Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Designing Secure Data Warehouses

Designing Secure Data Warehouses
View Sample PDF
Author(s): Rodolfo Villarroel (Universidad Católica del Maule, Chile), Eduardo Fernández-Medina (Universidad de Castilla-La Mancha, Spain), Juan Trujillo (Universidad de Alicante, Spain) and Mario Piattini (Universidad de Castilla-La Mancha, Spain)
Copyright: 2006
Pages: 6
Source title: Encyclopedia of Gender and Information Technology
Source Author(s)/Editor(s): Eileen M. Trauth (Pennsylvania State University, USA)
DOI: 10.4018/978-1-59140-815-4.ch090


View Designing Secure Data Warehouses on the publisher's website for pricing and purchasing information.


Organizations depend increasingly on information systems, which rely upon databases and data warehouses (DWs), which need increasingly more quality and security. Generally, we have to deal with sensitive information such as the diagnosis made on a patient or even personal beliefs or other sensitive data. Therefore, a final DW solution should consider the final users that can have access to certain specific information. Unfortunately, methodologies that incorporate security are based on an operational environment and not on an analytical one. Therefore, they do not include security into the multidimensional approaches to work with DWs. In this chapter, we present a comparison of six secure-systems design methodologies. Next, an extension of the UML that allows us to specify main security aspects in the multidimensional conceptual modeling is proposed, thereby allowing us to design secure DWs. Finally, we present how the conceptual model can be implemented with Oracle Label Security (OLS10g).

Related Content

. © 2019. 20 pages.
. © 2019. 22 pages.
. © 2019. 52 pages.
. © 2019. 35 pages.
. © 2019. 46 pages.
. © 2019. 53 pages.
. © 2019. 29 pages.
Body Bottom