raj , and P. Jelciana , \" Exploring Data Security Issues and Solutions in Cloud Computing ,\" Procedia Comput. Sci. , vol. 125 , no. 2009 , pp. 691 -- 697 , 2018 . DOI= https:\/\/doi.org\/10.1016\/j.procs.2017.12.089 10.1016\/j.procs.2017.12.089 P. R. Kumar, P. H. Raj, and P. Jelciana, \"Exploring Data Security Issues and Solutions in Cloud Computing,\" Procedia Comput. Sci., vol. 125, no. 2009, pp. 691--697, 2018. DOI= https:\/\/doi.org\/10.1016\/j.procs.2017.12.089","journal-title":"Procedia Comput. Sci."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.18517\/ijaseit.9.1.2739"},{"volume-title":"Information security methods-Modern research directions,\" Symmetry (Basel)","author":"Shelupanov A.","key":"e_1_3_2_1_20_1","unstructured":"A. Shelupanov , O. Evsyutin , A. Konev , E. Kostyuchenko , D. Kruchinin , and D. Nikiforov , \" Information security methods-Modern research directions,\" Symmetry (Basel) ., vol. 11 , no. 2, 2019. DOI=https:\/\/doi.org\/10.3390\/sym11020150 10.3390\/sym11020150 A. Shelupanov, O. Evsyutin, A. Konev, E. Kostyuchenko, D. Kruchinin, and D. Nikiforov, \"Information security methods-Modern research directions,\" Symmetry (Basel)., vol. 11, no. 2, 2019. DOI=https:\/\/doi.org\/10.3390\/sym11020150"},{"key":"e_1_3_2_1_21_1","first-page":"260","article-title":"Incremental analysis of evolving administrative role based access control policies","volume":"8566","author":"Ranise S.","year":"2014","unstructured":"S. Ranise and A. Truong , \" Incremental analysis of evolving administrative role based access control policies ,\" Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics) , vol. 8566 LNCS, pp. 260 -- 275 , 2014 . DOI= http:\/\/dx.doi.org\/10.1007\/978-3-662-43936-4_17 10.1007\/978-3-662-43936-4_17 S. Ranise and A. Truong, \"Incremental analysis of evolving administrative role based access control policies,\" Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 8566 LNCS, pp. 260--275, 2014. DOI= http:\/\/dx.doi.org\/10.1007\/978-3-662-43936-4_17","journal-title":"Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics)"},{"key":"e_1_3_2_1_22_1","volume-title":"Achieving Flexible and Self-Contained Data Protection in Cloud Computing,\" IEEE Access","author":"Lang B. O.","year":"2017","unstructured":"B. O. Lang , J. Wang , and Y. Liu , \" Achieving Flexible and Self-Contained Data Protection in Cloud Computing,\" IEEE Access , vol. 5 , 2017 . DOI= http:\/\/dx.doi.org\/10.1109\/ACCESS.2017.2665586 10.1109\/ACCESS.2017.2665586 B. O. Lang, J. Wang, and Y. Liu, \"Achieving Flexible and Self-Contained Data Protection in Cloud Computing,\" IEEE Access, vol. 5, 2017. DOI= http:\/\/dx.doi.org\/10.1109\/ACCESS.2017.2665586"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2782838"},{"volume-title":"Access control technologies for Big Data management systems: literature review and future trends,\" Cybersecurity","author":"Colombo P.","key":"e_1_3_2_1_24_1","unstructured":"P. Colombo and E. Ferrari , \" Access control technologies for Big Data management systems: literature review and future trends,\" Cybersecurity , vol. 2 , no. 1, 2019. DOI= http:\/\/dx.doi.org\/10.1186\/s42400-018-0020-9 10.1186\/s42400-018-0020-9 P. Colombo and E. Ferrari, \"Access control technologies for Big Data management systems: literature review and future trends,\" Cybersecurity, vol. 2, no. 1, 2019. DOI= http:\/\/dx.doi.org\/10.1186\/s42400-018-0020-9"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2812844"},{"key":"e_1_3_2_1_26_1","volume-title":"Journal of Software Engineering Research and Development","author":"Damasceno C. D. N.","year":"2018","unstructured":"C. D. N. Damasceno , P. C. Masiero , and A. Simao , Similarity testing for role-based access control systems, vol. 6, no. 1 . Journal of Software Engineering Research and Development , 2018 . DOI= http:\/\/dx.doi.org\/10.1186\/s40411-017-0045-x 10.1186\/s40411-017-0045-x C. D. N. Damasceno, P. C. Masiero, and A. Simao, Similarity testing for role-based access control systems, vol. 6, no. 1. Journal of Software Engineering Research and Development, 2018. DOI= http:\/\/dx.doi.org\/10.1186\/s40411-017-0045-x"},{"key":"e_1_3_2_1_27_1","first-page":"234","volume-title":"How to Assess Confidentiality Requirements of Corporate Assets?","author":"Cervantes G. V.","year":"2014","unstructured":"G. V. Cervantes and S. Fenz , \" How to Assess Confidentiality Requirements of Corporate Assets? ,\" pp. 234 -- 241 , 2014 . DOI= http:\/\/dx.doi.org\/10.1007\/978-3-642-55415-5_19 10.1007\/978-3-642-55415-5_19 G. V. Cervantes and S. Fenz, \"How to Assess Confidentiality Requirements of Corporate Assets?,\" pp. 234--241, 2014. DOI= http:\/\/dx.doi.org\/10.1007\/978-3-642-55415-5_19"},{"volume-title":"A Hybrid Model for Information Security Risk Assessment","author":"Haji S.","key":"e_1_3_2_1_28_1","unstructured":"S. Haji , Q. Tan , and R. S. Costa , \" A Hybrid Model for Information Security Risk Assessment ,\" vol. 8 , no. 1, pp. 100--106, 2019. DOI= http:\/\/dx.doi.org\/10.30534\/ijatcse\/2019\/1981.12019 10.30534\/ijatcse S. Haji, Q. Tan, and R. S. Costa, \"A Hybrid Model for Information Security Risk Assessment,\" vol. 8, no. 1, pp. 100--106, 2019. DOI= http:\/\/dx.doi.org\/10.30534\/ijatcse\/2019\/1981.12019"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2928120"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2757605"},{"issue":"1","key":"e_1_3_2_1_31_1","first-page":"48","article-title":"The role of safety risk management in the UK rail industry when dealing with cyber threats","volume":"8","author":"Choudhary N.","year":"2018","unstructured":"N. Choudhary , \" The role of safety risk management in the UK rail industry when dealing with cyber threats ,\" Int. J. Saf. Secur. Eng. , vol. 8 , no. 1 , pp. 48 -- 58 , 2018 . DOI= http:\/\/dx.doi.org\/10.2495\/SAFE-V8-N1-48-58 10.2495\/SAFE-V8-N1-48-58 N. Choudhary, \"The role of safety risk management in the UK rail industry when dealing with cyber threats,\" Int. J. Saf. Secur. Eng., vol. 8, no. 1, pp. 48--58, 2018. DOI= http:\/\/dx.doi.org\/10.2495\/SAFE-V8-N1-48-58","journal-title":"Int. J. Saf. Secur. Eng."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1108\/JRF-05-2018-0083"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1210\/1\/012170"},{"volume-title":"Security risk measurement for information leakage in IoT-based smart homes from a situational awareness perspective,\" Sensors (Switzerland)","author":"Park M.","key":"e_1_3_2_1_34_1","unstructured":"M. Park , H. Oh , and K. Lee , \" Security risk measurement for information leakage in IoT-based smart homes from a situational awareness perspective,\" Sensors (Switzerland) , vol. 19 , no. 9, 2019. DOI= http:\/\/dx.doi.org\/10.3390\/s19092148 10.3390\/s19092148 M. Park, H. Oh, and K. Lee, \"Security risk measurement for information leakage in IoT-based smart homes from a situational awareness perspective,\" Sensors (Switzerland), vol. 19, no. 9, 2019. DOI= http:\/\/dx.doi.org\/10.3390\/s19092148"}],"event":{"name":"ICISDM 2020: 2020 the 4th International Conference on Information System and Data Mining","acronym":"ICISDM 2020","location":"Hawaii HI USA"},"container-title":["Proceedings of the 2020 the 4th International Conference on Information System and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3404663.3404670","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3404663.3404670","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:18Z","timestamp":1750199898000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3404663.3404670"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,15]]},"references-count":34,"alternative-id":["10.1145\/3404663.3404670","10.1145\/3404663"],"URL":"https:\/\/doi.org\/10.1145\/3404663.3404670","relation":{},"subject":[],"published":{"date-parts":[[2020,5,15]]},"assertion":[{"value":"2020-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}