Building the Data Warehouse,3rd Edition
Building the Data Warehouse,3rd Edition
SecureUML: A UML-Based Modeling Language for Model-Driven Security
UML '02 Proceedings of the 5th International Conference on The Unified Modeling Language
Identity Mapping: An Approach to Unravel Enterprise Security Management Policies
Proceedings of the IFIP TC11 Fifteenth Annual Working Conference on Information Security for Global Information Infrastructures
A Pragmatic Approach to Conceptual Modeling of OLAP Security
ER '01 Proceedings of the 20th International Conference on Conceptual Modeling: Conceptual Modeling
DEXA '97 Proceedings of the 8th International Workshop on Database and Expert Systems Applications
A Prototype Model for Data Warehouse Security Based on Metadata
DEXA '98 Proceedings of the 9th International Workshop on Database and Expert Systems Applications
Model driven security: From UML models to access control infrastructures
ACM Transactions on Software Engineering and Methodology (TOSEM)
Access control and audit model for the multidimensional modeling of data warehouses
Decision Support Systems
Developing secure data warehouses with a UML extension
Information Systems
Integrating Security and Software Engineering: Advances and Future Vision
Integrating Security and Software Engineering: Advances and Future Vision
Extended RBAC-based design and implementation for a secure data warehouse
International Journal of Business Intelligence and Data Mining
Building a secure star schema in data warehouses by an extension of the relational package from CWM
Computer Standards & Interfaces
A UML 2.0 profile to define security requirements for Data Warehouses
Computer Standards & Interfaces
An MDA approach to Access Control Specifications Using MOF and UML Profiles
Electronic Notes in Theoretical Computer Science (ENTCS)
Hi-index | 0.00 |
Data Warehouses (DWs) store historical information which support the decision-making process. Since this information is crucial, it has to be protected from unauthorised accesses by defining security constraints in all stages of the DW development process. In previous works, we applied the Model-Driven (MDA) philosophy to define secure DWs using several security models and transformations. Nevertheless, our conceptual model makes it possible to define complex security rules with OCL expressions which are not transformed automatically. This paper deals with this problem and completes our approach improving our conceptual metamodel and defining new transformation rules. Finally, an application example is shown.