CDBFIP: Common database forensic investigation processes for Internet of Things
Database forensics is a domain that uses database content and metadata to reveal
malicious activities on database systems in an Internet of Things environment. Although the …
malicious activities on database systems in an Internet of Things environment. Although the …
Bring your own disclosure: analysing BYOD threats to corporate information
Mobile device consumerisation has introduced the Bring-Your-Own-Device (BYOD) trend to
the organisational context, allowing employees to work using their personal devices …
the organisational context, allowing employees to work using their personal devices …
[PDF][PDF] Review on cloud forensics: an open discussion on challenges and capabilities
Amongst all recently emerging research paradigms, Cloud Computing is very much
significant due to its utility services provisioning with shared and virtualized resources …
significant due to its utility services provisioning with shared and virtualized resources …
Database forensics in the service of information accountability
KE Pavlou - 2012 - search.proquest.com
Regulations and societal expectations have recently emphasized the need to mediate
access to valuable databases, even by insiders. At one end of a spectrum is the approach of …
access to valuable databases, even by insiders. At one end of a spectrum is the approach of …
[PDF][PDF] Self-protection against insider threats in DBMS through policies implementation
In today's world, information security of an organization has become a major challenge as
well as a critical business issue. Managing and mitigating these internal or external security …
well as a critical business issue. Managing and mitigating these internal or external security …
[PDF][PDF] Database audit over cloud environment using forensic analysis algorithm
K Govinda, P Nelge, M Malwade - Int. J. Eng. Technol, 2013 - Citeseer
Cloud Computing is a technology that uses the internet and virtual remote servers to
maintain data and applications. Cloud computing allows consumers and organizations to …
maintain data and applications. Cloud computing allows consumers and organizations to …
Ensuring accountability for application sharing in the cloud
Cloud is a host based network service on the basis of service over internet. When large
number of users shares the applications for uploading, downloading and access control …
number of users shares the applications for uploading, downloading and access control …
Theory and practice of proactive database forensics
D Flores Armas - 2019 - wrap.warwick.ac.uk
Whilst external threats such as malware infections and SQL injection, are usually attributed
to cybercriminals (outsiders), trusted employees (insiders) with privileged access credentials …
to cybercriminals (outsiders), trusted employees (insiders) with privileged access credentials …
[PDF][PDF] Accountability Analysis and Expansion of the A4Cloud Project
PK Nanduru, V Annavarjula, T Nunna - researchgate.net
Cloud computing is the next big essential commodity that is to be grouped under the
category of electricity, water and internet. There are many issues that need to be dealt with …
category of electricity, water and internet. There are many issues that need to be dealt with …
[PDF][PDF] Year of Publication: 2016
Amongst all recently emerging research paradigms, Cloud Computing is very much
significant due to its utility services provisioning with shared and virtualized resources …
significant due to its utility services provisioning with shared and virtualized resources …