Modelling strategic relationships for process reengineering
Modelling strategic relationships for process reengineering
A methodological framework for data warehouse design
Proceedings of the 1st ACM international workshop on Data warehousing and OLAP
Software engineering for security: a roadmap
Proceedings of the Conference on The Future of Software Engineering
Towards OLAP security design — survey and research issues
Proceedings of the 3rd ACM international workshop on Data warehousing and OLAP
The Data Warehouse Lifecycle Toolkit: Expert Methods for Designing, Developing and Deploying Data Warehouses with CD Rom
Access Control: Policies, Models, and Mechanisms
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Polyinstantation for Cover Stories
ESORICS '92 Proceedings of the Second European Symposium on Research in Computer Security
Conflict Detection and Resolution in Access Control Policy Specifications
FoSSaCS '02 Proceedings of the 5th International Conference on Foundations of Software Science and Computation Structures
A Pragmatic Approach to Conceptual Modeling of OLAP Security
ER '01 Proceedings of the 20th International Conference on Conceptual Modeling: Conceptual Modeling
DEXA '97 Proceedings of the 8th International Workshop on Database and Expert Systems Applications
A Prototype Model for Data Warehouse Security Based on Metadata
DEXA '98 Proceedings of the 9th International Workshop on Database and Expert Systems Applications
A Method for Demand-Driven Information Requirements Analysis in Data Warehousing Projects
HICSS '03 Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS'03) - Track 8 - Volume 8
Role-Based Access Control
The rational unified process made easy: a practitioner's guide to the RUP
The rational unified process made easy: a practitioner's guide to the RUP
DWARF: AN Approach for Requirements Definition and Management of Data Warehouse Systems
RE '03 Proceedings of the 11th IEEE International Conference on Requirements Engineering
Goal-oriented requirement analysis for data warehouse design
Proceedings of the 8th ACM international workshop on Data warehousing and OLAP
Requirements-based access control analysis and policy specification
Requirements-based access control analysis and policy specification
Research in data warehouse modeling and design: dead or alive?
DOLAP '06 Proceedings of the 9th ACM international workshop on Data warehousing and OLAP
A UML profile for multidimensional modeling in data warehouses
Data & Knowledge Engineering - Special issue: ER 2003
Access control and audit model for the multidimensional modeling of data warehouses
Decision Support Systems
Developing secure data warehouses with a UML extension
Information Systems
Application of QVT for the Development of Secure Data Warehouses: A case study
ARES '07 Proceedings of the The Second International Conference on Availability, Reliability and Security
A Framework for the Development of Secure Data Warehouses based on MDA and QVT
ARES '07 Proceedings of the The Second International Conference on Availability, Reliability and Security
A set of QVT relations to transform PIM to PSM in the Design of Secure Data Warehouses
ARES '07 Proceedings of the The Second International Conference on Availability, Reliability and Security
An MDA approach for the development of data warehouses
Decision Support Systems
Building a secure star schema in data warehouses by an extension of the relational package from CWM
Computer Standards & Interfaces
Effective methods for software testing, third edition
Effective methods for software testing, third edition
Integrating security and systems engineering: towards the modelling of secure information systems
CAiSE'03 Proceedings of the 15th international conference on Advanced information systems engineering
A model-driven goal-oriented requirement engineering approach for data warehouses
ER'07 Proceedings of the 2007 conference on Advances in conceptual modeling: foundations and applications
A data warehouse engineering process
ADVIS'04 Proceedings of the Third international conference on Advances in Information Systems
Security and management policy specification
IEEE Network: The Magazine of Global Internetworking
Towards a Modernization Process for Secure Data Warehouses
DaWaK '09 Proceedings of the 11th International Conference on Data Warehousing and Knowledge Discovery
Analysis of Secure Mobile Grid Systems: A systematic approach
Information and Software Technology
Towards the secure modelling of OLAP users behaviour
SDM'10 Proceedings of the 7th VLDB conference on Secure data management
A practical application of our MDD approach for modeling secure XML data warehouses
Decision Support Systems
Not Ready for Prime Time: A Survey on Security in Model Driven Development
International Journal of Secure Software Engineering
Hi-index | 0.00 |
We present a new approach for the elicitation and development security requirements in the entire Data Warehouse (DWs) life cycle, which we have called a Secure Engineering process for DAta WArehouses (SEDAWA). Whilst many methods for the requirements analysis phase of the DWs have been proposed, the elicitation of security requirements as non-functional requirements has not received sufficient attention. Hence, in this paper we propose a methodology for the DW design based on Model Driven Architecture (MDA) and the standard Software Process Engineering Metamodel Specification (SPEM) from the Object Management Group (OMG). We define four phases comprising of several activities and steps, an d five disciplines which cover the whole DW design. Our methodology adapts the i^* framework to be used under MDA and the SPEM approaches in order to elicit and develop security requirements for DWs. The benefits of our proposal are shown through an example related to the management of the pharmacies consortium business.