Enforcing Data Quality Rules for a Synchronized VM Log Audit Environment Using Transformation Mapping Techniques
نویسندگان
چکیده
In this paper we examine the transformation mapping mechanisms required in synchronizing virtual machine (VM) log audit data for the system administrator environment. We explain the formal constraints that are required by the transformation mapping process between the source and target log schemas for these VMs. We discuss the practical considerations of using these formalisms in establishing the suitable data quality rules that provides for security within these abstract domains.
منابع مشابه
Use of Schema Associative Mapping for Synchronization of the Virtual Machine Audit Logs
Compute cloud interoperability across different domains represents a major challenge for the System administrator community. This work takes a look at the issues for enabling heterogeneous synchronization of virtual disk log attributes by use of an associative mapping technique. We explore this concern as a function of providing secure log auditing for the virtual machine (VM) cloud. Our contri...
متن کاملDeterministic Measurement of Reliability and Performance Using Explicit Colored Petri Net in Business Process Execution Language and Eflow
Today there are many techniques for web service compositions. Evaluation of quality parameters has great impact on evaluation of final product. BPEL is one of those techniques that several researches have been done on its evaluation. However, there are few researches on evaluation of QoS in eflow. This research tries to evaluate performance and reliability of eflow and BPEL through mapping them...
متن کاملFormal Hash Compression Provenance Techniques for the Preservation of the Virtual Machine Log Auditor Environment
In this paper we provide tamper proof mechanisms for auditing old log entries as a part of lineage provenance within the virtual machine (VM) environment. For each VM provenance log record we apply SHA1 hash checksums, all encapsulated as huffman compressed codes to enforce log preservation against tampering. Our contribution establishes new formal definitions for the VM log provenance. Additio...
متن کاملUnderground contour (UGC) mapping using potential field, well log and comparing with seismic interpretation in Lavarestan area
Coastal Fars gravimetry project in Fars province was carried out to find the buried salt domes and to determine characteristics of faults in this area. The Lavarestan structure was covered by 4203 gravimetry stations in a regular grid of 1000*250 m. Depth structural model of this anticline made in previous studies was based on geological evidences and structural geology measurements. In order t...
متن کاملCognitive Mapping of the Human Capital of the Auditors of Supreme Audit Court
The present study was conducted with the aim of analyzing the components of human capital and discovering the relationships between them for the auditors of the Supreme Audit Court. Thus, after identifying the dimensions of human capital at the individual level, the components of human capital for the auditors of the Supreme Audit Court were extracted using content analysis of semi-structured i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011