Abstract
In this paper we examine the transformation mapping mechanisms required in synchronizing virtual machine (VM) log audit data for the system administrator environment. We explain the formal constraints that are required by the transformation mapping process between the source and target log schemas for these VMs. We discuss the practical considerations of using these formalisms in establishing the suitable data quality rules that provides for security within these abstract domains.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Grandison, T., Maximillen, E.M., Thorpe, S., Alba, A.: Towards a Formal Cloud Computing definition. In: Proceedings of IEEE Services (July)
Thorpe, S., Ray, I.: Global Virtual Machine Policy Auditor. CSU PhD Discussion Forum (September 2010)
Fagin, R., Kolatis, P., Miller, R.J., Popa, L.: Data Exchange Semantics and Query Answering. Theory of Computer Science 336(1), 89–124
Miller, R.J., Haas, L.M., Hernandez, M.: Schema Mapping as a Query Discovery. In: VLDB, pp. 77–88 (2000)
Chiticariu, L., Tan, W.: Debugging Schema Mappings with routes. In: VLDB, pp. 79–90 (2006)
Van den Bussche, J., Vansummeren, S., Vossen, G.: Towards Practical Meta Querying. Information Systems 30(4), 317–332 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Thorpe, S., Ray, I., Grandison, T. (2011). Enforcing Data Quality Rules for a Synchronized VM Log Audit Environment Using Transformation Mapping Techniques. In: Herrero, Á., Corchado, E. (eds) Computational Intelligence in Security for Information Systems. Lecture Notes in Computer Science, vol 6694. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21323-6_34
Download citation
DOI: https://doi.org/10.1007/978-3-642-21323-6_34
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-21322-9
Online ISBN: 978-3-642-21323-6
eBook Packages: Computer ScienceComputer Science (R0)