Automatic Generation of Secure Multidimensional Code for Data Warehouses: An MDA Approach
OTM '08 Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008. Part II on On the Move to Meaningful Internet Systems
A Conceptual Modeling Approach for OLAP Personalization
ER '09 Proceedings of the 28th International Conference on Conceptual Modeling
Modeling of security requirements for decision information systems
ACM SIGSOFT Software Engineering Notes
Securing data warehouses: a semi-automatic approach for inference prevention at the design level
MEDI'11 Proceedings of the First international conference on Model and data engineering
Not Ready for Prime Time: A Survey on Security in Model Driven Development
International Journal of Secure Software Engineering
Effective data warehouse for information delivery: a literature survey and classification
International Journal of Networking and Virtual Organisations
Hi-index | 0.00 |
Data warehouse (DW) systems integrate data from heterogeneous sources and are used by decision makers to analyze the status and the development of an organization. Traditionally, requirement analysis approaches for DWs have focused purely on information needs of decision makers, without considering other kinds of requirements such as security or performance. But modeling these issues in the early stages of the development is a cornerstone for building a DW that satisfies user expectations. In this paper, we define the two kinds of requirements for data warehousing as information and quality-of-service requirements and combine them in a comprehensive approach based on MDA (Model Driven Architecture). This allows a separation of concerns to model requirements without losing the connection between information and quality-of-service, also in the following conceptual or logical design stages. Finally, in this paper, we introduce a security requirement model for data warehousing, and a three-step process for modeling security requirements, thus illustrating the applicability of our approach with an example.