Tracing the lineage of view data in a warehousing environment
ACM Transactions on Database Systems (TODS)
A relational model of data for large shared data banks
Communications of the ACM
Object Relational DBMSs: The Next Great Wave
Object Relational DBMSs: The Next Great Wave
Using Cryptographic and Watermarking Algorithms
IEEE MultiMedia
Why and Where: A Characterization of Data Provenance
ICDT '01 Proceedings of the 8th International Conference on Database Theory
ULDBs: databases with uncertainty and lineage
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Computer Forensics
Biometric Systems and Data Protection Legislation in Germany
IIH-MSP '08 Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing
SQL Server Forensic Analysis
The case of the fake Picasso: preventing history forgery with secure provenance
FAST '09 Proccedings of the 7th conference on File and storage technologies
Provenance in Databases: Why, How, and Where
Foundations and Trends in Databases
Hi-index | 0.00 |
Biometric systems gain more and more attention in everyday life regarding authentication and surveillance of persons. This includes, amongst others, the login on a notebook based on fingerprint verification, controlling of airports or train stations, and the biometric identity card. Although these systems have several advantages in comparison to traditional approaches, they exhibit high risks regarding confidentiality and data protection issues. For instance, tampering biometric data or general misuse could have devastating consequences for the owner of the respective data. Furthermore, the digital nature of biometric data raises specific requirements for the usage of the data for crime detection or at court to convict a criminal. Here, the chain-of-custody has to be proven without any doubt. In this paper, we present a database-centric approach for ensuring the chain-ofcustody in a forensic digital fingerprint system.