Back to Results
First PageMeta Content
Data management / Search algorithms / Information / Security / Cryptography / Digital watermarking / Database / Relational database / Hash function / Watermarking / Database theory / Database management systems


Database Forensics in the Service of Information Accountability Kyriacos E. Pavlou Department of Computer Science The University of Arizona P.O. Box
Add to Reading List

Document Date: 2011-11-15 03:32:08


Open Document

File Size: 171,62 KB

Share Result on Facebook

City

Efficient Audit / New York / /

Company

IBM / Continuous Assurance Systems / Enron / EMC / NetApp / Database Systems / Cost Effective Management / Creative Commons / Surety LLC / WorldCom / /

Country

United States / /

/

Event

Reorganization / /

Facility

Computer Science The University of Arizona P.O. Box / University of Illinois / University of Arizona / /

IndustryTerm

forensic analysis protocol / forensic analysis protocols / storage devices / protection-software/snaplock.html / enterprise-wide solution / interwoven chain / forensic tools / assurance technology / extant forensic algorithms / file systems / fundamental algorithmic tools / forensic analysis algorithms / forensic protocols / forensic analysis tools / digital notarization services / enterprise-wide information accountability solution / forensic algorithms / record management systems / detection algorithm / read-only file systems / a3D algorithm / /

Organization

National Science Foundation / VLDB Endowment / University of Illinois / Department of Computer Science / U.S. Food and Drug Administration / F.D.A. / Service of Information Accountability Kyriacos E. Pavlou Department / Department of Health / University of Arizona / /

Person

G. Wingate / Richard T. Snodgrass / Radu Sion / Joseph Watkins / Marianne Winslett / Nirav Merchant / Soumyadeb Mitra / Peter Downey / /

/

Position

editor / auditor / Scientist / author / Chief Security Officer / /

ProvinceOrState

Illinois / New York / Arizona / /

PublishedMedium

Communications of the ACM / Journal of Cryptology / Lecture Notes in Computer Science / /

Technology

three algorithms / Peer-to-Peer / previous algorithms / forensic analysis protocols / forensic analysis protocol / assurance technology / secret key / forensic protocols / html / Operating Systems / DBMS / Tiled Bitmap Forensic Analysis Algorithm / pdf / forensic analysis algorithms / a3D Algorithm / extant forensic algorithms / cryptography / existing forensic analysis algorithms / Static-Level a3D Algorithm / forensic algorithms / http / detection algorithm / /

URL

http /

SocialTag