60,030 Hits in 3.5 sec


Burtescu Emil
2009 Annals of the University of Oradea: Economic Science  
Data warehouses were initially implemented and developed by the big firms and they were used for working out the managerial problems and for making decisions.  ...  Later on, because of the economic tendencies and of the technological progress, the data warehou  ...  Data warehouse security Securing a data warehouse is an operation that requires much care and the concentration of the efforts because there are a few particular aspects that may appear.  ... 
doaj:b6890ee3bf434d5688a8355e42d071b6 fatcat:fhe6ohdojfbf3npvcw6fnmmrla

Security Issues in Data Warehouse [article]

Saiqa Aleem, Luiz Fernando Capretz, Faheem Ahmed
2015 arXiv   pre-print
A review of security approaches specifically for data warehouse environment and issues concerning each type of security approach have been provided in this paper.  ...  A data warehouse environment must ensure that data collected and stored in one big repository are not vulnerable.  ...  [21] proposed a data-masking technique for data warehouses consisting only of numerical values.  ... 
arXiv:1507.05644v1 fatcat:h2vytdssp5gkdin7y3zgzdvgke

View security as the basis for data warehouse security

Arnon Rosenthal, Edward Sciore
2000 Design and Management of Data Warehouses  
Access . permissions in a data warehouse are currently managed in a separate world from the sources' policies.  ...  We also propose a new permission construct suitable for views that filter data from mutually-suspicious parties.  ...  Introduction A key challenge for data warehouse security is how to manage the entire system coherently -from sources and their export tables, to warehouse stored tables (conventional and cubes) and views  ... 
dblp:conf/dmdw/RosenthalS00 fatcat:gyvby6fnczao3kbeq5vdkuihdu

Enhanced Security Framework to Develop Secure Data Warehouse

Anshuman Kumar Saurabh, Bharti Nagpal
2011 International Journal of Communication Networks and Security  
In this paper, a framework is proposed to prevent the data from unauthorized access and thereby increases the security of data warehouse.  ...  The data warehouse can be easily accessed by an authorized user or by an unauthorized user through unfair means.  ...  A lot of research is done in the internal security of data warehouse at the time of data warehouse design.  ... 
doi:10.47893/ijcns.2011.1021 fatcat:vdbkfrdhufbwrbfpqyhza5kone

Data Warehouse Signature: A Framework for Implementing Security Issues in Data Warehouses

Mayada J. AlMeghari
2017 Journal of Computer Sciences and Applications  
The current paper presents a new framework for implementing security issues in DWs named Data Warehouse Signature (DWS).  ...  This data is composed together from integrated heterogeneous data sources to form Data Warehouse (DW).  ...  In the current paper, a new approach named Data Warehouse Signature (DWS) is presented to solve the two security problems.  ... 
doi:10.12691/jcsa-5-1-3 fatcat:memzgpt5and3xiehd4i6w6bu34

Data Warehouse Testing and Security: A Conspectus

Literature for the testing techniques is integrated at one place and the outcome is to focus on security issues while performing data warehouse testing.  ...  In this research paper, we are discussing the data warehouse architecture and the testing techniques that are used for best suited to be used for the data warehouses.  ...  Apart from maintaining high quality of data in a data warehouse, the security of the data should also be focused to get a secure data at the target in the data warehouse. Figure 1 . 1 Figure 1.  ... 
doi:10.35940/ijitee.i1136.0789s19 fatcat:7vk7ckpdhveqhippnzq2fexbw4

Data Warehouse Signature: High Performance Evaluation for Implementing Security Issues in Data Warehouses through a New Framework

Mayada J. AlMeghari
2017 International Journal of Security and Its Applications  
Hence, the data stores contain a huge amount of business data used for decision-making and for financial analysis at sensitive organizations called Data Warehouses (DWs).  ...  This paper presents a new framework for implementing security issues in DWs named Data Warehouse Signature (DWS), which is distributed in two models: DWSend model and DWReceive model.  ...  Introduction A Data Warehouse (DW) is considered a core component of business intelligence environment just as decision-making and data mining.  ... 
doi:10.14257/ijsia.2017.11.6.05 fatcat:rfms7j26bngpzhugdkiig5velm

Secure Data Entry in Operational Systems for Data Warehouse

Er. Muheet Ahmed Butt
2012 IOSR Journal of Engineering  
A 'data warehouse' is a repository of an organization's electronically stored data. Emergence of Huge Data Warehouses has also put a big challenge in these Data Entry Processing Systems.  ...  home by typing it in by way of data entry which is pre designed to simplify the process In this paper we have proposed a security measure for a distributed for the manual data entry module pertaining  ...  These levels have been designed to provide efficient security mechanism for a huge and complex manual data entry for Operational Systems pertaining to a Data warehouse.  ... 
doi:10.9790/3021-0204781786 fatcat:gdfezqoepbh47jikjrvkgsczea

Developing secure data warehouses with a UML extension

Eduardo Fernández-Medina, Juan Trujillo, Rodolfo Villarroel, Mario Piattini
2007 Information Systems  
Data Warehouses (DWs), Multidimensional (MD) Databases, and On-Line Analytical Processing Applications are used as a very powerful mechanism for discovering crucial business information.  ...  MD modeling, thereby allowing us to design secure DWs.  ...  Introduction Multidimensional (MD) modeling is the foundation of Data Warehouses (DWs), MD Databases, and On-Line Analytical Processing (OLAP) applications.  ... 
doi:10.1016/ fatcat:rqjtshxrf5ddxijqu3e67mcidu

Development of Secure XML Data Warehouses with QVT

B. Vela, J.N. Mazón, C. Blanco, E. Fernández-Medina, J. Trujillo, E. Marcos
2013 Information and Software Technology  
Security is thus a key issue in the design of data warehouses, regardless of the implementation technology.  ...  sources from the Web and the data warehouse.  ...  Introduction Data Warehouse (DW) systems [1, 2] provide a Multidimensional (MD) [3] view of huge amounts of historical data from heterogeneous operational sources.  ... 
doi:10.1016/j.infsof.2013.03.003 fatcat:d3hdq22fk5ezdcwo5e2jqnja7m

Towards a Modernization Process for Secure Data Warehouses [chapter]

Carlos Blanco, Ricardo Pérez-Castillo, Arnulfo Hernández, Eduardo Fernández-Medina, Juan Trujillo
2009 Lecture Notes in Computer Science  
Data Warehouses (DW) manage crucial enterprise information used for the decision making process which has to be protected from unauthorized accesses.  ...  Thus, we have proposed a model driven architecture (MDA) for secure DWs which takes into account security issues from the early stages of development and provides automatic transformations between models  ...  2003; Hainaut, Englebert et al. 2004) , there is little research on reengineering of data warehouses following an MDA approach and security concerns are not considered.  ... 
doi:10.1007/978-3-642-03730-6_3 fatcat:kcy7klzdyzg7xbcc4envkfwnz4

Security Issues in Data Warehouse: A Systematic Review

Anjana Gosain, Amar Arora
2015 Procedia Computer Science  
Review Questions Review Methods Results and Discussion Summary and Conclusion References Security Based Article discussed on DW DevelopmentTechnology Encrypted data: Audit control: Extendibility  ...  : Platform Independence Model security: Transformation: Creation of PSM: QVT support: Integration of multi-platform data: 21% 3% 3% 11% 21% 19% 22% © 2015 The Authors.  ... 
doi:10.1016/j.procs.2015.04.164 fatcat:7an27e5uufdbnf2xpd2k2hqt7a

An Integrated Conceptual Model for Temporal Data Warehouse Security

Marwa Salah Farhan, Mohamed E. Marie, Laila M. El-Fangary, Yehia K. Helmy
2011 Computer and Information Science  
This paper proposes an integrated conceptual model for addressing temporal data warehouse security requirements (CMTDWS).  ...  This paper proposes a conceptual model to refresh data warehouse by (insert, update, delete) data using ETL processes and considering DW security requirements.  ...  We shall implement the extended CMTDWS to some commercial tools in order to elicit security requirement for DWs at the business level and we shall accomplish this with the MDA in order to cover the whole  ... 
doi:10.5539/cis.v4n4p46 fatcat:wnkvx34nzvbrdnk5iphkyvbrni

Building Secure Data Warehouse Schemas from Federated Information Systems [chapter]

Fèlix Saltor, Marta Oliva, Alberto Abelló, José Samos
2002 Heterogeneous Information Exchange and Organizational Hubs  
In the context of an integrated architecture for both Federated Information Systems and Data Warehousing, we discuss how additional schema levels provide security, and operations to convert from one level  ...  There are similarities between architectures for Federated Information Systems and architectures for Data Warehousing.  ...  We are currently working on the conforming operations, on security level integration, and on O-O data models supporting time in the way required by Data Warehouses and Data Marts.  ... 
doi:10.1007/978-94-017-1769-4_8 fatcat:5nhe5yiaefalfb4rgmsnvgd5g4

A Secured Agent-Based Framework for Data Warehouse Management

Nachamada Blamah
2013 IOSR Journal of Computer Engineering  
Managing data warehouses (DWs) is typically characterized by intensive data processing and protracted activities which usually degrade performance.  ...  These obviously expose the system to wider security issues. In order to enhance performance, we present a scheme that utilizes the mobility characteristic of agents.  ...  Literatures have looked at data warehouse (DW) and security from different perspectives.  ... 
doi:10.9790/0661-1443643 fatcat:cwocvccrlfh7nn6qv7jjmvwy5i
« Previous Showing results 1 — 15 out of 60,030 results