Changeset c28750d in libros for recopilacionInicial/recopilacion.toc
- Timestamp:
- Feb 26, 2014, 1:40:01 PM (10 years ago)
- Branches:
- master, revisionfinal
- Children:
- 6da9253
- Parents:
- 0a8ff4e
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
recopilacionInicial/recopilacion.toc
r0a8ff4e rc28750d 73 73 \contentsline {part}{II\hspace {1em}Aportes de CENDITEL en la Seguridad vinculada a la Identidad Digital en las TIC}{59} 74 74 \contentsline {chapter}{\numberline {5}Certificaci\IeC {\'o}n Electr\IeC {\'o}nica}{61} 75 \contentsline {chapter}{\numberline {6}Firmas Electr\IeC {\'o}nicas}{63} 76 \contentsline {chapter}{\numberline {7}Anonimato}{65} 77 \contentsline {section}{\numberline {7.1}Modelo de protocolo para un sistema an\IeC {\'o}nimo basado en estrategias bio-inspiradas}{65} 78 \contentsline {section}{\numberline {7.2}Sistema de medici\IeC {\'o}n alternativo}{65} 75 \contentsline {section}{\numberline {5.1}Introducci\'on}{62} 76 \contentsline {section}{\numberline {5.2}Marco Te'orico}{63} 77 \contentsline {subsection}{\numberline {5.2.1}Seguridad Inform\'atica}{63} 78 \contentsline {subsection}{\numberline {5.2.2}Criptograf\'ia}{64} 79 \contentsline {subsection}{\numberline {5.2.3}Certificados digitales}{65} 80 \contentsline {subsection}{\numberline {5.2.4}Est\'andar X.509}{65} 81 \contentsline {subsection}{\numberline {5.2.5}Lenguaje Unificado de Modelado}{67} 82 \contentsline {subsection}{\numberline {5.2.6}Software Libre}{68} 83 \contentsline {section}{\numberline {5.3}Infraestructura de Clave P\'ublica}{68} 84 \contentsline {subsection}{\numberline {5.3.1}Componentes de la Infraestructura de Claves P\'ublica (ICP)}{69} 85 \contentsline {section}{\numberline {5.4}Desarrollo de la aplicaci\'on}{70} 86 \contentsline {subsection}{\numberline {5.4.1}Conceptualizaci\'on}{70} 87 \contentsline {subsection}{\numberline {5.4.2}Dise\~no}{71} 88 \contentsline {subsection}{\numberline {5.4.3}Implementaci\'on}{73} 89 \contentsline {subsection}{\numberline {5.4.4}Pruebas}{75} 90 \contentsline {subsection}{\numberline {5.4.5}Despliegue y configuraci\'on}{76} 91 \contentsline {section}{\numberline {5.5}Conclusiones}{77} 92 \contentsline {section}{\numberline {5.6}Glosario}{78} 93 \contentsline {chapter}{\numberline {6}Firmas Electr\IeC {\'o}nicas}{81} 94 \contentsline {section}{\numberline {6.1}Introducci\IeC {\'o}n}{81} 95 \contentsline {section}{\numberline {6.2}El modelo actual de Firma Electr\IeC {\'o}nica}{82} 96 \contentsline {section}{\numberline {6.3}Antecedentes}{84} 97 \contentsline {section}{\numberline {6.4}Acoplamiento de la Firma Electr\IeC {\'o}nica Avanzada}{85} 98 \contentsline {subsection}{\numberline {6.4.1}Componente de Firma Electr\IeC {\'o}nica Avanzada}{85} 99 \contentsline {subsection}{\numberline {6.4.2}M\IeC {\'e}todo de conex\IeC {\'\i }\IeC {\'o}n}{87} 100 \contentsline {section}{\numberline {6.5}Casos de estudio}{89} 101 \contentsline {subsection}{\numberline {6.5.1}Caso OpenERP }{90} 102 \contentsline {subsection}{\numberline {6.5.2}Caso SAID}{92} 103 \contentsline {subsection}{\numberline {6.5.3}Caso Flujos de Trabajo}{93} 104 \contentsline {section}{\numberline {6.6}Conclusiones}{94} 105 \contentsline {chapter}{\numberline {7}Anonimato}{101} 106 \contentsline {section}{\numberline {7.1}Modelo de protocolo para un sistema an\IeC {\'o}nimo basado en estrategias bio-inspiradas}{101} 107 \contentsline {section}{\numberline {7.2}Sistema de medici\IeC {\'o}n alternativo}{101}
Note: See TracChangeset
for help on using the changeset viewer.