Security-control methods for statistical databases: a comparative study
ACM Computing Surveys (CSUR)
Multilevel security issues in distributed database management systems II
Computers and Security
Building the data warehouse
Parallel processing and trusted database management systems
CSC '93 Proceedings of the 1993 ACM conference on Computer science
Role-Based Access Control Models
Computer
Security issues for federated database systems
Computers and Security
Secure audit logs to support computer forensics
ACM Transactions on Information and System Security (TISSEC)
Data mining, national security, privacy and civil liberties
ACM SIGKDD Explorations Newsletter
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
The UCONABC usage control model
ACM Transactions on Information and System Security (TISSEC)
When do data mining results violate privacy?
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Providing k-anonymity in data mining
The VLDB Journal — The International Journal on Very Large Data Bases
Towards a Modernization Process for Secure Data Warehouses
DaWaK '09 Proceedings of the 11th International Conference on Data Warehousing and Knowledge Discovery
Defining and transforming security rules in an MDA approach for DWs
International Journal of Business Intelligence and Data Mining
Model driven development of secure XML data warehouses: a case study
Proceedings of the 2010 EDBT/ICDT Workshops
Towards the secure modelling of OLAP users behaviour
SDM'10 Proceedings of the 7th VLDB conference on Secure data management
Modeling of security requirements for decision information systems
ACM SIGSOFT Software Engineering Notes
A practical application of our MDD approach for modeling secure XML data warehouses
Decision Support Systems
Effective data warehouse for information delivery: a literature survey and classification
International Journal of Networking and Virtual Organisations
Hi-index | 0.00 |
This paper first discusses security issues for data warehousing. In particular, issues on building a secure data warehouse, secure data warehousing technologies as well as design issues are discussed. Our design of a secure data warehouse that enforces an Extended RBAC Policy is described next. This will be followed by a discussion of privacy issues for data warehousing. Finally directions for secure data warehouses are discussed.