Database Application Schema Forensics

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Database application schema forensics

The application schema layer of a Database Management System (DBMS) can be modified to produce results that do not reflect the data actually stored in the database. For example, table structures may be corrupted by changing the metadata of a database, or operators of the database can be altered to produce incorrect results when used in queries. Such incorrect results may lead to a forensic exam...

متن کامل

Image Retrieval in Forensics: Application to Tattoo Image Database

The continuing growth of and increasing dependence on forensic image databases require fast and reliable image matching and retrieval techniques. We present a content-based image retrieval (CBIR) system for a particular forensic image database, namely a large collection of tattoo images. The system employs a local point descriptor to represent images, and, given a query tattoo image, it retriev...

متن کامل

A Generalizing Database Forensics

In this paper we present refinements on previously-proposed approaches to forensic analysis of database tampering. We significantly generalize the basic structure of these algorithms to admit new characterizations of the “where” axis of the corruption diagram. Specifically, we introduce page-based partitioning as well as attribute-based partitioning along with their associated corruption diagra...

متن کامل

Reconstruction in Database Forensics

The increasing usage of databases in the storage of critical and sensitive information in many organizations has led to an increase in the rate at which databases are exploited in computer crimes. Databases are often manipulated to facilitate crimes and as such are usually of interest during many investigations as useful information relevant to the investigation can be found therein. A branch o...

متن کامل

Assembling Metadata for Database Forensics

Since information is often a primary target in a computer crime, organizations that store their information in database management systems (DBMSs) must develop a capability to perform database forensics. This paper describes a database forensic method that transforms a DBMS into the required state for a database forensic investigation. The method segments a DBMS into four abstract layers that s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: South African Computer Journal

سال: 2014

ISSN: 2313-7835,1015-7999

DOI: 10.18489/sacj.v55i0.188