Towards OLAP security design — survey and research issues
Proceedings of the 3rd ACM international workshop on Data warehousing and OLAP
Access control and audit model for the multidimensional modeling of data warehouses
Decision Support Systems
Developing secure data warehouses with a UML extension
Information Systems
Building a secure star schema in data warehouses by an extension of the relational package from CWM
Computer Standards & Interfaces
Automatic Generation of Secure Multidimensional Code for Data Warehouses: An MDA Approach
OTM '08 Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008. Part II on On the Move to Meaningful Internet Systems
An engineering process for developing Secure Data Warehouses
Information and Software Technology
A UML 2.0 profile to define security requirements for Data Warehouses
Computer Standards & Interfaces
Defining and transforming security rules in an MDA approach for DWs
International Journal of Business Intelligence and Data Mining
Model driven development of secure XML data warehouses: a case study
Proceedings of the 2010 EDBT/ICDT Workshops
A practical application of our MDD approach for modeling secure XML data warehouses
Decision Support Systems
Using UML packages for designing secure data warehouses
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
Evaluation of approaches for designing secure data warehouse
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
International Journal of Data Warehousing and Mining
Hi-index | 0.00 |
The aim of this paper is to give an overview of security relevant aspects of existing OLAP/Data Warehouse solutions, an area which has seen rather little interest from product developers and is only beginning to be discussed in the research community. Following this description of the current situation, a metadata driven approach implemented as part of the WWW-EIS-DWH project is presented in detail. The prototype focuses on the technical realisation and is intended not to be open for use in different security policies.