A model of authorization for next-generation database systems
ACM Transactions on Database Systems (TODS)
Toward a multilevel secure relational data model
SIGMOD '91 Proceedings of the 1991 ACM SIGMOD international conference on Management of data
Modeling Security-Relevant Data Semantics
IEEE Transactions on Software Engineering
The multilevel relational (MLR) data model
ACM Transactions on Information and System Security (TISSEC)
A flexible authorization mechanism for relational data management systems
ACM Transactions on Information Systems (TOIS)
starER: a conceptual model for data warehouse design
Proceedings of the 2nd ACM international workshop on Data warehousing and OLAP
Software engineering for security: a roadmap
Proceedings of the Conference on The Future of Software Engineering
Technical opinion: Information system security management in the new millennium
Communications of the ACM
Flexible support for multiple access control policies
ACM Transactions on Database Systems (TODS)
A fine-grained access control system for XML documents
ACM Transactions on Information and System Security (TISSEC)
An access control language for web services
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Building the Data Warehouse,3rd Edition
Building the Data Warehouse,3rd Edition
Past, present, and future of decision support technology
Decision Support Systems - Special issue: Decision support systems: Directions for the next decade
Decision Support Systems - Special issue: Decision support systems: Directions for the next decade
Decision Support Systems - Special issue: Decision support systems: Directions for the next decade
An Authorization Model for a Distributed Hypertext System
IEEE Transactions on Knowledge and Data Engineering
Access Control: Policies, Models, and Mechanisms
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
YAM2 (Yet Another Multidimensional Model): An Extension of UML
IDEAS '02 Proceedings of the 2002 International Symposium on Database Engineering & Applications
Polyinstantation for Cover Stories
ESORICS '92 Proceedings of the Second European Symposium on Research in Computer Security
An Authorization Model for Workflows
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
SecureUML: A UML-Based Modeling Language for Model-Driven Security
UML '02 Proceedings of the 5th International Conference on The Unified Modeling Language
Analysis of UML Stereotypes within the UML Metamodel
UML '02 Proceedings of the 5th International Conference on The Unified Modeling Language
UMLsec: Extending UML for Secure Systems Development
UML '02 Proceedings of the 5th International Conference on The Unified Modeling Language
Extending the UML for Multidimensional Modeling
UML '02 Proceedings of the 5th International Conference on The Unified Modeling Language
An Access Control Model for Data Archives
IFIP/Sec '01 Proceedings of the IFIP TC11 Sixteenth Annual Working Conference on Information Security: Trusted Information: The New Decade Challenge
Multidimensional Modeling with UML Package Diagrams
ER '02 Proceedings of the 21st International Conference on Conceptual Modeling
Extending the E/R Model for the Multidimensional Paradigm
ER '98 Proceedings of the Workshops on Data Warehousing and Data Mining: Advances in Database Technologies
A Pragmatic Approach to Conceptual Modeling of OLAP Security
ER '01 Proceedings of the 20th International Conference on Conceptual Modeling: Conceptual Modeling
DEXA '97 Proceedings of the 8th International Workshop on Database and Expert Systems Applications
Finding Your Way through Multidimensional Data Models
DEXA '98 Proceedings of the 9th International Workshop on Database and Expert Systems Applications
A Prototype Model for Data Warehouse Security Based on Metadata
DEXA '98 Proceedings of the 9th International Workshop on Database and Expert Systems Applications
The Object Constraint Language: Getting Your Models Ready for MDA
The Object Constraint Language: Getting Your Models Ready for MDA
Model driven development of secure XML databases
ACM SIGMOD Record
Building a secure star schema in data warehouses by an extension of the relational package from CWM
Computer Standards & Interfaces
How to implement multidimensional security into OLAP tools
International Journal of Business Intelligence and Data Mining
Automatic Generation of Secure Multidimensional Code for Data Warehouses: An MDA Approach
OTM '08 Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008. Part II on On the Move to Meaningful Internet Systems
An adaptive security model using agent-oriented MDA
Information and Software Technology
Editorial: Model-Driven Development for secure information systems
Information and Software Technology
An engineering process for developing Secure Data Warehouses
Information and Software Technology
A UML 2.0 profile to define security requirements for Data Warehouses
Computer Standards & Interfaces
Towards a Modernization Process for Secure Data Warehouses
DaWaK '09 Proceedings of the 11th International Conference on Data Warehousing and Knowledge Discovery
Defining and transforming security rules in an MDA approach for DWs
International Journal of Business Intelligence and Data Mining
Model driven development of secure XML data warehouses: a case study
Proceedings of the 2010 EDBT/ICDT Workshops
Towards the secure modelling of OLAP users behaviour
SDM'10 Proceedings of the 7th VLDB conference on Secure data management
A practical application of our MDD approach for modeling secure XML data warehouses
Decision Support Systems
Evaluation of approaches for designing secure data warehouse
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Hi-index | 0.00 |
Due to the sensitive data contained in Data Warehouses (DW), it is essential to specify security measures from the early stages of the DW design and enforce them. Traditional access control models for transactional (relational) databases, based on tables, columns and rows, are not appropriate for DWs. Instead, security and audit rules defined for DWs must be specified based on the multidimensional (MD) modeling used to design data warehouses. Current approaches for the conceptual modeling of DWs do not allow us to specify security and confidentiality constraints in the conceptual modeling phase. In this paper, we propose an Access Control and Audit (ACA) model for DWs by specifying security rules in the conceptual MD modeling. Thus, we define authorization rules for users and objects and we assign sensitive information rules and authorization roles to the main elements of a MD model (e.g., facts or dimensions). Moreover, we also specify certain audit rules allowing us to analyze user behaviors. To be able to include and use our ACA model in the conceptual MD modeling, we extend the Unified Modeling Language (UML) with our ACA model, thereby allowing us to design secure MD models. Finally, to show the benefit of our approach, we apply our approach to a health care case study.