Conceptual-model-based data extraction from multiple-record Web pages
Data & Knowledge Engineering
Conceptual modeling for ETL processes
Proceedings of the 5th ACM international workshop on Data Warehousing and OLAP
Scaling Access to Heterogeneous Data Sources with DISCO
IEEE Transactions on Knowledge and Data Engineering
On the Logical Modeling of ETL Processes
CAiSE '02 Proceedings of the 14th International Conference on Advanced Information Systems Engineering
Deriving Safety Requirements Using Scenarios
RE '01 Proceedings of the Fifth IEEE International Symposium on Requirements Engineering
Eliciting security requirements with misuse cases
Requirements Engineering
A generic and customizable framework for the design of ETL scenarios
Information Systems - Special issue: The 15th international conference on advanced information systems engineering (CAiSE 2003)
Integrating Functional and Security Requirements with Use Case Decomposition
ICECCS '06 Proceedings of the 11th IEEE International Conference on Engineering of Complex Computer Systems
Misuse Cases: Use Cases with Hostile Intent
IEEE Software
The Data Warehouse Lifecycle Toolkit
The Data Warehouse Lifecycle Toolkit
Hi-index | 0.00 |
One of the major causes for developing distributed systems is wide variety of target domain and project characteristics. Especially to implement security policies required for such software systems become more complicated. Modeling of these types of scenarios with security constraints is crucial in producing quality software. The scenario is more complicated in case of ETL processes. In this paper, we propose an object-oriented approach using UML 2.0 for secure data extraction in ETL processes. We exploit the features of UML 2.0 for modeling the complex features to implement security policies. We discuss the validity of the model using a case study on Banking application.