Computer
Partitioned storage for temporal databases
Information Systems
Access methods for multiversion data
SIGMOD '89 Proceedings of the 1989 ACM SIGMOD international conference on Management of data
Database Management Systems
Rights protection for relational data
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
Tamper detection and localization for categorical data using fragile watermarks
Proceedings of the 4th ACM workshop on Digital rights management
Unified Modeling Language User Guide, The (2nd Edition) (Addison-Wesley Object Technology Series)
Unified Modeling Language User Guide, The (2nd Edition) (Addison-Wesley Object Technology Series)
Forensic analysis of database tampering
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Watermarking relational databases
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Tamper detection in audit logs
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Communications of the ACM - Organic user interfaces
Forensic analysis of database tampering
ACM Transactions on Database Systems (TODS)
An Architecture for Regulatory Compliant Database Management
ICDE '09 Proceedings of the 2009 IEEE International Conference on Data Engineering
Trustworthy and cost effective management of compliance records
Trustworthy and cost effective management of compliance records
A fragile watermarking scheme for detecting malicious modifications of database relations
Information Sciences: an International Journal
The Tiled Bitmap Forensic Analysis Algorithm
IEEE Transactions on Knowledge and Data Engineering
Encyclopedia of Database Systems
Encyclopedia of Database Systems
Efficient audit-based compliance for relational data retention
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Secure Hash Standard - SHS: Federal Information Processing Standards Publication 180-4
Secure Hash Standard - SHS: Federal Information Processing Standards Publication 180-4
Auditing a database under retention policies
The VLDB Journal — The International Journal on Very Large Data Bases
Hi-index | 0.00 |
In this article we present refinements on previously proposed approaches to forensic analysis of database tampering. We significantly generalize the basic structure of these algorithms to admit new characterizations of the “where” axis of the corruption diagram. Specifically, we introduce page-based partitioning as well as attribute-based partitioning along with their associated corruption diagrams. We compare the structure of all the forensic analysis algorithms and discuss the various design choices available with respect to forensic analysis. We characterize the forensic cost of the newly introduced algorithms, compare their forensic cost, and give our recommendations. We then introduce a comprehensive taxonomy of the types of possible corruption events, along with an associated forensic analysis protocol that consolidates all extant forensic algorithms and the corresponding type(s) of corruption events they detect. The result is a generalization of these algorithms and an overarching characterization of the process of database forensic analysis, thus providing a context within the overall operation of a DBMS for all existing forensic analysis algorithms.