Development and validation of a Database Forensic Metamodel (DBFM)
نویسندگان
چکیده
Database Forensics (DBF) is a widespread area of knowledge. It has many complex features and is well known amongst database investigators and practitioners. Several models and frameworks have been created specifically to allow knowledge-sharing and effective DBF activities. However, these are often narrow in focus and address specified database incident types. We have analysed 60 such models in an attempt to uncover how numerous DBF activities are really public even when the actions vary. We then generate a unified abstract view of DBF in the form of a metamodel. We identified, extracted, and proposed a common concept and reconciled concept definitions to propose a metamodel. We have applied a metamodelling process to guarantee that this metamodel is comprehensive and consistent.
منابع مشابه
A metamodel for mobile forensics investigation domain
With the rapid development of technology, mobile phones have become an essential tool in terms of crime fighting and criminal investigation. However, many mobile forensics investigators face difficulties with the investigation process in their domain. These difficulties are due to the heavy reliance of the forensics field on knowledge which, although a valuable resource, is scattered and widely...
متن کاملScope of Practice of Forensic Midwifery: An Integrative Review
Background & aim: Forensic midwifery is a new major which has been established in response to the need of endangered women for forensic services and also the lack of service provision in this domain. However, there are ambiguities in the definition of this major and its scope of practice. The present study was conducted to investigate the scope of practice in forensic ...
متن کاملThe TEMPORA Deductive Repository: Metamodelling and Validation Support
In this paper, the development of the TEMPORA Metamodel in the deductive Database Management System MegaLog is described. This provides the basis for the development of an analysis tool for verification and validation of the TEMPORA specification. The functionality of this analysis tool with respect to the verification and validation of business rules expressed in the Conceptual Rule Language (...
متن کاملDesign of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method
Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...
متن کاملProceedings of the 2015 Winter Simulation Conference
In the simulation-on-demand paradigm, we invest computational effort by running a simulation experiment before a question is asked, and then we quickly provide an answer by making use of the results of the earlier simulation experiment. This can be done by building a metamodel, but standard metamodeling methods used in stochastic simulation have the disadvantage that they require validation. We...
متن کامل