A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Forensic analysis of database tampering
2006
Proceedings of the 2006 ACM SIGMOD international conference on Management of data - SIGMOD '06
Regulations and societal expectations have recently expressed the need to mediate access to valuable databases, even by insiders. One approach is tamper detection via cryptographic hashing. This article shows how to determine when the tampering occurred, what data was tampered with, and perhaps, ultimately, who did the tampering, via forensic analysis. We present four successively more sophisticated forensic analysis algorithms: the Monochromatic, RGBY, Tiled Bitmap, and a3D algorithms, and
doi:10.1145/1142473.1142487
dblp:conf/sigmod/PavlouS06
fatcat:wxhmqcsfxbfahdluyboqs4ullm