Enforcing Data Quality Rules for a Synchronized VM Log Audit Environment Using Transformation Mapping Techniques

نویسندگان

  • Sean S. E. Thorpe
  • Indrajit Ray
  • Tyrone Grandison
چکیده

In this paper we examine the transformation mapping mechanisms required in synchronizing virtual machine (VM) log audit data for the system administrator environment. We explain the formal constraints that are required by the transformation mapping process between the source and target log schemas for these VMs. We discuss the practical considerations of using these formalisms in establishing the suitable data quality rules that provides for security within these abstract domains.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Use of Schema Associative Mapping for Synchronization of the Virtual Machine Audit Logs

Compute cloud interoperability across different domains represents a major challenge for the System administrator community. This work takes a look at the issues for enabling heterogeneous synchronization of virtual disk log attributes by use of an associative mapping technique. We explore this concern as a function of providing secure log auditing for the virtual machine (VM) cloud. Our contri...

متن کامل

Deterministic Measurement of Reliability and Performance Using Explicit Colored Petri Net in Business Process Execution Language and Eflow

Today there are many techniques for web service compositions. Evaluation of quality parameters has great impact on evaluation of final product. BPEL is one of those techniques that several researches have been done on its evaluation. However, there are few researches on evaluation of QoS in eflow. This research tries to evaluate performance and reliability of eflow and BPEL through mapping them...

متن کامل

Formal Hash Compression Provenance Techniques for the Preservation of the Virtual Machine Log Auditor Environment

In this paper we provide tamper proof mechanisms for auditing old log entries as a part of lineage provenance within the virtual machine (VM) environment. For each VM provenance log record we apply SHA1 hash checksums, all encapsulated as huffman compressed codes to enforce log preservation against tampering. Our contribution establishes new formal definitions for the VM log provenance. Additio...

متن کامل

Underground contour (UGC) mapping using potential field, well log and comparing with seismic interpretation in Lavarestan area

Coastal Fars gravimetry project in Fars province was carried out to find the buried salt domes and to determine characteristics of faults in this area. The Lavarestan structure was covered by 4203 gravimetry stations in a regular grid of 1000*250 m. Depth structural model of this anticline made in previous studies was based on geological evidences and structural geology measurements. In order t...

متن کامل

Cognitive Mapping of the Human Capital of the Auditors of Supreme Audit Court

The present study was conducted with the aim of analyzing the components of human capital and discovering the relationships between them for the auditors of the Supreme Audit Court. Thus, after identifying the dimensions of human capital at the individual level, the components of human capital for the auditors of the Supreme Audit Court were extracted using content analysis of semi-structured i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011