In this paper we examine the transformation mapping mechanisms required in synchronizing virtual machine (VM) log audit data for the system administrator environment. We explain the formal constraints that are required by the transformation mapping process between the source and target log schemas for these VMs. We discuss the practical considerations of using these formalisms in establishing the suitable data quality rules that provides for security within these abstract domains. © 2011 Springer-Verlag.
CITATION STYLE
Thorpe, S., Ray, I., & Grandison, T. (2011). Enforcing data quality rules for a synchronized VM log audit environment using transformation mapping techniques. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6694 LNCS, pp. 265–271). https://doi.org/10.1007/978-3-642-21323-6_34
Mendeley helps you to discover research relevant for your work.