Security in Data Warehouses
نویسنده
چکیده
Landwehr (2001) defines how the etymological roots of the term “secure” are found in “se” which means “without,” or “apart from,” and “cure,” i.e. “to care for,” or “to be concerned about”. While there are many definitions of the primary requirements of security, the classical requirements are summarized by the acronym CIA. CIA is the acronym for confidentiality, integrity, and availability. All other security requirements such as non-repudiation can be traced back to these three basic properties. Avizienis (2004) defines confidentiality as the absence of unauthorized disclosure of information, integrity as the absence of improper system alterations and availability as readiness for correct service.
منابع مشابه
Stored-grains pests and their control with emphasis on military food warehouses in Iran: a review
Background and Aim: In order to providing healthy food and improve food security, it is vital to preserve and protect agricultural products from pest's damage during storage. This is especially crucial for strategic products such as grains and cereals. Inefficient management in this subject would lead to the loss of stored food and will make the country's economic dependence on the other. In pa...
متن کاملAutomatic Generation of Secure Multidimensional Code for Data Warehouses by using QVT Transformations: an MDA Approach
Data Warehouses manage vital information for the decision making process, which may be discovered by unauthorized users if we do not establish security measures in all the stages of the development process. We have proposed an MDA architecture to develop secure Data Warehouses which allows them to be modeled at different abstraction levels (business, conceptual, logical and code level). We take...
متن کاملDevelopment of Secure XML Data Warehouses with QVT
Context: Data warehouses are systems which integrate heterogeneous sources to support the decision making process. Data from the Web is becoming increasingly more important as sources for these systems, which has motivated the extensive use of XML to facilitate data and metadata interchange among heterogeneous data sources from the Web and the data warehouse. However, the business information t...
متن کاملFuzzy multi-criteria selection procedures in choosing data source
Technology assessment and selection has a substantial impact on organizations procedures in regards to technology transfer. Technological decisions are usually made by a group of experts, and whereby integrity of these viewpoints to a single decision can be quite complex. Today, operational databases and data warehouses exist to manage and organize data with specific features and henceforth, th...
متن کاملA UML 2.0/OCL Extension for Designing Secure Data Warehouses
At present, it is very difficult to develop a methodology that fulfills all criteria and comprises all security constraints in the successful design of data warehouses. If that methodology were developed, its complexity would hinder its success. The solution, therefore, would be an approach in which techniques and models defined by the most accepted model standards were extended by integrating ...
متن کاملAn Authorization Model for Data Warehouses and OLAP
In this paper we discuss a basic authorization model for data warehouses and OLAP offering greater expressiveness and highly increased usability with respect to security. Based on a simple formal notation we will show that access privileges can be expressed more intuitively than using SQL’s grant statements.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016