Database security
Role-Based Access Control Models
Computer
Automatically generating OLAP schemata from conceptual graphical models
Proceedings of the 3rd ACM international workshop on Data warehousing and OLAP
Towards OLAP security design — survey and research issues
Proceedings of the 3rd ACM international workshop on Data warehousing and OLAP
Fundamentals of Database Systems
Fundamentals of Database Systems
Identifying Security Holes in OLAP Applications
Proceedings of the IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security: Data and Application Security, Development and Directions
The Entity-Relationship Model for Multilevel Security
ER '93 Proceedings of the 12th International Conference on the Entity-Relationship Approach: Entity-Relationship Approach
Extending the E/R Model for the Multidimensional Paradigm
ER '98 Proceedings of the Workshops on Data Warehousing and Data Mining: Advances in Database Technologies
Querying Multidimensional Databases
DBLP-6 Proceedings of the 6th International Workshop on Database Programming Languages
Research in data warehouse modeling and design: dead or alive?
DOLAP '06 Proceedings of the 9th ACM international workshop on Data warehousing and OLAP
Access control and audit model for the multidimensional modeling of data warehouses
Decision Support Systems
Developing secure data warehouses with a UML extension
Information Systems
Building a secure star schema in data warehouses by an extension of the relational package from CWM
Computer Standards & Interfaces
Automatic Generation of Secure Multidimensional Code for Data Warehouses: An MDA Approach
OTM '08 Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008. Part II on On the Move to Meaningful Internet Systems
An engineering process for developing Secure Data Warehouses
Information and Software Technology
Data & Knowledge Engineering
A UML 2.0 profile to define security requirements for Data Warehouses
Computer Standards & Interfaces
Towards a Modernization Process for Secure Data Warehouses
DaWaK '09 Proceedings of the 11th International Conference on Data Warehousing and Knowledge Discovery
Defining and transforming security rules in an MDA approach for DWs
International Journal of Business Intelligence and Data Mining
Model driven development of secure XML data warehouses: a case study
Proceedings of the 2010 EDBT/ICDT Workshops
A UML profile for modeling data warehouse usage
ER'07 Proceedings of the 2007 conference on Advances in conceptual modeling: foundations and applications
Towards the secure modelling of OLAP users behaviour
SDM'10 Proceedings of the 7th VLDB conference on Secure data management
Modeling of security requirements for decision information systems
ACM SIGSOFT Software Engineering Notes
A practical application of our MDD approach for modeling secure XML data warehouses
Decision Support Systems
Evaluation of approaches for designing secure data warehouse
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
International Journal of Data Warehousing and Mining
Hi-index | 0.00 |
Traditionally data warehouses were queried by high level users (executive management, business analysts) only. As the range of potential users with data warehouse access is steadily growing, this assumption is no longer appropriate and the necessity of proper access control mechanisms arises. The security capabilities of available commercial OLAP systems are highly proprietary and the syntax of their security constraints is not suitable for design and documentation purposes. Also, approaches trying to derive the access control policies from the operational data sources have not been very successful, as the relational model is predominate in operational systems while OLAP systems make use of the non-traditional multidimensional model. Access control schemes do not map easily. We approach the issue from the application side by introducing a methodology and a language for conceptual OLAP security design.