{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,2]],"date-time":"2024-06-02T07:08:26Z","timestamp":1717312106527},"reference-count":29,"publisher":"Association for Computing Machinery (ACM)","issue":"2","funder":[{"DOI":"10.13039\/100000145","name":"Division of Information and Intelligent Systems","doi-asserted-by":"publisher","award":["IIS-0415101, IIS-0639106, IIS-0803229, IIS-1016205, and EIA-0080123"],"id":[{"id":"10.13039\/100000145","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["IIS-0415101, IIS-0639106, IIS-0803229, IIS-1016205, and EIA-0080123"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100004318","name":"Microsoft","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100004318","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Database Syst."],"published-print":{"date-parts":[[2013,6]]},"abstract":"\n In this article we present refinements on previously proposed approaches to forensic analysis of database tampering. We significantly generalize the basic structure of these algorithms to admit new characterizations of the \u201cwhere\u201d axis of the corruption diagram. Specifically, we introduce\n page-based partitioning<\/jats:italic>\n as well as\n attribute-based partitioning<\/jats:italic>\n along with their associated corruption diagrams. We compare the structure of all the forensic analysis algorithms and discuss the various design choices available with respect to forensic analysis. We characterize the forensic cost of the newly introduced algorithms, compare their forensic cost, and give our recommendations.\n <\/jats:p>\n \n We then introduce a comprehensive\n taxonomy<\/jats:italic>\n of the types of possible corruption events, along with an associated\n forensic analysis protocol<\/jats:italic>\n that consolidates all extant forensic algorithms and the corresponding type(s) of corruption events they detect. The result is a generalization of these algorithms and an overarching characterization of the process of database forensic analysis, thus providing a context within the overall operation of a DBMS for all existing forensic analysis algorithms.\n <\/jats:p>","DOI":"10.1145\/2487259.2487264","type":"journal-article","created":{"date-parts":[[2013,7,2]],"date-time":"2013-07-02T14:32:49Z","timestamp":1372775569000},"page":"1-43","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Generalizing database forensics"],"prefix":"10.1145","volume":"38","author":[{"given":"Kyriacos E.","family":"Pavlou","sequence":"first","affiliation":[{"name":"University of Arizona, Tucson, AZ"}]},{"given":"Richard T.","family":"Snodgrass","sequence":"additional","affiliation":[{"name":"University of Arizona, Tucson, AZ"}]}],"member":"320","published-online":{"date-parts":[[2013,7,4]]},"reference":[{"key":"e_1_2_2_1_1","volume-title":"Proceedings of the International Conference on Very Large Databases. VLDB Endowment, 155--166","author":"Agrawal R."},{"key":"e_1_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4379(88)90004-X"},{"key":"e_1_2_2_3_1","first-page":"25","article-title":"Notions of upward compatibility of temporal query languages","volume":"39","author":"Bair J.","year":"1997","journal-title":"Business Informatics (Wirtschafts Informatik)"},{"key":"e_1_2_2_4_1","unstructured":"Basu A. 2006. Forensic tamper detection in SQL server. http:\/\/www.sqlsecurity.com\/chipsblog\/archivedposts. Basu A. 2006. Forensic tamper detection in SQL server. http:\/\/www.sqlsecurity.com\/chipsblog\/archivedposts."},{"key":"e_1_2_2_5_1","unstructured":"Booch G. Rumbaugh J. and Jacobson I. 2005. The Unified Modeling Language User Guide 2nd Ed. Addison-Wesley Professional. Booch G. Rumbaugh J. and Jacobson I. 2005. The Unified Modeling Language User Guide 2nd Ed. Addison-Wesley Professional."},{"key":"e_1_2_2_6_1","volume-title":"Compliance: The effect on information management and the storage industry. Res. rep.","author":"Gerr P. A.","year":"2003"},{"key":"e_1_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2005.06.003"},{"key":"e_1_2_2_8_1","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/BF00196791","article-title":"How to time-stamp a digital document","volume":"3","author":"Haber S.","year":"1999","journal-title":"J. Cryptology"},{"key":"e_1_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966944"},{"key":"e_1_2_2_10_1","volume-title":"US Department of Health & Human Services","author":"HIPAA","year":"1996"},{"key":"e_1_2_2_11_1","unstructured":"IBM Corporation. 2010. A matter of time: Temporal data management in DB2 for z\/OS. White paper IBM. IBM Corporation. 2010. A matter of time: Temporal data management in DB2 for z\/OS. White paper IBM."},{"key":"e_1_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029146.1029159"},{"key":"e_1_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/67544.66956"},{"key":"e_1_2_2_14_1","volume-title":"Encyclopedia of Database Systems","author":"Lorentzos N. A."},{"key":"e_1_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-012-0282-x"},{"key":"e_1_2_2_16_1","volume-title":"An infrastructure for database tamper detection and forensic analysis. Honors thesis","author":"Malmgren M."},{"key":"e_1_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2009.69"},{"key":"e_1_2_2_19_1","volume-title":"Oracle Database 11g Workspace Manager overview","author":"Oracle Corporation"},{"key":"e_1_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142487"},{"key":"e_1_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1412331.1412342"},{"key":"e_1_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.121"},{"key":"e_1_2_2_23_1","unstructured":"Ramakrishnan R. and Gehrke J. 2003. Database Management Systems 3rd Ed. McGraw-Hill. Ramakrishnan R. and Gehrke J. 2003. Database Management Systems 3rd Ed. McGraw-Hill."},{"key":"e_1_2_2_24_1","volume-title":"Public Law No. 107--204, 116 Stat. 745","author":"Sarbanes-Oxley Act U.S.","year":"2002"},{"key":"e_1_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872772"},{"key":"e_1_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1986.1663327"},{"key":"e_1_2_2_27_1","volume-title":"Proceedings of the International Conference on Very Large Databases. 504--515","author":"Snodgrass R. T."},{"key":"e_1_2_2_28_1","unstructured":"Teradata Corporation. 2012. Teradata transforms global database technology. http:\/\/www.teradata.com\/News-Releases\/2012\/Teradata-Transforms-Global-Database-Technology\/. Teradata Corporation. 2012. Teradata transforms global database technology. http:\/\/www.teradata.com\/News-Releases\/2012\/Teradata-Transforms-Global-Database-Technology\/."},{"key":"e_1_2_2_29_1","volume-title":"Federal Information Processing Standards Publication 180-4: Secure Hash Standard. (March","author":"US National Institute of Standards and Technology. 2012.","year":"2012"},{"key":"e_1_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1349026.1349043"}],"container-title":["ACM Transactions on Database Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2487259.2487264","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,30]],"date-time":"2022-12-30T07:50:15Z","timestamp":1672386615000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2487259.2487264"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":29,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2013,6]]}},"alternative-id":["10.1145\/2487259.2487264"],"URL":"https:\/\/doi.org\/10.1145\/2487259.2487264","relation":{},"ISSN":["0362-5915","1557-4644"],"issn-type":[{"value":"0362-5915","type":"print"},{"value":"1557-4644","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,6]]},"assertion":[{"value":"2012-01-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2013-03-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2013-07-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}