Back to Results
First PageMeta Content
Information / Database / Hash function / Transaction processing system / Hash table / Cryptographic hash function / Richard T. Snodgrass / Microsoft SQL Server / Partition / Database management systems / Data management / Data


Forensic Analysis of Database Tampering Kyriacos E. Pavlou and Richard T. Snodgrass University of Arizona
Add to Reading List

Document Date: 2008-09-02 20:32:26


Open Document

File Size: 688,94 KB

Share Result on Facebook

Company

ACM Inc. / Oracle / Enron / WorldCom / /

Country

United States / Canada / /

Currency

USD / /

/

Facility

University of Arizona / Richard T. Snodgrass University of Arizona Regulations / /

IndustryTerm

digital notarization services / storage devices / normal processing phase / validation services / Online processing / highperformance transaction processing system / financial and medical information systems / forensic algorithms / file systems / record management systems / copyright/server / computing / trusted computing base / forensic analysis algorithms / forensic analysis algorithm / trivial forensic analysis algorithm / normal processing / /

Organization

Department of Computer Science / U.S. Food and Drug Administration / Database Tampering Kyriacos E. Pavlou and Richard T. Snodgrass University of Arizona Regulations / University of Arizona / Federal Bureau of Investigation / /

Person

Richard T. Snodgrass / Kyriacos E. Pavlou / /

Position

Rt / auditor / workspace manager / General / chief information officer (CIO) and chief security officer / temporal bound Rt / /

ProgrammingLanguage

Microsoft SQL Server / /

ProvinceOrState

Indiana / /

Technology

forensic analysis algorithm / a3D Algorithms / trivial forensic analysis algorithm / forensic algorithms / operating system / DBMS / forensic analysis algorithms / a3D Algorithm / /

URL

www.surety.com / /

SocialTag