{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T02:15:50Z","timestamp":1767924950358,"version":"3.49.0"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030781194","type":"print"},{"value":"9783030781200","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-78120-0_26","type":"book-chapter","created":{"date-parts":[[2021,6,17]],"date-time":"2021-06-17T05:02:49Z","timestamp":1623906169000},"page":"401-415","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["What Is Lurking in Your Backups?"],"prefix":"10.1007","author":[{"given":"Ben","family":"Lenard","sequence":"first","affiliation":[]},{"given":"Alexander","family":"Rasin","sequence":"additional","affiliation":[]},{"given":"Nick","family":"Scope","sequence":"additional","affiliation":[]},{"given":"James","family":"Wagner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,15]]},"reference":[{"key":"26_CR1","unstructured":"Alter table move. https:\/\/asktom.oracle.com\/pls\/apex\/asktom.search?tag=alter-table-move"},{"key":"26_CR2","unstructured":"Enable row movement. https:\/\/asktom.oracle.com\/pls\/apex\/asktom.search?tag=enable-row-movement"},{"key":"26_CR3","unstructured":"IBM DB2 reorg. https:\/\/www.ibm.com\/support\/producthub\/db2\/docs\/content\/SSEPGG_11.5.0\/com.ibm.db2.luw.admin.cmd.doc\/doc\/r0001966.html"},{"key":"26_CR4","unstructured":"What is the difference between shrink, move and Impdp. https:\/\/asktom.oracle.com\/pls\/apex\/asktom.search?tag=what-is-the-difference-between-shrink-move-and-impdp"},{"key":"26_CR5","unstructured":"GDPR archives (2020). https:\/\/gdpr.eu\/tag\/gdpr\/"},{"key":"26_CR6","unstructured":"SQL language reference (2020). https:\/\/docs.oracle.com\/en\/database\/oracle\/oracle-database\/19\/sqlrf\/ROWID-Pseudocolumn.html#GUID-F6E0FBD2-983C-495D-9856-5E113A17FAF1"},{"key":"26_CR7","unstructured":"SQL language reference (2020). https:\/\/docs.oracle.com\/en\/database\/oracle\/oracle-database\/19\/sqlrf\/ALTER-TABLE.html#GUID-552E7373-BF93-477D-9DA3-B2C9386F2877"},{"key":"26_CR8","unstructured":"Vacuum (2020). https:\/\/www.postgresql.org\/docs\/12\/sql-vacuum.html"},{"key":"26_CR9","unstructured":"Assistant Secretary of Defense for Networks and Information Integration: Electronic records management software applications design criteria standard (2007). https:\/\/www.esd.whs.mil\/Portals\/54\/Documents\/DD\/issuances\/dodm\/501502std.pdf"},{"key":"26_CR10","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1007\/978-3-319-16486-1_61","volume-title":"New Contributions in Information Systems and Technologies","author":"M Barata","year":"2015","unstructured":"Barata, M., Bernardino, J., Furtado, P.: An overview of decision support benchmarks: TPC-DS, TPC-H and SSB. In: Rocha, A., Correia, A.M., Costanzo, S., Reis, L.P. (eds.) New Contributions in Information Systems and Technologies. AISC, vol. 353, pp. 619\u2013628. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-16486-1_61"},{"key":"26_CR11","unstructured":"Betschka, J., Kiesel, R., Christ, S.: Deutsche wohnen muss 14,5 millionen euro strafe bezahlen (2019). https:\/\/www.tagesspiegel.de\/berlin\/rekordbussgeld-wegen-datenschutzverstoessen-deutsche-wohnen-muss-14-5-millionen-euro-strafe-bezahlen\/25191038.html"},{"key":"26_CR12","unstructured":"Dudjak, M., Luki\u0107, I., K\u00f6hler, M.: Survey of database backup management. In: 27th International Scientific and Professional Conference Organization and Maintenance Technology (2017)"},{"key":"26_CR13","unstructured":"Fox, C.: Google hit with \u00a344m GDPR fine over ads (2019). https:\/\/www.bbc.com\/news\/technology-46944696"},{"issue":"3","key":"26_CR14","doi-asserted-by":"publisher","first-page":"781","DOI":"10.1147\/sj.403.0781","volume":"40","author":"WW Hsu","year":"2001","unstructured":"Hsu, W.W., Smith, A.J., Young, H.C.: Characteristics of production database workloads and the TPC benchmarks. IBM Syst. J. 40(3), 781\u2013802 (2001)","journal-title":"IBM Syst. J."},{"key":"26_CR15","unstructured":"International Data Sanitization Consortium: Data sanitization terminology and definitions (2017). https:\/\/www.datasanitization.org\/data-sanitization-terminology\/"},{"issue":"6","key":"26_CR16","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1007\/s00779-011-0428-7","volume":"16","author":"S Jeon","year":"2012","unstructured":"Jeon, S., Bang, J., Byun, K., Lee, S.: A recovery method of deleted record for SQLite database. Pers. Ubiquit. Comput. 16(6), 707\u2013715 (2012)","journal-title":"Pers. Ubiquit. Comput."},{"issue":"10","key":"26_CR17","first-page":"12","volume":"64","author":"M Langer","year":"2017","unstructured":"Langer, M.: Developing a data backup strategy. Risk Manage. 64(10), 12\u201313 (2017)","journal-title":"Risk Manage."},{"key":"26_CR18","doi-asserted-by":"crossref","unstructured":"Lenard, B., Wagner, J., Rasin, A., Grier, J.: SysGen: system state corpus generator. In: Proceedings of the 15th International Conference on Availability, Reliability and Security, pp. 1\u20136 (2020)","DOI":"10.1145\/3407023.3409202"},{"issue":"6","key":"26_CR19","doi-asserted-by":"publisher","first-page":"622","DOI":"10.1016\/j.ijinfomgt.2017.05.015","volume":"37","author":"V Lozupone","year":"2017","unstructured":"Lozupone, V.: Disaster recovery plan for medical records company. Int. J. Inf. Manage. 37(6), 622\u2013626 (2017)","journal-title":"Int. J. Inf. Manage."},{"key":"26_CR20","unstructured":"Netapp: (2020). https:\/\/kb.netapp.com\/Advice_and_Troubleshooting\/Data_Protection_and_Security\/Snap_Creator_Framework\/What_is_Snap_Creator"},{"key":"26_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/978-3-642-10424-4_17","volume-title":"Performance Evaluation and Benchmarking","author":"P O\u2019Neil","year":"2009","unstructured":"O\u2019Neil, P., O\u2019Neil, E., Chen, X., Revilak, S.: The star schema benchmark and augmented fact table indexing. In: Nambiar, R., Poess, M. (eds.) TPCTC 2009. LNCS, vol. 5895, pp. 237\u2013252. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-10424-4_17"},{"key":"26_CR22","unstructured":"Oracle: Oracle MAA reference architectures. https:\/\/www.oracle.com\/webfolder\/technetwork\/tutorials\/architecture-diagrams\/high-availability-overview\/high-availability-reference-architectures.html"},{"key":"26_CR23","unstructured":"Oracle (2018). https:\/\/www.delltechnologies.com\/en-us\/collaterals\/unauth\/white-papers\/products\/storage\/h14232-oracle-database-backup-recovery-vmax3.pdf"},{"key":"26_CR24","unstructured":"Oracle (2019). https:\/\/docs.oracle.com\/cd\/E53394_01\/html\/E54801\/gbciq.html#scrolltoc"},{"key":"26_CR25","doi-asserted-by":"publisher","unstructured":"Shaik, B.: Backup and restore best practices. In: PostgreSQL Configuration, pp. 93\u2013110. Springer (2020). https:\/\/doi.org\/10.1007\/978-1-4842-5663-3_4","DOI":"10.1007\/978-1-4842-5663-3_4"},{"key":"26_CR26","unstructured":"SQL and PLSQL: High water mark oracle (2020). https:\/\/sqlandplsql.com\/2013\/05\/22\/high-water-mark-oracle\/"},{"key":"26_CR27","doi-asserted-by":"publisher","first-page":"S106","DOI":"10.1016\/j.diin.2015.05.013","volume":"14","author":"J Wagner","year":"2015","unstructured":"Wagner, J., Rasin, A., Grier, J.: Database forensic analysis through internal structure carving. Digit. Investig. 14, S106\u2013S115 (2015)","journal-title":"Digit. Investig."},{"key":"26_CR28","doi-asserted-by":"publisher","first-page":"S97","DOI":"10.1016\/j.diin.2016.04.015","volume":"18","author":"J Wagner","year":"2016","unstructured":"Wagner, J., Rasin, A., Grier, J.: Database image content explorer: carving data that does not officially exist. Digit. Investig. 18, S97\u2013S107 (2016)","journal-title":"Digit. Investig."},{"key":"26_CR29","unstructured":"Wagner, J., Rasin, A., Malik, T., Heart, K., Jehle, H., Grier, J.: Database forensic analysis with DBCarver. In: CIDR 2017, 8th Biennial Conference on Innovative Data Systems Research (2017)"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-78120-0_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T22:02:54Z","timestamp":1750111374000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-78120-0_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030781194","9783030781200"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-78120-0_26","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"15 June 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on ICT Systems Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Oslo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Norway","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 June 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 June 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"36","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sec2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.ifipsec.org\/2021\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"112","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}