Regulations and societal expectations have recently expressed the need to mediate access to valu-able databases, even by insiders. One approach is tamper detection via cryptographic hashing. This article shows how to determine when the tampering occurred, what data was tampered with, and perhaps, ultimately, who did the tampering, via forensic analysis. We present four successively more sophisticated forensic analysis algorithms: the Monochromatic, RGBY, Tiled Bitmap, and a3D algorithms, and characterize their “forensic cost ” under worst-case, best-case, and average-case assumptions on the distribution of corruption sites. A lower bound on forensic cost is derived, with RGBY and a3D being shown optimal for a large number of corruptions. We...
Abstract: A computer forensic method can be used for detecting the different types of forgeries and ...
Although hash functions are a well-known method in computer science to map arbitrary large data to b...
Handling forensic investigations gets more and more difficult as the amount of data one has to analy...
Mechanisms now exist that detect tampering of a database, through the use of cryptographically-stron...
Abstract—Tampering of a database can be detected through the use of cryptographically strong hash fu...
The set of policies and the group of people need to access the valuable database by the authorized i...
Regulations and societal expectations have recently emphasized the need to mediate access to valuabl...
Abstract. Accelerating development of information technologies also causes the growth of computer cr...
Abstract — The Corporate world, government sector and many organizations has a requirement of secure...
Database as an enterprise data information aggregation is a core component its security is essential...
Many real-world applications run on untrusted servers or are run on servers that are subject to stro...
In today’s era of computing, data is a crucial entity. To store this important data and information ...
Abstract. Relational Database Management Systems (RDBMS) is collection of applications that manage t...
Communication and whole-disk cryptosystems are on the verge of becoming mainstream tools for protect...
Abstract. Database provenance chronicles the history of updates and modifica-tions to data, and has ...
Abstract: A computer forensic method can be used for detecting the different types of forgeries and ...
Although hash functions are a well-known method in computer science to map arbitrary large data to b...
Handling forensic investigations gets more and more difficult as the amount of data one has to analy...
Mechanisms now exist that detect tampering of a database, through the use of cryptographically-stron...
Abstract—Tampering of a database can be detected through the use of cryptographically strong hash fu...
The set of policies and the group of people need to access the valuable database by the authorized i...
Regulations and societal expectations have recently emphasized the need to mediate access to valuabl...
Abstract. Accelerating development of information technologies also causes the growth of computer cr...
Abstract — The Corporate world, government sector and many organizations has a requirement of secure...
Database as an enterprise data information aggregation is a core component its security is essential...
Many real-world applications run on untrusted servers or are run on servers that are subject to stro...
In today’s era of computing, data is a crucial entity. To store this important data and information ...
Abstract. Relational Database Management Systems (RDBMS) is collection of applications that manage t...
Communication and whole-disk cryptosystems are on the verge of becoming mainstream tools for protect...
Abstract. Database provenance chronicles the history of updates and modifica-tions to data, and has ...
Abstract: A computer forensic method can be used for detecting the different types of forgeries and ...
Although hash functions are a well-known method in computer science to map arbitrary large data to b...
Handling forensic investigations gets more and more difficult as the amount of data one has to analy...