Data Warehousing Based Computer Forensics Investigation Framework
|
|
|
- Chastity Booker
- 10 years ago
- Views:
Transcription
1 th International Conference on Information Technology - New Generations Data Warehousing Based Computer Forensics Investigation Framework Waleed Halboob 2,1, Ramlan Mahmod 2, Muhammad Abulaish 1, Haider Abbas 1, Kashif Saleem 1 1 Center of Excellence in Information Assurance, King Saud University, Saudi Arabia 2 Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, Serdang, Selangor, Malaysia {wmohammed.c, mabulais, hsiddiqui, ksaleem}@ksu.edu.sa, [email protected], Abstract In this paper, we have proposed the design of an efficient computer forensics investigation framework. The proposed framework improves the investigation efficiency using Data Warehouse (DW) concept, which provides a selective evidence identification, collection and analysis. So, only relevant data is investigated instead of investigating the entire user data. The proposed framework consists of a Data Warehouse Engine (DWE) to selectively identify, collect and analyze digital evidences from multiple digital resources. A Digital Preservation (DEP) mechanism is also introduced for preservation of the collected digital evidences whose authenticity is ensured using cryptographic techniques. An access control mechanism is implemented to allow only authorized investigator to access the preserved digital evidences. The DEP mechanism provides court of law with a Secure Forensic Audit Trial (SFAT) that helps in tracking happened activities on the collected evidences for ensuring the authenticity and reliability of the presented digital evidence. Keywords: Computer forensics; Digital evidence; Efficiency; Data warehouse; Access control; Authenticity; and reliability. I. INTRODUCTION Digital forensics is a new research discipline which focuses on extracting digital evidences from digital data related to a crime. Digital data normally reside on digital media like PC, mobile, storage device, etc. Digital forensics investigation is a systematic process to identify, collect, preserve, analyze, and present digital evidences from digital data in such a way that they should be admissible, authentic, complete, reliable and believable by the court of law [1, 2, 3]. To facilitate forensics investigation process a number of forensic frameworks have been proposed by the researchers [4, 5, 6, 7, 8, 9, 10]. These are generally defined as a sequence of defined steps and their refinements along with inputs and outputs. More or less, the major steps are identified as identification, collection, preservation, analysis and presentation. A number of metrics have been also defined to evaluate the efficacy of a framework. This includes generality, specificity, lawfulness, iterative, feedback, and computer support [11]. Although, a good number efforts have been directed to solve digital forensics related issues during last decade the field but more works still required for addressing several open issues such investigation efficiency [12,13,14,15,16,17,18,19]. Investigation efficiency is one of the open challenges for computer forensics due to exponential increase in the size of digital storage media and data, and as a result, increasing the required time and effort for collecting and analyzing digital evidences. In this paper, we have proposed the design of a computer forensics investigation framework to facilitate the extraction of reliable evidences in an efficient manner. The Data Warehouse Engine (DWE) module of the proposed framework takes care of investigation efficiency issue. It improves the efficiency by facilitating the investigator to selectively identify, collect and analyze digital evidences from multiple sources. Using the DWE, the investigation process is limited only to specific scope and goal so only relevant data is investigated. Our framework is also equipped with a Digital Preservation (DEP) mechanism, which preserves the collected digital evidences through ensuring its authenticity. The DEP also implements access control and Secure Forensic Audit Trail (SFAT) mechanisms. The access control mechanism controls access to the digital evidence so that it is accessible only by concerned authorities (e.g., investigator, court of law). The SFAT securely records all activities happened on the digital evidence from the time of evidence collection to the evidence presentation. As a consequence, through tracking the investigator activities recorded inside the SFAT the court of law can verify the authenticity and reliability of the presented evidences. The rest of this paper is structured as follows. Section II presents a brief review of the related works on computer forensic frameworks and investigation efficiency. Section III presents the functional detail of the proposed framework. Section IV presents a discussion and critical evaluation of the proposed framework. Finally, Section V concludes the paper with future directions to enhance the proposed framework. II. RELATED WORKS Several computer forensics have been introduced until now. In 2001, Palmer have compiled the proceedings of the Digital Forensic Research Workshop after a thorough brainstorming among collaborative researchers, investigators and practitioners in digital forensics and termed it as DFRWS framework [10]. The DFRWS framework provides a nonspecific and general investigation road map. In 2003, the DFRWS was extended by Stephenson [8] to a more specific framework called an End-to-End Digital Investigation (EEDI) that describes investigation activities with a digital /15 $ IEEE DOI /ITNG
2 investigation process language (DIPL). An Electronic Crime Scene Investigation (ECSI) was presented in 2001 and reissued in 2008 by the Department of Justice, USA [20]. Unlike the DFRWS, the ECSI is more specific framework since it describes the investigation process in more details to be used as investigation guidelines in USA. In [9], a framework, called an Abstract Model of the Digital Forensics Procedures (AMDFP), has been proposed which is understandable and applicable to a variety of cases of computer forensics investigation. Carrier and Spafford [6] have introduced an Integrated Digital Investigation Process (IDIP) based on physical investigation process and they come out with a practical and useful framework. Later on, this framework is simplified by Carrier and Spafford [5] to a new framework called an Event-Based Digital Forensics Investigation Framework (EDFIF). A Hierarchical, Objective Based Framework (HOF) has been proposed by Beebe and Clark [4] with two new concepts forensics principle and incident closure. The former concept is based on an objectbased investigation process instead of executing a sequence of pre-defined steps, whereas the latter concept is used for closing investigated crime. For improving the investigation efficiency or, in other words, reducing the required investigation cost in term of time and resources, a number of research efforts have been proposed in [17,21,22,23,24,25,26,27,28,29]. These efforts use two different approaches namely selective imaging and effective and efficient analytical [13]. The selective imaging approach is used at collection stage. The key idea is to image or collect only relevant data instead of making a physical bitby-bit image from whole hard drive. Current researches on selective imaging approach use digital evidence bags [22,24,25,26,27] and risk sensitive digital evidence collection [28] concepts. The effective and efficient analytical approach is applied to digital evidence analysis stage. In other words, a bit-by-bit image is made from the whole hard drive during the evidence acquisition so that the wholesome about the user data is collected. Then, the collected data is analyzed in a distributed manner. Researches using this approach have applied several concepts such as distributed evidence analysis [29] data mining search process [17], file classification [23], clustering text-based search [21]. However, the main problem associated with this effective and efficient analytical approach is that making a bit-for-bit image is very time consuming. Although, a number of research efforts have been directed to resolve the efficiency problem there are still several open issues. Bednar and Katos [30] and Beebe [13] have shown that there is a need for using data warehousing technique to provide investigators to help in deciding which data or subset of data should be imaged and analyzed. III. PROPOSED COMPUTER FORENSICS FRAMEWORK In this section, we present the design of our proposed computer forensics framework. The proposed framework emphasizes on four major steps, as illustrated in Figure 1, for a digital investigation process. These steps are: i) data gathering and forensic tools identification, ii) data warehousing, iii) evidence preservation, and iv) evidence presentation. These steps are further explained in the following sub-sections. A. Data Gathering and Forensic Tools Identification In this phase, an investigator plans and prepares for executing his investigation process through awareness, search warrant and authorization, identification of tools/equipments, chain of custody and securing crime scene. Each of these activities is discussed in the following sub-sections. The outputs of this phase are awareness report, secure crime scene, search warrant, authorization, required tools/equipments and hand-written chain of custody. 1) Awareness: Awareness is made when an investigation authority receives a digital crime report from a victim or another party. The awareness is a report that can include more details about the crime such as date, time and computing environment. Depending on the intensity and means of reported crime, the investigation authority decides whether the reported crime needs a computer forensic investigation or not. 2) Search Warrant and Authorization: If the need for computer forensic investigation has been identified in the previous step, the investigation authority seeks a search warrant and authorization letter from court of law before initiating the investigation process. 3) Identification of Tools/Equipments: Depending on the nature of digital crime, necessary tools and equipments are identified and prepared for investigation process. Both Data Warehouse Engine (DWE) and Digital Preservation (DEP) mechanisms are installed on a TPM-enabled Laptop and prepared for use. The TPM (Trusted Platform Module) is a chip installed in the Laptop for providing a trusted timestamped which will be used during recording the activities of concerned authorities in the Secure Forensic Audit Trial (SFAT). At this stage also, each concerned authority is provided with an access control certificate and a pair of public and private keys. The DEP mechanism is initialized with the access control certificates of all concerned authorities. More information about the DEP initialization and SFAT will be presented in Section III. 4) Chain of Custody: A chain of custody is prepared for recording the investigation activities. The chain of custody will be used by court of law to ensure that the investigator didn t exceed the specified investigation scope and goal. As a result, the court of law can make sure that the digital evidence is trustworthy [31]. In our framework, two kind of chain of custody are used. The first is a hand-written chain of custody - mentioned here - used for recording all the investigation activities during the whole investigation process. Second is a Secure Forensic Audit Trial (SFAT), which is used for recording all the activities performed on the mined and secured digital evidences. It is further explained in Section III. 5) Securing Crime Scene: This step concerns about securing the crime scene to protecting digital evidence resources. Everything in the crime scene is secured and documented (e.g., by taking photography). Only authorized persons are allowed to access the crime scene. The crime scene can be victim and/or suspect computers. 164
3 Data Warehousing Laws Awareness Report Relevant Identification Relevant files, actions, devices.. Reports Policies Any Digital Device Data Gathering and Forensic Tools Identification Secure Crime Scene Search Warrant Authorization Chain of Custody Extraction Transformation Loading Extracted s XML-based s WHDB Facts, timeline, statements Preservation Admissible Digital Presentation Findings Disposal Computing Device(s) Tools/ equipments Analysis Advices Figure 1. The General architecture of the proposed computer forensics framework B. Data Warehousing A Data Warehouse (DW) is defined by Inmon [32] as a subject-oriented, integrated, nonvolatile, and time-variant collection of data in support of managements decisions. The DW provides a platform to analyze data at different levels of specifications. Moreover, if data is brought into data warehouse the data warehouse operations like slice, dice, rollup, roll-down, etc. can be applied to analyze them for different levels of specificities. The integration of Data Warehouse Engine (DWE) in the proposed framework is responsible to collect and analyze all crime-related digital resources under a common umbrella through the process like relevant resource identification, resource extraction, resource transformation, resource loading and resource analysis. In our framework, the data warehousing step covers the digital evidence collection and analysis steps proposed in existing computer forensics frameworks. The steps to create a data warehouse for the said purpose are explained in the following sub-sections. 1) Relevant Identification: In this step, data relevant to the crime under investigation are identified from user data resources by investigator. Any data (such as images, videos, s, etc.) found in user computer media storage can be considered as an internal resource. 2) Extraction: In this phase, relevant resources identified during previous step are extracted to a temporal storage. extraction is the most time-consuming process. A special program is required for extracting the relevant resources as well as cleaning them through removing unwanted chunks, interpolating/ extrapolating missing values, and resolving inconsistencies present either at schema level or at data level. 3) Transformation: transformation is used for transforming extracted resources into a suitable format, which could ease the analysis process. The extracted resources are converted into a unified data structure. We choose XML schema for representing transformed resources since XML languages becomes a de-facto standard for data representation and transformation. 4) Loading: The relevant resources in the transformed structure (XML-based format) are loaded into a data warehouse. Loading process can be either new loading or updates loading. In new loading, new resources are loaded and 5) Analysis: The loaded relevant resources are analyzed to understand the happened crime and collect digital evidence through reconstructing timeline, establishing facts and identifying suspect(s). In other words, investigator answers what happened, where, who did it, how, why, and when? The investigator can repeat the data warehouse analysis process over time to find more evidences. C. Preservation The evidence preservation is used for insuring digital evidence authenticity and confidentiality. For meeting this target, digital evidence preservation (DEP) mechanism is proposed which 165
4 preserves digital evidences by ensuring various security services. First, authenticity of the digital evidence is preserved by ensuring the evidence s integrity. This is very important point as crime evidence here is in a digital form which means it can be easily altered or fabricated. Second, a Secure Forensic Audit Trial (SFAT) is used for recording the activities of concerned authority (such as investigator) on the digital evidence. All activities are encrypted and then recorded inside the SFAT in a way that only court of law can decrypt it to see the happened activities. This allows the court of law to track the investigator activities to determine if the user privacy was disclosed or not, also if the digital evidence was fabricated or not. In case of disclosing or fabrication the collected evidence is not likely to be reliable and consequently not acceptable by the court of law. The proposed DEP mechanism preserves digital evidences through three major steps including initialization, Digital Authenticate and Archiving (DEAA), and Digital Secure Monitoring and Auditing (DESMA).These steps are further explained in the following sub-sections but starting with initializing the DEP. 1) Digital Authenticate and Archiving (DEAA): The digital evidence archive means packaging the digital evidence into files package (e.g., Java archive file) or into a secure USB drive. The execution of DEAA process is shown in Figure 2. First, investigator makes a bit-by-bit image from the original evidence. Then, both evidences (original and image) are separately signed with a general public key (GPK). The original evidence and its hash value are stored in a secure place called External Secure Storage (ESS) while the evidence copy and its hash value are stored in a temporal storage. In other hands, the original evidence is stored as a backup and the evidence copy is used as a working copy. The GPK is calculated as a sum of all public keys of all concerned authorities using the IBE-based key distribution schema proposed in [35]. For making distribution schema [35] used more secure, GPK is first initialized with a sum of two random public keys as recommended by Chien [36] as used in [37, 38, 39]. The SHA-2 is used because it is more secure than other hash functions such as MD5 and SHA-1. 2) Digital Secure Monitoring and Auditing (DESMA): After digital evidence is authenticated and archived, further access to it is controlled by a Digital Secure Monitoring and Auditing (DESMA) process. The DESMA receives the authentic and encrypted evidence and its hash value from the DEAA mechanism and also receives access control certificates of concerned authorities from court of law during data gathering and forensic tools identification phase. All these three inputs are stored inside which is generally termed as Internal Secure Storage (ISS). When a concerned authority wants to access the digital evidence he must be authenticated and authorized using his private key and access control certificate, respectively. During the authentication and authorization process, access to the digital evidence is audited by recording all activities happened on the digital evidence inside the Secure Forensic Audit Trial (SFAT). In addition, the activities are encrypted first with the GPK before storing them inside SFAT. So, the authorization used here is an encryption-based authorization in which access is allowed only if requester has a suitable private key. The recorded information can be ID of the requester as used in the requester s access control certificate, access time and data automatically captured from TPM-enabled Laptop, and digital signature of the requester. Whenever required, the court of law can print a report about the status of the digital evidence by listing the recorded information inside the SFAT. Digital Authenticating and Archiving (DEAA) Digital Secure Monitoring and Auditing (DESMA) External Secure Storage (ESS) Internal Secure Storage (ISS) Original Hash Value + Time Stamp Access Control Certificates Policy Base Encrypted Hash Value = Time Stamp Facts, timeline, statements Digital Authenticating and Archiving Hash Values Access Control Mechanism Access Request Concerned Authority General Public/Private Keys Copy Temporal Storage Hash Value + Time Stamp Encrypted s Secure Forensic Audit Trial (SFAT) Figure 2. Digital Secure Archiving 166
5 D. Presentation This step is generally concerned with presenting the findings of the investigation process to the court of law. This step is considered as outside the scope of this research. IV. DISCUSSION In this section, we present a thorough discussion to establish the efficacy of the proposed framework over existing ones. For this purpose, we have chosen four existing digital forensics frameworks Digital Forensic Research Workshop (DFRWS), Electronic Crime Scene Investigation (ECSI), Abstract Model of the Digital Forensics Procedures (AMDEP) and End-to-End Digital Investigation (EEDI). The evaluation process is based on four major criteria investigation process, usability, evidence reliability and investigation efficiency that are generally used to evaluate digital forensics frameworks. Under each criterion there is a varying list of overlapping subcriteria as shown in Table 1. The investigation process criterion is used for evaluating whether a computer forensic framework supports main investigation. These steps are the main required steps and became standard since the birth of DFRWS framework in The usability of a computer forensic framework is evaluated using what we called general requirements which are general, specific, lawful, iterative, feedback and computer support [11]. For evidence reliability, three criteria are used which are chain of custody, evidence authenticity and authorization. The chain of custody criterion measures whether the activities of an investigator during an investigation process are recorded or not. The evidence authenticity is used for ensuring whether the confidentiality and integrity of digital evidences are satisfied. The authorization is fulfilled if access to the digital evidence is controlled. Investigation efficiency was discussed in Section II and a computer forensic framework is efficient if it supports a selective imaging and/or an effective and efficient analytics. Table 1 provides comparative results of the proposed framework with the related ones. It seems that the proposed framework satisfies the most criteria when compared with other frameworks. In fact, it is difficult to discuss the result shown in Table 1 in more detail due to limited space provided here. TABLE 1. A COMPARATIVE STUDY OF THE PROPOSED FRAMEWORK WITH EXISTING FRAMEWORKS Main Criteria Sub-criteria DFRWS ECSI AMDEP EEDI Proposed Identification Only securing and documenting the scene Yes (crime identification/ required tools preparation) Yes (Data Gathering and Forensic Tools Identification) Investigation process Collection Preservation Analysis Presentation Only reporting General Specific Usability Lawful Iterative Feedback Computer Support Reliability Chain of custody Preservation Authorization Investigation efficiency Selective collection Effective Efficient Analytical and 167
6 V. CONCLUSION AND FUTURE WORKS In this paper, we have proposed the design of an efficient computer forensic framework. The novelty of the proposed framework lies in improving the investigation efficiency while ensuring the digital evidences authenticity and reliability. The investigation efficiency is achieved using a data warehouse engine, which helps in providing novel selective evidence imaging in such a way that only the data related to the crime is investigated at different level of specificities. Besides using a hand-written chain of custody, the proposed framework preserves the digital evidences using digital evidence preservation mechanism, and erasing or wiping unrelated data. Development of the data warehousing engine (DWE), digital evidence preservation (DEP) mechanism and Secure Forensic Audit Trial (SFAT) mechanism along with evaluating them using an experiment study is our future work. Acknowledgements We would like to acknowledge Dr. Nur Izura Udzir, Dr. Mohd. Taufik Abdullah and Dr. Ali Deghantanha in Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, Malaysia - for their supporting guidance and ideas. REFERENCES [1] Richter J, Kuntze N, Rudolph C: Securing Digital. In Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'2010) 2010; The Claremont Resort, Oakland, CA, USA. IEEE; 2010: [2] Noblett MG, Pollitt MM, Presley LA: Recovering and Examining Computer Forensic. Forensic Science Communication 2000, 2(4):October. [3] McKemmish R: What is forensic computing? Trends and Issues in Crime and Criminal Justices. Volume 118. Canberra: Australian Institute of Criminology; 1999:1-6. [4] Beebe NL, Clark JG: A Hierarchical, Objectives-based Framework for the Digital Investigations Process. Digital Investigation 2005, 2(2): [5] Carrier BD, Spafford EH: An Event-based Digital Forensic Investigation framework. In In Proceedings of the 2004 Digital Forensic Research Workshop: 2004; Baltimore, Maryland; [6] Carrier B, Spafford EH: Getting Physical with the Digital Investigation Process. International Journal of Digital 2003, 2(2):1-20. [7] Perumal S: Digital Forensic Model Based On Malaysian Investigation Process. International Journal of Computer Science and Network Security 2009, 9(8): [8] The DFRWS Framework Classes [ [9] Reith M, Carr C, Gunsch G: An Examination of Digital Forensic Models. International Journal 2002, 1(3):1-12. [10]Palmer G: Report from the First Digital Forensic Research Workshop (DFRWS). Utica, New York; [11]Benredjem D: Contributions to Cyber Forensics: Processes and Analysis. Concordia University, Electronical and Computer Engineering; [12]Almulhem A: Network forensics: Notions and challenges. In IEEE International Symposium on Signal Processing and Information Technology (ISSPIT'09): 2009; Ajman, UAE; 2009: [13]Beebe N: Digital Forensics Research: The Bad, The God and the Unaddressed. In Advances in Digital Forensics V - IFIP International Conference on Digital Forensics. Orlando, Florida, USA; 2009: [14]Adams CW: Legal Issues Pertaining to the Development of Digital Forensic Tools. In Third International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE '08): 2008; Oakland, California, USA; 2008: [15]Spafford E: Some Challenges in Digital Forensics. In Advances in Digital Forensics II - IFIP International Conference on Digital Forensics: 2006; National Centre for Forensic Science, Orlando, Florida, USA. Springer; 2006:1-9. [16]Srinivasan S: Security and Privacy in the Computer Forensics Context. In International Conference on Communication Technology (ICCT'6): 2006; Guilin 2006:1-3. [17]Beebe N, Clark J: Dealing with Terabyte Data Sets in Digital Investigations. In Advances in Digital Forensics II - IFIP International Conference on Digital Forensics. Volume 194/2005. Orlando, Florida, USA: Springer; 2005:3-16. [18]Bui S, Enyeart M, Luong J: Issues in Computer Forensics. Santa Clara University Computer Engineering, USA [19]Burmester M, Desmedt Y, Wright R, Yasinsac A: "Security or Privacy, Must We Choose?" In Symposium on Critical Infrastructure Protection and the Law: Computer Science and Telecommunication Board; [20]Justice USDo: Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition: National Institute of Justice; [21]Beebe NL, Clark JG: Digital Forensic Text String Searching: Improving Information Retrieval Effectiveness by Thematically Clustering Search Results. Digital Investigation 2007, 4(1): [22]Turner P: Applying a Forensic Approach to Incident Response, Network Investigation and System Administration using Digital Bags. Digital Investigation 2007, 4(1): [23]Sanderson P: Mass Image Classification. Digital Investigation 2006, 3(4): [24]Richard G, Roussev V: File System Support for Digital Bags. In Advances in Digital Forensics II - IFIP Advances in Information and Communication Technology. Volume 222/2006. Springer; 2006: [25]Turner P: Selective and Intelligent Imaging using Digital Bags. Digital Investigation 2006, 3(1): [26]Turner P: Digital Provenance - Interpretation, Verification and Corroboration. Digital Investigation 2005, 2(1): [27]Turner P: Unification of Digital from Disparate Sources (Digital Bags). Digital Investigation 2005, 2(3): [28]Kenneallya EE, Brown CLT: Risk Sensitive Digital Collection. Digital Investigation 2005, 2(2): [29]Richard G, Roussev V: Breaking the Performance Wall: The Case for Distributed Digital Forensics In Proceedings of the 2004 Digital Forensics Research Workshop (DFRWS'04): 2004; Baltimore, Maryland; [30]Bednar P, Katos V: Digital Forensic Investigations: A New Frontier for Informing Systems. In Proceedings of the 5th Conference of the Italian Chapter of the Association for Information Systems Challenges and Changes: People, Organizations, Institutions and IT: 2010; Paris, France. Springer; [31]Halboob W, Abulaish M, Alghathbar K: Quaternary Privacy-Levels Preservation in Computer Forensics Investigation Process. In The 6th International Conference for Internet Technology and Secured Transactions (ICITST): 2011; Abu Dhabi [32]Inmon B: Building the Data Warehousing, Third Edition. New York: John Wiley & Sons, Inc; [33]Boneh D, Franklin MK: Identity-Based Encryption from the Weil Pairing. In Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology (CRYPTO '01): 2001; Santa Barbara, California, USA. Lecture Notes in Computer Science, Springer-Verlag; 2001: [34]Gagné M: Identity-based Encryption: A Survey. RSA Laboratories Cryptobytes 2003, 6(1): [35]Du X, Wang Y, Ge J, Wang Y: An ID-based Broadcast Encryption Scheme for Key Distribution. IEEE Transaction on Broadcasting 2005, 51(2): [36]Chien H-Y: Comments on an Efficient ID-Based Broadcast Encryption Scheme. IEEE Transactions on Broadcasting 2007, 53(4): [37]Halboob W, Alghathbar KS, Mahmod R, Mamat A: TC-enabled and Distributed Cloud Computing Access Control Model. Journal of Applied Science [38]Halboob W, Mamat A, Mahmod R: A Distributed Push-based XML Access Control Model for Better Scalability In First International Conference of Distributed Frameworks and Applications (DFmA 2008): 2008; Malaysia, Penang, USM. IEEE Publications.; [39]Halboob W, Mamat A, Mohamod R, Khan MK: A Temporal and Delegable Secure Access to the Broadcasted XML Documents Journal of Computer Science
COMMON PHASES OF COMPUTER FORENSICS INVESTIGATION MODELS
COMMON PHASES OF COMPUTER FORENSICS INVESTIGATION MODELS Yunus Yusoff, Roslan Ismail and Zainuddin Hassan College of Information Technology, Universiti Tenaga Nasional, Selangor, Malaysia [email protected],
CONCEPT MAPPING FOR DIGITAL FORENSIC INVESTIGATIONS
Chapter 22 CONCEPT MAPPING FOR DIGITAL FORENSIC INVESTIGATIONS April Tanner and David Dampier Abstract Research in digital forensics has yet to focus on modeling case domain information involved in investigations.
Mapping Process of Digital Forensic Investigation Framework
IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.10, October 2008 163 Mapping Process of Digital Forensic Investigation Framework Siti Rahayu Selamat 1, Robiah Yusof 2, Shahrin
Survey on Different Phases of Digital Forensics Investigation Models
Survey on Different Phases of Digital Forensics Investigation Models Priya S. Patil 1, Prof. A. S. Kapse 2 P. R. Patil College of Engineering and Technology, Amravati, India ABSTRACT: Most forensics models
Digital Forensics. General Terms Cyber Crime, forensics models, Investigation, Analysis, digital devices.
Digital Forensics Ravneet Kaur, Amandeep Kaur Assistant Professor in Computer Science SDSPM College for Women, Rayya (Asr) Guru Nanak Dev University, India International Journal of Computer Applications
The Enhanced Digital Investigation Process Model
The Enhanced Digital Investigation Process Model Venansius Baryamureeba and Florence Tushabe [email protected], [email protected] Institute of Computer Science, Makerere University P.O.Box 7062,
Digital Forensic Model Based On Malaysian Investigation Process
38 Digital Forensic Model Based On Malaysian Investigation Process Sundresan Perumal 1 Faculty Of Science & Technology Islamic Science University Of Malaysia Summary With the proliferation of the digital
Advances in Computer Forensics
IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.2, February 2008 215 Advances in Computer Forensics Mohd Taufik Abdullah 1, Ramlan Mahmod 2, Abdul Azim Ab. Ghani 3, Mohd
Technologies based on Cloud Computing Technology
, pp.1-5 http://dx.doi.org/10.14257/astl.2015.82.01 Technologies based on Cloud Computing Technology Huan Ma 1, Gaofeng Shen 2, Ming Chen 1 and Jianwei Zhang 1 1 Software Engineering College, Zhengzhou
Significance of Hash Value Generation in Digital Forensic: A Case Study
International Journal of Engineering Research and Development e-issn : 2278-067X, p-issn : 2278-800X, www.ijerd.com Volume 2, Issue 5 (July 2012), PP. 64-70 Significance of Hash Value Generation in Digital
NEW IMPROVEMENT IN DIGITAL FORENSIC STANDARD OPERATING PROCEDURE (SOP)
NEW IMPROVEMENT IN DIGITAL FORENSIC STANDARD OPERATING PROCEDURE (SOP) Sundresan Perumal 1, and Norita Md Norwawi. 2 1 Universiti Sains Islam Malaysia,[email protected] 2 Universiti Sains Islam Malaysia,
Distributed auditing mechanism in order to strengthen user s control over data in Cloud computing Environment
Distributed auditing mechanism in order to strengthen user s control over data in Cloud computing Environment Chandra Sekhar Murakonda M.Tech Student, Department of Computer Science Engineering, NRI Institute
An Historical Perspective of Digital Evidence: A Forensic Scientist s View
An Historical Perspective of Digital Evidence: A Forensic Scientist s View Carrie Morgan Whitcomb, Director, National Center for Forensic Science Author s Comments During my tenure as director of the Postal
Secure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
Guidelines on Digital Forensic Procedures for OLAF Staff
Ref. Ares(2013)3769761-19/12/2013 Guidelines on Digital Forensic Procedures for OLAF Staff 1 January 2014 Introduction The OLAF Guidelines on Digital Forensic Procedures are internal rules which are to
Large Scale Cloud Forensics
Large Scale Cloud Forensics Edward L. Haletky AstroArch Consulting, Inc. Sam Curry RSA, The Security Division of EMC Session ID: STAR-302 Session Classification: Advanced Happenstance Lo and Behold Sam
The Proactive and Reactive Digital Forensics Investigation Process: A Systematic Literature Review
The Proactive and Reactive Digital Forensics Investigation Process: A Systematic Literature Review Soltan Alharbi 1, 1, Jens Weber-Jahnke 2, Issa Traore 1 1 Electrical and Computer Engineering, University
Modeling the Forensics Process
Modeling the Forensics Process Sabah Al-Fedaghi and Bashayer Al-Babtain Computer Engineering Department, Kuwait University [email protected], [email protected] Abstract Most forensic models focus
Evaluation and Analysis of a Software Prototype for Guidance and Implementation of a Standardized Digital Forensic Investigation Process
Evaluation and Analysis of a Software Prototype for Guidance and Implementation of a Standardized Digital Forensic Investigation Process Melissa Ingels Department of Computer Science, University of Pretoria
Overview of Computer Forensics
Overview of Computer Forensics Don Mason, Associate Director National Center for Justice and the Rule of Law University of Mississippi School of Law [These materials are based on 4.3.1-4.3.3 in the National
Dr. Lodovico Marziale Managing Partner 504ENSICS, LLC [email protected]
Dr. Lodovico Marziale Managing Partner 504ENSICS, LLC [email protected] Education Ph.D. in Computer Science, University of New Orleans, 2009. Dissertation Topic: Advanced Techniques for Improving the
Strengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method
An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method E.Sathiyamoorthy 1, S.S.Manivannan 2 1&2 School of Information Technology and Engineering
Framework for a Digital Forensic Investigation
Framework for a Digital Forensic Investigation Michael Kohn 1, JHP Eloff 2 and MS Olivier 3 1 [email protected], 2 [email protected], 3 [email protected] Information and Computer Security Architectures
Improving Chain of Custody in Forensic Investigation of Electronic Digital Systems
IJCSNS International Journal of Computer Science and Network Security, VOL. 11 No. 1, January 2011 1 Improving Chain of Custody in Forensic Investigation of Electronic Digital Systems Giuliano Giova Escola
itrust Medical Records System: Requirements for Technical Safeguards
itrust Medical Records System: Requirements for Technical Safeguards Physicians and healthcare practitioners use Electronic Health Records (EHR) systems to obtain, manage, and share patient information.
Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key
Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key Julia Juremi Ramlan Mahmod Salasiah Sulaiman Jazrin Ramli Faculty of Computer Science and Information Technology, Universiti Putra
IAPE STANDARDS SECTION 16 DIGITAL EVIDENCE
IAPE STANDARDS SECTION 16 DIGITAL EVIDENCE IAPE STANDARD SECTION 16.1 DIGITAL EVIDENCE Standard: Digital evidence is a critical element of modern criminal investigation that should be maintained in strict
Journal of Electronic Banking Systems
Journal of Electronic Banking Systems Vol. 2015 (2015), Article ID 614386, 44 minipages. DOI:10.5171/2015.614386 www.ibimapublishing.com Copyright 2015. Khaled Ahmed Nagaty. Distributed under Creative
Enabling Public Auditing for Secured Data Storage in Cloud Computing
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 5 (May. 2013), V3 PP 01-05 Enabling Public Auditing for Secured Data Storage in Cloud Computing 1 Er.Amandeep Kaur,
Comparative Analysis of Digital Forensic Models
Journal of Advances in Computer Networks, Vol. 3, No. 1, March 2015 Comparative of Digital Forensic s Fakeeha Jafari Rabail Shafique Satti process s are: : Evidences can be collected in this phase : on
Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers
Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers Brian Carrier Research Scientist @stake Abstract This paper uses the theory of abstraction layers to describe the purpose
COMPARATIVE DIGITAL FORENSIC MODEL
COMPARATIVE DIGITAL FORENSIC MODEL Dr.DhananjayKalbande 1, Nilakshi Jain 2 Head of Department, Dept. Of CSE, SPIT/ Mumbai University, Mumbai, Maharastra, India 1 Assistant Professor, Dept. Of IT, SAKEC/
Carrier B. and Spafford E. (2003). Getting Physical with the Digital Investigation Process. International Journal of Digital Evidence. Volume 2(2).
140 RUJUKAN Agarwal, A. et al. (2011). Systematic Digital Forensic Investigation Model.International Journal of Computer Science and Security (IJCSS),.Volume 5 (Issue 1). Ali, K.M. (2012). Digital Forensics
Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation
Computer Forensics and Digital Investigation Computer Security EDA263, lecture 14 Ulf Larson Lecture outline! Introduction to Computer Forensics! Digital investigation! Conducting a Digital Crime Scene
TIBCO Spotfire and S+ Product Family
TIBCO Spotfire and S+ Product Family Compliance with 21 CFR Part 11, GxP and Related Software Validation Issues The Code of Federal Regulations Title 21 Part 11 is a significant regulatory requirement
E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption
Journal of Computer Science 6 (7): 723-727, 2010 ISSN 1549-3636 2010 Science Publications E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption Najlaa A. Abuadhmah,
Solution Brief for ISO 27002: 2013 Audit Standard ISO 27002. Publication Date: Feb 6, 2015. EventTracker 8815 Centre Park Drive, Columbia MD 21045
Solution Brief for ISO 27002: 2013 Audit Standard Publication Date: Feb 6, 2015 8815 Centre Park Drive, Columbia MD 21045 ISO 27002 About delivers business critical software and services that transform
Associate Prof. Dr. Victor Onomza Waziri
BIG DATA ANALYTICS AND DATA SECURITY IN THE CLOUD VIA FULLY HOMOMORPHIC ENCRYPTION Associate Prof. Dr. Victor Onomza Waziri Department of Cyber Security Science, School of ICT, Federal University of Technology,
TOWARDS A FORMALIZATION OF DIGITAL FORENSICS
Chapter 3 TOWARDS A FORMALIZATION OF DIGITAL FORENSICS Jill Slay, Yi-Chi Lin, Benjamin Turnbull, Jason Beckett and Paul Lin Abstract While some individuals have referred to digital forensics as an art,
To Catch a Thief: Computer Forensics in the Classroom
To Catch a Thief: Computer Forensics in the Classroom Anna Carlin [email protected] Steven S. Curl [email protected] Daniel Manson [email protected] Computer Information Systems Department California
Reconstruction of Events in Digital Forensics
Reconstruction of Events in Digital Forensics M.A.Rama Prasad 1 Y.Naga Satish 2 1,2 Department.of Computer Science and Engineering, 1 Vignan.s Lara Institute of Technology and Science, Vadlamudi 2 BVC
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
Improved Event Logging for Security and Forensics: developing audit management infrastructure requirements
Improved Event Logging for Security and Forensics: developing audit management infrastructure requirements Atif Ahmad & Anthonie Ruighaver University of Melbourne, Australia Abstract The design and implementation
PREREQUISITE(S): CTS 1131, CTS 1133 and CTS 1120
Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CAP 2140 COURSE TITLE: Data Forensics I PREREQUISITE(S): CTS 1131, CTS 1133 and CTS 1120 COREQUISITE(S):
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEW
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEW Gulshan Shrivastava, Kavita Sharma, Akansha Dwivedi Department of Information Technology, Dronacharya College of Engineering, Gr. Noida, U.P., India [email protected],
MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1
MSc Computer Security and Forensics Cohort: MCSF/09B/PT Examinations for 2009-2010 / Semester 1 MODULE: COMPUTER FORENSICS & CYBERCRIME MODULE CODE: SECU5101 Duration: 2 Hours Instructions to Candidates:
Cloud security architecture
ericsson White paper Uen 284 23-3244 January 2015 Cloud security architecture from process to deployment The Trust Engine concept and logical cloud security architecture presented in this paper provide
BUILDING OLAP TOOLS OVER LARGE DATABASES
BUILDING OLAP TOOLS OVER LARGE DATABASES Rui Oliveira, Jorge Bernardino ISEC Instituto Superior de Engenharia de Coimbra, Polytechnic Institute of Coimbra Quinta da Nora, Rua Pedro Nunes, P-3030-199 Coimbra,
preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.
Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared
IMPLEMENTING FORENSIC READINESS USING PERFORMANCE MONITORING TOOLS
Chapter 18 IMPLEMENTING FORENSIC READINESS USING PERFORMANCE MONITORING TOOLS Franscois van Staden and Hein Venter Abstract This paper proposes the use of monitoring tools to record data in support of
CERIAS Tech Report 2003-29 GETTING PHYSICAL WITH THE DIGITAL INVESTIGATION PROCESS. Brian Carrier & Eugene H. Spafford
CERIAS Tech Report 2003-29 GETTING PHYSICAL WITH THE DIGITAL INVESTIGATION PROCESS Brian Carrier & Eugene H. Spafford Center for Education and Research in Information Assurance and Security, Purdue University,
Discovery of Electronically Stored Information ECBA conference Tallinn October 2012
Discovery of Electronically Stored Information ECBA conference Tallinn October 2012 Jan Balatka, Deloitte Czech Republic, Analytic & Forensic Technology unit Agenda Introduction ediscovery investigation
CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak
CSN08101 Digital Forensics Lecture 1A: Introduction to Forensics Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak Digital Forensics You will learn in this module: The principals of computer
Ensuring Security in Cloud with Multi-Level IDS and Log Management System
Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,
Getting Physical with the Digital Investigation Process
Getting Physical with the Digital Investigation Process Brian Carrier Eugene H. Spafford Center for Education and Research in Information Assurance and Security CERIAS Purdue University Abstract In this
An Introduction to Data Warehousing. An organization manages information in two dominant forms: operational systems of
An Introduction to Data Warehousing An organization manages information in two dominant forms: operational systems of record and data warehouses. Operational systems are designed to support online transaction
SubmitedBy: Name Reg No Email Address. Mirza Kashif Abrar 790604-T079 kasmir07 (at) student.hh.se
SubmitedBy: Name Reg No Email Address Mirza Kashif Abrar 790604-T079 kasmir07 (at) student.hh.se Abid Hussain 780927-T039 abihus07 (at) student.hh.se Imran Ahmad Khan 770630-T053 imrakh07 (at) student.hh.se
Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory
Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory Tom Olzak October 2007 If your business is like mine, laptops regularly disappear. Until recently, centrally managed
A Survey on Data Warehouse Architecture
A Survey on Data Warehouse Architecture Rajiv Senapati 1, D.Anil Kumar 2 1 Assistant Professor, Department of IT, G.I.E.T, Gunupur, India 2 Associate Professor, Department of CSE, G.I.E.T, Gunupur, India
Data Warehousing and Data Mining in Business Applications
133 Data Warehousing and Data Mining in Business Applications Eesha Goel CSE Deptt. GZS-PTU Campus, Bathinda. Abstract Information technology is now required in all aspect of our lives that helps in business
Elements of Security
Elements of Security Dr. Bill Young Department of Computer Sciences University of Texas at Austin Last updated: April 15, 2015 Slideset 8: 1 Some Poetry Mary had a little key (It s all she could export)
Information Technology Audit & Forensic Techniques. CMA Amit Kumar
Information Technology Audit & Forensic Techniques CMA Amit Kumar 1 Amit Kumar & Co. (Cost Accountants) A perfect blend of Tax, Audit & Advisory services Information Technology Audit & Forensic Techniques
Criminal Justice: Law Enforcement Technology
Criminal Justice: Law Enforcement Technology Dr. Kamal Shahrabi, Acting Chair Security Systems & Law Enforcement Technology Dept. Bachelor of Science The Bachelor of Science program in Criminal Justice:
CDFE Certified Digital Forensics Examiner (CFED Replacement)
Course: CDFE Certified Digital Forensics Examiner (CFED Replacement) Description: Price: $3,450.00 Category: Popular Courses Duration: 5 days Schedule: Request Dates Outline: COURSE OVERVIEW Computer Forensics
Ranked Keyword Search Using RSE over Outsourced Cloud Data
Ranked Keyword Search Using RSE over Outsourced Cloud Data Payal Akriti 1, Ms. Preetha Mary Ann 2, D.Sarvanan 3 1 Final Year MCA, Sathyabama University, Tamilnadu, India 2&3 Assistant Professor, Sathyabama
Research Topics in the National Cyber Security Research Agenda
Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber
Implementation and Comparison of Various Digital Signature Algorithms. -Nazia Sarang Boise State University
Implementation and Comparison of Various Digital Signature Algorithms -Nazia Sarang Boise State University What is a Digital Signature? A digital signature is used as a tool to authenticate the information
Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment
Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment Chih Hung Wang Computer Science and Information Engineering National Chiayi University Chiayi City 60004,
UML MODELLING OF DIGITAL FORENSIC PROCESS MODELS (DFPMs)
UML MODELLING OF DIGITAL FORENSIC PROCESS MODELS (DFPMs) Michael Köhn 1, J.H.P. Eloff 2, MS Olivier 3 1,2,3 Information and Computer Security Architectures (ICSA) Research Group Department of Computer
www.ijreat.org Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 28
Data Warehousing - Essential Element To Support Decision- Making Process In Industries Ashima Bhasin 1, Mr Manoj Kumar 2 1 Computer Science Engineering Department, 2 Associate Professor, CSE Abstract SGT
Developing and Investigation of a New Technique Combining Message Authentication and Encryption
Developing and Investigation of a New Technique Combining Message Authentication and Encryption Eyas El-Qawasmeh and Saleem Masadeh Computer Science Dept. Jordan University for Science and Technology P.O.
The University of Jordan
The University of Jordan Master in Web Intelligence Non Thesis Department of Business Information Technology King Abdullah II School for Information Technology The University of Jordan 1 STUDY PLAN MASTER'S
The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices
The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices Introduction As organizations rely more heavily on technology-based methods of communication, many corporations
Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System
Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System ArchanaThange Post Graduate Student, DKGOI s COE, Swami Chincholi, Maharashtra, India [email protected],
Role Based Encryption with Efficient Access Control in Cloud Storage
Role Based Encryption with Efficient Access Control in Cloud Storage G. V. Bandewar 1, R. H. Borhade 2 1 Department of Information Technology, Sinhgad Technical Education Society s SKNCOE, Pune, India
Automatic Timeline Construction For Computer Forensics Purposes
Automatic Timeline Construction For Computer Forensics Purposes Yoan Chabot, Aurélie Bertaux, Christophe Nicolle and Tahar Kechadi CheckSem Team, Laboratoire Le2i, UMR CNRS 6306 Faculté des sciences Mirande,
Application-Specific Biometric Templates
Application-Specific Biometric s Michael Braithwaite, Ulf Cahn von Seelen, James Cambier, John Daugman, Randy Glass, Russ Moore, Ian Scott, Iridian Technologies Inc. Introduction Biometric technologies
DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE. Vahidin Đaltur, Kemal Hajdarević,
DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE Vahidin Đaltur, Kemal Hajdarević, Internacional Burch University, Faculty of Information Technlogy 71000 Sarajevo, Bosnia
Domain Specific Cyber Forensic Investigation Process Model
Journal of Advances in Computer Networks, Vol. 3, No. 1, March 2015 Domain Specific Cyber Forensic Investigation Process Model Rabail Shafique Satti and Fakeeha Jafari In this paper, a reference model
Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG
Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG 1 Security Analytics Crypto and Privacy Technologies Infrastructure Security 60+ members Framework and Taxonomy Chair - Sree Rajan, Fujitsu
Solid State Drives (SSD) with Self Encryption: Solidly Secure Michael Willett Storage Security Strategist Independent Consultant
Solid State Drives (SSD) with Self Encryption: Solidly Secure Michael Willett Storage Security Strategist Independent Consultant Flash Memory Summit 2014 Santa Clara, CA 1 The Problem 2005-2013: over 864,108,052
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
Hands-On How-To Computer Forensics Training
j8fm6pmlnqq3ghdgoucsm/ach5zvkzett7guroaqtgzbz8+t+8d2w538ke3c7t 02jjdklhaMFCQHihQAECwMCAQIZAQAKCRDafWsAOnHzRmAeAJ9yABw8v2fGxaq skeu29sdxrpb25zidxpbmznogtheories...ofhilz9e1xthvqxbb0gknrc1ng OKLbRXF/j5jJQPxXaNUu/It1TQHSiyEumrHNsnn65aUMPnrbVOVJ8hV8NQvsUE
Open Source Digital Forensics Tools
The Legal Argument 1 [email protected] Abstract This paper addresses digital forensic analysis tools and their use in a legal setting. To enter scientific evidence into a United States court, a
Life Cycle of Records
Discard Create Inactive Life Cycle of Records Current Retain Use Semi-current Records Management Policy April 2014 Document title Records Management Policy April 2014 Document author and department Responsible
e-discovery Forensics Incident Response
e-discovery Forensics Incident Response NetSecurity Corporation 21351 Gentry Drive Suite 230 Dulles, VA 20166 VA DCJS # 11-5605 Phone: 703.444.9009 Toll Free: 1.866.664.6986 Web: www.netsecurity.com Email:
Extended RBAC Based Design and Implementation for a Secure Data Warehouse
Extended RBAC Based Design and Implementation for a Data Warehouse Dr. Bhavani Thuraisingham The University of Texas at Dallas [email protected] Srinivasan Iyer The University of Texas
