Skip to main content

Verification of Security Coherence in Data Warehouse Designs

  • Conference paper
Trust, Privacy and Security in Digital Business (TrustBus 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7449))

Abstract

This paper relies on a UML profile with a graphical concrete syntax for the design of secure data warehouses. The UML extensions define security concepts to adopt the RBAC and MAC standards, to define conflicts of interests, and to model multidimensional schemas. In addition, this profile has formal semantics defined in Prolog that provides for the verification of both the design well-formedness and the coherence of security policies of data warehouse designs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kirkgöze, R., Katic, N., Stolba, M., Tjoa, A.M.: A Security Concept for OLAP. In: DEXA 1997. IEEE Computer Society, Washington, DC (1997)

    Google Scholar 

  2. Bhargava, B.K.: Security in Data Warehousing (Invited Talk). In: Kambayashi, Y., Mohania, M., Tjoa, A.M. (eds.) DaWaK 2000. LNCS, vol. 1874, pp. 287–288. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  3. Pernul, G., Priebe, T.: Towards OLAP security design - survey and research issues. In: Proc. of DOLAP 2000, Washington, DC, pp. 114–121 (2000)

    Google Scholar 

  4. Steger, J., GĂŒnzel, H.: Identifying Security Holes in OLAP Applications. In: Proc. DBSec 2000, August 21-23 (2000)

    Google Scholar 

  5. Villarroel, R., Fernández-Medina, E., Piattini, M., Trujillo, J.: A UML 2.0/OCL extension for designing secure data warehouses. Journal of Research and Practice in Information Technology 38(1), 31–43 (2006)

    Google Scholar 

  6. Ferraiolo, D.F.D., Kuhn, D.R., Chandramouli, R.: Role-Based Access Control, 2nd edn. Artech Print on Demand (2007)

    Google Scholar 

  7. Soler, E., Stefanov, V., Mazón, J.-N., Trujillo, J., Fernández-Medina, E., Piattini, M.: Towards comprehensive requirement analysis for data warehouses: Considering security requirements. In: Proc. of ARES 2008, Barcelone, Espagne, pp. 104–111. IEEE Computer Society (2008)

    Google Scholar 

  8. Cuzzocrea, A.: Privacy Preserving OLAP and OLAP Security. Encyclopedia of Data Warehousing and Mining, 1575–1581 (2009)

    Google Scholar 

  9. Blanco, C., Fernández-Medina, E., Trujillo, J., Jurjens, J.: Towards the Secure Modelling of OLAP Users’ Behaviour. In: Jonker, W., Petković, M. (eds.) SDM 2010. LNCS, vol. 6358, pp. 101–112. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  10. Triki, S., Ben-Abdallah, H., Feki, J., Harbi, N.: Modeling Conflict of Interest in the design of secure data warehouses. In: Proc. of KEOD 2010, Valencia, Espagne, pp. 445–448 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Salem, A., Triki, S., Ben-Abdallah, H., Harbi, N., Boussaid, O. (2012). Verification of Security Coherence in Data Warehouse Designs. In: Fischer-HĂŒbner, S., Katsikas, S., Quirchmayr, G. (eds) Trust, Privacy and Security in Digital Business. TrustBus 2012. Lecture Notes in Computer Science, vol 7449. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32287-7_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-32287-7_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32286-0

  • Online ISBN: 978-3-642-32287-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics