The majority of sensitive and personal user data is stored in different Database Management Systems (DBMS). For Example, Oracle is frequently used to store corporate data, MySQL …
S Boumediene, S Boumediene - Journal of Forensic …, 2023 - publications.aaahq.org
Accounting data bases contain much information reflecting a company's financial performance, clients, suppliers, and other relevant information about the company's …
With the emergence of large scale data collection from Internet of Things and mobile devices, the notion of trust is now an increasingly important aspect of the next generation of …
K Rani, C Sharma - 2019 twelfth international conference on …, 2019 - ieeexplore.ieee.org
Data stored in different kinds of Database management systems is always prone to tampering through internal or external sources. To detect such malicious changes in the …
Applications in several areas, such as privacy, security, and integrity validation, require direct access to database management system (DBMS) storage. However, relational DBM …
Cyberattacks continue to evolve and adapt to state-of-the-art security mechanisms. Therefore, it is critical for security experts to routinely inspect audit logs to detect complex …
Blockchain is a decentralized distributed digital ledger that provides tamper-resistance but is very slow in search query processing with a considerable amount of transaction cost …
SKA Zakarneh - International Journal of Applied Sciences and …, 2023 - e-journal.usd.ac.id
Different Database management systems (DBMS) were developed and introduced to store and manipulate data. Microsoft SQL (MSSQL) Server one of the most popular relational …
A Rasin, J Wagner, K Heart… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
The pervasive use of databases for the storage of critical and sensitive information in many organizations has led to an increase in the rate at which databases are exploited in …