Abstract
This paper relies on a UML profile with a graphical concrete syntax for the design of secure data warehouses. The UML extensions define security concepts to adopt the RBAC and MAC standards, to define conflicts of interests, and to model multidimensional schemas. In addition, this profile has formal semantics defined in Prolog that provides for the verification of both the design well-formedness and the coherence of security policies of data warehouse designs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Kirkgöze, R., Katic, N., Stolba, M., Tjoa, A.M.: A Security Concept for OLAP. In: DEXA 1997. IEEE Computer Society, Washington, DC (1997)
Bhargava, B.K.: Security in Data Warehousing (Invited Talk). In: Kambayashi, Y., Mohania, M., Tjoa, A.M. (eds.) DaWaK 2000. LNCS, vol. 1874, pp. 287â288. Springer, Heidelberg (2000)
Pernul, G., Priebe, T.: Towards OLAP security design - survey and research issues. In: Proc. of DOLAP 2000, Washington, DC, pp. 114â121 (2000)
Steger, J., GĂŒnzel, H.: Identifying Security Holes in OLAP Applications. In: Proc. DBSec 2000, August 21-23 (2000)
Villarroel, R., FernĂĄndez-Medina, E., Piattini, M., Trujillo, J.: A UML 2.0/OCL extension for designing secure data warehouses. Journal of Research and Practice in Information Technology 38(1), 31â43 (2006)
Ferraiolo, D.F.D., Kuhn, D.R., Chandramouli, R.: Role-Based Access Control, 2nd edn. Artech Print on Demand (2007)
Soler, E., Stefanov, V., MazĂłn, J.-N., Trujillo, J., FernĂĄndez-Medina, E., Piattini, M.: Towards comprehensive requirement analysis for data warehouses: Considering security requirements. In: Proc. of ARES 2008, Barcelone, Espagne, pp. 104â111. IEEE Computer Society (2008)
Cuzzocrea, A.: Privacy Preserving OLAP and OLAP Security. Encyclopedia of Data Warehousing and Mining, 1575â1581 (2009)
Blanco, C., FernĂĄndez-Medina, E., Trujillo, J., Jurjens, J.: Towards the Secure Modelling of OLAP Usersâ Behaviour. In: Jonker, W., PetkoviÄ, M. (eds.) SDM 2010. LNCS, vol. 6358, pp. 101â112. Springer, Heidelberg (2010)
Triki, S., Ben-Abdallah, H., Feki, J., Harbi, N.: Modeling Conflict of Interest in the design of secure data warehouses. In: Proc. of KEOD 2010, Valencia, Espagne, pp. 445â448 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Salem, A., Triki, S., Ben-Abdallah, H., Harbi, N., Boussaid, O. (2012). Verification of Security Coherence in Data Warehouse Designs. In: Fischer-HĂŒbner, S., Katsikas, S., Quirchmayr, G. (eds) Trust, Privacy and Security in Digital Business. TrustBus 2012. Lecture Notes in Computer Science, vol 7449. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32287-7_18
Download citation
DOI: https://doi.org/10.1007/978-3-642-32287-7_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32286-0
Online ISBN: 978-3-642-32287-7
eBook Packages: Computer ScienceComputer Science (R0)