2013
DOI: 10.1007/978-3-642-39891-9_14
|View full text |Cite
|
Sign up to set email alerts
|

On the Completeness of Reconstructed Data for Database Forensics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…Their main concern lied in the absence of practical tools available for forensic analysts. In a very recent work (Adedayo and Olivier, 2013), the authors aimed at developing practical techniques to exploit the database layer. One of their techniques aims at providing a better reconstruction method for changed data, another method focuses on providing confirmative evidence on data stored in a database.…”
Section: Database Forensicsmentioning
confidence: 99%
“…Their main concern lied in the absence of practical tools available for forensic analysts. In a very recent work (Adedayo and Olivier, 2013), the authors aimed at developing practical techniques to exploit the database layer. One of their techniques aims at providing a better reconstruction method for changed data, another method focuses on providing confirmative evidence on data stored in a database.…”
Section: Database Forensicsmentioning
confidence: 99%
“…In addition, a database can serve as a tool to support the forensic analysis of the database itself because it permits the execution of complex queries for information retrieval [14]. An important aspect of database forensics deals with the ability to revert the operations performed on a database so that the information that existed in the database at an earlier time can be reconstructed [1,5,7]. One aspect of database forensics that has not yet been considered deals with the reconstruction of the database schema or metadata.…”
Section: Introductionmentioning
confidence: 99%
“…In earlier work [5,7], we presented an algorithm for reconstructing the data that was present in a database at an earlier time. Several techniques to ensure the completeness of the reconstructed information have also been considered [1]. This paper builds on the previous work by describing techniques for reconstructing the database schema.…”
Section: Introductionmentioning
confidence: 99%