CDBFIP: Common database forensic investigation processes for Internet of Things

A Al-Dhaqm, S Razak, SH Othman, KKR Choo… - IEEE …, 2017 - ieeexplore.ieee.org
Database forensics is a domain that uses database content and metadata to reveal
malicious activities on database systems in an Internet of Things environment. Although the …

Bring your own disclosure: analysing BYOD threats to corporate information

DA Flores, F Qazi, A Jhumka - 2016 IEEE Trustcom/BigDataSE …, 2016 - ieeexplore.ieee.org
Mobile device consumerisation has introduced the Bring-Your-Own-Device (BYOD) trend to
the organisational context, allowing employees to work using their personal devices …

[PDF][PDF] Review on cloud forensics: an open discussion on challenges and capabilities

S Datta, K Majumder, D De - International Journal of Computer …, 2016 - researchgate.net
Amongst all recently emerging research paradigms, Cloud Computing is very much
significant due to its utility services provisioning with shared and virtualized resources …

Database forensics in the service of information accountability

KE Pavlou - 2012 - search.proquest.com
Regulations and societal expectations have recently emphasized the need to mediate
access to valuable databases, even by insiders. At one end of a spectrum is the approach of …

[PDF][PDF] Self-protection against insider threats in DBMS through policies implementation

F Zaman, B Raza, AK Malik… - International Journal of …, 2017 - pdfs.semanticscholar.org
In today's world, information security of an organization has become a major challenge as
well as a critical business issue. Managing and mitigating these internal or external security …

[PDF][PDF] Database audit over cloud environment using forensic analysis algorithm

K Govinda, P Nelge, M Malwade - Int. J. Eng. Technol, 2013 - Citeseer
Cloud Computing is a technology that uses the internet and virtual remote servers to
maintain data and applications. Cloud computing allows consumers and organizations to …

Ensuring accountability for application sharing in the cloud

AT Bhole, SD Rajput - 2013 IEEE International Conference on …, 2013 - ieeexplore.ieee.org
Cloud is a host based network service on the basis of service over internet. When large
number of users shares the applications for uploading, downloading and access control …

Theory and practice of proactive database forensics

D Flores Armas - 2019 - wrap.warwick.ac.uk
Whilst external threats such as malware infections and SQL injection, are usually attributed
to cybercriminals (outsiders), trusted employees (insiders) with privileged access credentials …

[PDF][PDF] Accountability Analysis and Expansion of the A4Cloud Project

PK Nanduru, V Annavarjula, T Nunna - researchgate.net
Cloud computing is the next big essential commodity that is to be grouped under the
category of electricity, water and internet. There are many issues that need to be dealt with …

[PDF][PDF] Year of Publication: 2016

S Datta, C Pan - 2016 - academia.edu
Amongst all recently emerging research paradigms, Cloud Computing is very much
significant due to its utility services provisioning with shared and virtualized resources …