Enforcing data quality rules for a synchronized VM log audit environment using transformation mapping techniques

1Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper we examine the transformation mapping mechanisms required in synchronizing virtual machine (VM) log audit data for the system administrator environment. We explain the formal constraints that are required by the transformation mapping process between the source and target log schemas for these VMs. We discuss the practical considerations of using these formalisms in establishing the suitable data quality rules that provides for security within these abstract domains. © 2011 Springer-Verlag.

Author supplied keywords

Cite

CITATION STYLE

APA

Thorpe, S., Ray, I., & Grandison, T. (2011). Enforcing data quality rules for a synchronized VM log audit environment using transformation mapping techniques. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6694 LNCS, pp. 265–271). https://doi.org/10.1007/978-3-642-21323-6_34

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free