1. Security analysis of civil registry database of Ecuador;Student;Int. Conf. Electr. Electron. Optim. Tech. -,2016
2. R. O. S. De, H. Del, P. Barrezueta, D. E. L. E. Y. Organica, D. E. G. D. E. La, and I. Y. Datos, “Ley Orgánica de Gestión de la Identidad y Datos Civiles”, Quito, 2016.
3. I. Dubrawsky, “Chapter 1 - General Security Concepts: Access Control, Authentication, and Auditing BT - Security+ (Second Edition)”,in Security+, 2007, pp. 3–54.
4. “12 – New Authorization Tracks: Role-Based Access Control and Digital Rights Management”, inWindows Server;De Clercq;Security Infrastructures,2003
5. J. a M. S and Z. R. R, “Management and Access Control From Organizational Perspective Gestion D ’ Identites Et Contrôle D ’ Acces D ’ Apres Une Perspective Organisationnelle”, vol. 3, no. 1, pp. 23–34, 2012.