Mostrando 3 resultados de: 3
Filtros aplicados
Subtipo de publicación
Conference Object(3)
Publisher
Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017(1)
Proceedings - 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019(1)
Proceedings - 3rd International Conference on Emerging Intelligent Data and Web Technologies, EIDWT 2012(1)
Área temáticas
Funcionamiento de bibliotecas y archivos(3)
Biblioteconomía y Documentación informatica(1)
Ciencias de la computación(1)
Área de conocimiento
Finanzas(1)
Combining digital forensic practices and database analysis as an anti-money laundering strategy for financial institutions
Conference ObjectAbstract: Digital forensics is the science that identify, preserve, collect, validate, analyse, interpret, andPalabras claves:BI, Business intelligence, database log, digital forensics, ETL, extractor, FTK, MySQL, SAP, store procedureAutores:Angelopoulou O., Denys A. Flores, Self R.J.Fuentes:googlescopusHybrid logical clocks for database forensics: Filling the gap between chain of custody and database auditing
Conference ObjectAbstract: Database audit records are important for investigating suspicious actions against transactional dataPalabras claves:causality, Chain of custody, Database audit, Database forensics, Database security, Hybrid logical clocks, Provenance, Role segregationAutores:Denys A. Flores, Jhumka A.Fuentes:googlescopusImplementing chain of custody requirements in database audit records for forensic purposes
Conference ObjectAbstract: During forensic database investigations, audit records become a crucial evidential element; particulPalabras claves:Admissibility, Architecture, Audit, causality, Chain of custody, Database forensics, Proactive, Provenance, Role segregation, Stored procedure, Timeline, Trigger, Vector clockAutores:Denys A. Flores, Jhumka A.Fuentes:googlescopus