A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
DATA WAREHOUSES SECURITY IMPLEMENTATION
2009
Annals of the University of Oradea: Economic Science
Data warehouses were initially implemented and developed by the big firms and they were used for working out the managerial problems and for making decisions. ...
Later on, because of the economic tendencies and of the technological progress, the data warehou ...
Data warehouse security Securing a data warehouse is an operation that requires much care and the concentration of the efforts because there are a few particular aspects that may appear. ...
doaj:b6890ee3bf434d5688a8355e42d071b6
fatcat:fhe6ohdojfbf3npvcw6fnmmrla
Security Issues in Data Warehouse
[article]
2015
arXiv
pre-print
A review of security approaches specifically for data warehouse environment and issues concerning each type of security approach have been provided in this paper. ...
A data warehouse environment must ensure that data collected and stored in one big repository are not vulnerable. ...
[21] proposed a data-masking technique for data warehouses consisting only of numerical values. ...
arXiv:1507.05644v1
fatcat:h2vytdssp5gkdin7y3zgzdvgke
View security as the basis for data warehouse security
2000
Design and Management of Data Warehouses
Access . permissions in a data warehouse are currently managed in a separate world from the sources' policies. ...
We also propose a new permission construct suitable for views that filter data from mutually-suspicious parties. ...
Introduction A key challenge for data warehouse security is how to manage the entire system coherently -from sources and their export tables, to warehouse stored tables (conventional and cubes) and views ...
dblp:conf/dmdw/RosenthalS00
fatcat:gyvby6fnczao3kbeq5vdkuihdu
Enhanced Security Framework to Develop Secure Data Warehouse
2011
International Journal of Communication Networks and Security
In this paper, a framework is proposed to prevent the data from unauthorized access and thereby increases the security of data warehouse. ...
The data warehouse can be easily accessed by an authorized user or by an unauthorized user through unfair means. ...
A lot of research is done in the internal security of data warehouse at the time of data warehouse design. ...
doi:10.47893/ijcns.2011.1021
fatcat:vdbkfrdhufbwrbfpqyhza5kone
Data Warehouse Signature: A Framework for Implementing Security Issues in Data Warehouses
2017
Journal of Computer Sciences and Applications
The current paper presents a new framework for implementing security issues in DWs named Data Warehouse Signature (DWS). ...
This data is composed together from integrated heterogeneous data sources to form Data Warehouse (DW). ...
In the current paper, a new approach named Data Warehouse Signature (DWS) is presented to solve the two security problems. ...
doi:10.12691/jcsa-5-1-3
fatcat:memzgpt5and3xiehd4i6w6bu34
Data Warehouse Testing and Security: A Conspectus
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
Literature for the testing techniques is integrated at one place and the outcome is to focus on security issues while performing data warehouse testing. ...
In this research paper, we are discussing the data warehouse architecture and the testing techniques that are used for best suited to be used for the data warehouses. ...
Apart from maintaining high quality of data in a data warehouse, the security of the data should also be focused to get a secure data at the target in the data warehouse. Figure 1 . 1 Figure 1. ...
doi:10.35940/ijitee.i1136.0789s19
fatcat:7vk7ckpdhveqhippnzq2fexbw4
Data Warehouse Signature: High Performance Evaluation for Implementing Security Issues in Data Warehouses through a New Framework
2017
International Journal of Security and Its Applications
Hence, the data stores contain a huge amount of business data used for decision-making and for financial analysis at sensitive organizations called Data Warehouses (DWs). ...
This paper presents a new framework for implementing security issues in DWs named Data Warehouse Signature (DWS), which is distributed in two models: DWSend model and DWReceive model. ...
Introduction A Data Warehouse (DW) is considered a core component of business intelligence environment just as decision-making and data mining. ...
doi:10.14257/ijsia.2017.11.6.05
fatcat:rfms7j26bngpzhugdkiig5velm
Secure Data Entry in Operational Systems for Data Warehouse
2012
IOSR Journal of Engineering
A 'data warehouse' is a repository of an organization's electronically stored data. Emergence of Huge Data Warehouses has also put a big challenge in these Data Entry Processing Systems. ...
home by typing it in by way of data entry which is pre designed to simplify the process In this paper we have proposed a security measure for a distributed for the manual data entry module pertaining ...
These levels have been designed to provide efficient security mechanism for a huge and complex manual data entry for Operational Systems pertaining to a Data warehouse. ...
doi:10.9790/3021-0204781786
fatcat:gdfezqoepbh47jikjrvkgsczea
Developing secure data warehouses with a UML extension
2007
Information Systems
Data Warehouses (DWs), Multidimensional (MD) Databases, and On-Line Analytical Processing Applications are used as a very powerful mechanism for discovering crucial business information. ...
MD modeling, thereby allowing us to design secure DWs. ...
Introduction Multidimensional (MD) modeling is the foundation of Data Warehouses (DWs), MD Databases, and On-Line Analytical Processing (OLAP) applications. ...
doi:10.1016/j.is.2006.07.003
fatcat:rqjtshxrf5ddxijqu3e67mcidu
Development of Secure XML Data Warehouses with QVT
2013
Information and Software Technology
Security is thus a key issue in the design of data warehouses, regardless of the implementation technology. ...
sources from the Web and the data warehouse. ...
Introduction Data Warehouse (DW) systems [1, 2] provide a Multidimensional (MD) [3] view of huge amounts of historical data from heterogeneous operational sources. ...
doi:10.1016/j.infsof.2013.03.003
fatcat:d3hdq22fk5ezdcwo5e2jqnja7m
Towards a Modernization Process for Secure Data Warehouses
[chapter]
2009
Lecture Notes in Computer Science
Data Warehouses (DW) manage crucial enterprise information used for the decision making process which has to be protected from unauthorized accesses. ...
Thus, we have proposed a model driven architecture (MDA) for secure DWs which takes into account security issues from the early stages of development and provides automatic transformations between models ...
2003; Hainaut, Englebert et al. 2004) , there is little research on reengineering of data warehouses following an MDA approach and security concerns are not considered. ...
doi:10.1007/978-3-642-03730-6_3
fatcat:kcy7klzdyzg7xbcc4envkfwnz4
Security Issues in Data Warehouse: A Systematic Review
2015
Procedia Computer Science
Review Questions
Review Methods
Results and Discussion
Summary and Conclusion References Security Based Article discussed on DW DevelopmentTechnology Encrypted data:
Audit control:
Extendibility ...
:
Platform Independence Model security:
Transformation:
Creation of PSM:
QVT support:
Integration of multi-platform data:
21%
3%
3%
11%
21%
19%
22%
© 2015 The Authors. ...
doi:10.1016/j.procs.2015.04.164
fatcat:7an27e5uufdbnf2xpd2k2hqt7a
An Integrated Conceptual Model for Temporal Data Warehouse Security
2011
Computer and Information Science
This paper proposes an integrated conceptual model for addressing temporal data warehouse security requirements (CMTDWS). ...
This paper proposes a conceptual model to refresh data warehouse by (insert, update, delete) data using ETL processes and considering DW security requirements. ...
We shall implement the extended CMTDWS to some commercial tools in order to elicit security requirement for DWs at the business level and we shall accomplish this with the MDA in order to cover the whole ...
doi:10.5539/cis.v4n4p46
fatcat:wnkvx34nzvbrdnk5iphkyvbrni
Building Secure Data Warehouse Schemas from Federated Information Systems
[chapter]
2002
Heterogeneous Information Exchange and Organizational Hubs
In the context of an integrated architecture for both Federated Information Systems and Data Warehousing, we discuss how additional schema levels provide security, and operations to convert from one level ...
There are similarities between architectures for Federated Information Systems and architectures for Data Warehousing. ...
We are currently working on the conforming operations, on security level integration, and on O-O data models supporting time in the way required by Data Warehouses and Data Marts. ...
doi:10.1007/978-94-017-1769-4_8
fatcat:5nhe5yiaefalfb4rgmsnvgd5g4
A Secured Agent-Based Framework for Data Warehouse Management
2013
IOSR Journal of Computer Engineering
Managing data warehouses (DWs) is typically characterized by intensive data processing and protracted activities which usually degrade performance. ...
These obviously expose the system to wider security issues. In order to enhance performance, we present a scheme that utilizes the mobility characteristic of agents. ...
Literatures have looked at data warehouse (DW) and security from different perspectives. ...
doi:10.9790/0661-1443643
fatcat:cwocvccrlfh7nn6qv7jjmvwy5i
« Previous
Showing results 1 — 15 out of 60,030 results