Scientific Research An Academic Publisher
OPEN ACCESS
Add your e-mail address to receive free newsletters from SCIRP.
Select Journal AA AAD AAR AASoci AAST ABB ABC ABCR ACES ACS ACT AD ADR AE AER AHS AID AiM AIT AJAC AJC AJCC AJCM AJIBM AJMB AJOR AJPS ALAMT ALC ALS AM AMI AMPC ANP APD APE APM ARS ARSci AS ASM BLR CC CE CellBio ChnStd CM CMB CN CRCM CS CSTA CUS CWEEE Detection EMAE ENG EPE ETSN FMAR FNS GEP GIS GM Graphene GSC Health IB ICA IIM IJAA IJAMSC IJCCE IJCM IJCNS IJG IJIDS IJIS IJMNTA IJMPCERO IJNM IJOC IJOHNS InfraMatics JACEN JAMP JASMI JBBS JBCPR JBiSE JBM JBNB JBPC JCC JCDSA JCPT JCT JDAIP JDM JEAS JECTC JEMAA JEP JFCMV JFRM JGIS JHEPGC JHRSS JIBTVA JILSA JIS JMF JMGBND JMMCE JMP JPEE JQIS JSBS JSEA JSEMAT JSIP JSS JSSM JST JTR JTST JTTs JWARP LCE MC ME MI MME MNSMS MPS MR MRC MRI MSA MSCE NJGC NM NR NS OALib OALibJ ODEM OJA OJAB OJAcct OJAnes OJAP OJApo OJAppS OJAPr OJAS OJBD OJBIPHY OJBM OJC OJCB OJCD OJCE OJCM OJD OJDer OJDM OJE OJEE OJEM OJEMD OJEpi OJER OJF OJFD OJG OJGas OJGen OJI OJIC OJIM OJINM OJL OJM OJMC OJMetal OJMH OJMI OJMIP OJML OJMM OJMN OJMP OJMS OJMSi OJN OJNeph OJO OJOG OJOGas OJOp OJOph OJOPM OJOTS OJPathology OJPC OJPChem OJPed OJPM OJPP OJPS OJPsych OJRA OJRad OJRD OJRM OJS OJSS OJSST OJST OJSTA OJTR OJTS OJU OJVM OPJ POS PP PST PSYCH SAR SCD SGRE SM SN SNL Soft SS TEL TI UOAJ VP WET WJA WJCD WJCMP WJCS WJET WJM WJNS WJNSE WJNST WJV WSN YM
More>>
J. Zhang, A. Chapman and K. LeFevre, “Do You KnowWhere Your Data’s Been?—Tamper-Evident Database Provenance,” Proceedings of the 6th VLDB Workshop on Secure Data Management, Lyon, 28 August 2009. doi:10.1007/978-3-642-04219-5_2
has been cited by the following article:
TITLE: Digital Evidence for Database Tamper Detection
AUTHORS: Shweta Tripathi, Bandu Baburao Meshram
KEYWORDS: Tamper Detection; Log Files; Forensics; Oracle Database
JOURNAL NAME: Journal of Information Security, Vol.3 No.2, April 26, 2012
ABSTRACT: Most secure database is the one you know the most. Tamper detection compares the past and present status of the system and produces digital evidence for forensic analysis. Our focus is on different methods or identification of different locations in an oracle database for collecting the digital evidence for database tamper detection. Starting with the basics of oracle architecture, continuing with the basic steps of forensic analysis the paper elaborates the extraction of suspicious locations in oracle. As a forensic examiner, collecting digital evidence in a database is a key factor. Planned and a modelled way of examination will lead to a valid detection. Based on the literature survey conducted on different aspects of collecting digital evidence for database tamper detection, the paper proposes a block diagram which may guide a database forensic examiner to obtain the evidences.
Related Articles:
New Data on the Litho- and Biostratigraphy of the J/K Boundary Interval of the Lower Reaches of the Lena River (Eastern Siberia)
Igor N. Kosenko, Olga S. Urman, Egor K. Metelkin, Boris N. Shurygin, Alexander E. Igolnikov
DOI: 10.4236/ojg.2019.910040 180 Downloads 344 Views Citations
Pub. Date: September 20, 2019
Have You Considered Eating Your Weeds?
Willem Sternberg Jansen van Rensburg, Michele Cloete, Abe Shegro Gerrano, Patrick Olusanmi Adebola
DOI: 10.4236/ajps.2014.58123 4,633 Downloads 6,467 Views Citations
Pub. Date: March 26, 2014
Using Database Management System to Generate, Manage and Secure Personal Identification Numbers (PIN)
Dipo Theophilus Akomolafe, Babajide Olakunle Afeni
DOI: 10.4236/jsea.2014.75043 6,454 Downloads 7,641 Views Citations
Pub. Date: May 28, 2014
A Comparative Study of Unstructured Data with SQL and NO-SQL Database Management Systems
Ahsan Malik, Aqil Burney, Fawad Ahmed
DOI: 10.4236/jcc.2020.84005 376 Downloads 1,277 Views Citations
Pub. Date: April 15, 2020
Be Your Best You: An Evaluation of a Positive Psychology Intervention Programme in Greece
Aikaterini Kotsoni, Antigoni Mertika, Anastasios Stalikas
DOI: 10.4236/psych.2020.117067 188 Downloads 397 Views Citations
Pub. Date: July 27, 2020