Back to Results
First PageMeta Content
Artificial intelligence / Cryptography / Hash table / Information science / Hash function / Hash chain / Cryptographic hash functions / Search algorithms / Hashing / Information retrieval


Forensic Analysis of Database Tampering Kyriacos Pavlou Richard T. Snodgrass Department of Computer Science
Add to Reading List

Document Date: 2007-09-24 16:43:05


Open Document

File Size: 238,76 KB

Share Result on Facebook

City

Chicago / /

Company

Blue 1 / POLYCHROMATIC ALGORITHM / Oracle / Blue 12 / Enron / Red 11 / Black 5 / WorldCom / NE 1 / Red / /

Country

United States / Canada / /

Currency

USD / /

/

Event

Company Expansion / /

Facility

Computer Science University of Arizona Tucson / /

IndustryTerm

hash chain / black hash chain / storage devices / blue chain / forensic analysis algorithms / transaction processing system / short chain / regular processing / forensic analysis algorithm / nancial and medical information systems / monochromatic algorithm / digital notarization services / latter algorithm / successive algorithm / hash chains / normal database processing / monochromatic forensic analysis algorithm / green chain / trivial and monochromatic algorithms / forensic algorithms / record management systems / computing / candidate algorithms / trivial forensic analysis algorithm / normal processing / /

Organization

Notarization Service / Database Tampering Kyriacos Pavlou Richard T. Snodgrass Department / AZ Department / Computer Science University of Arizona Tucson / U.S. Food and Drug Administration / /

Person

Richard T. Snodgrass / Kyriacos Pavlou / /

Position

manager / auditor / workspace manager / Chief Information Officer / CIO / /

ProgrammingLanguage

Microsoft SQL Server / /

ProvinceOrState

Illinois / Indiana / /

RadioStation

2 When / /

Technology

so-called monochromatic algorithm / Red-Green-Blue forensic analysis algorithm / latter algorithm / trivial and monochromatic algorithms / monochromatic forensic analysis algorithm / above-mentioned algorithm / operating system / html / four forensic analysis algorithms / RGB algorithm / DBMS / forensic analysis algorithms / two algorithms / successive algorithm / forensic analysis algorithm / two candidate algorithms / trivial forensic analysis algorithm / monochromatic algorithm / former algorithm / four algorithms / /

URL

www.surety.com / http /

SocialTag