Skip to main content

Security in Data Warehousing

Invited Talk

  • Conference paper
  • First Online:
Data Warehousing and Knowledge Discovery (DaWaK 2000)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1874))

Included in the following conference series:

Abstract

Data warehouse [2, 4, 5, 6] is an integrated repository derived from multiple source (operational and legacy) databases. The data warehouse is created by either replicating the different source data or transforming them to new representation. This process involves reading, cleaning, aggregating and storing the data in the warehouse model. The software tools are used to access the warehouse for strategic analysis, decision-making, marketing types of applications. It can be used for inventory control of shelf stock in many departmental stores.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Arnon Rosenthal and Edward Sciore, View Security as the Basis for Data Warehouse Security, Proceedings of the International Workshop on Design and Management of Data Warehouse (DMDW’2000), Sweden, June, 2000.

    Google Scholar 

  2. Arun Sen and Varghese S.Jacob, Introduction-Guest Editorial, Communication of ACM, Vol. 41, No. 9, Sept. 1998.

    Google Scholar 

  3. Demillo, R. A., D.P. Dobkin, R. J. Lipton, Even Databases that Lie can be Compromised, IEEE Transaction on Software Engineering, SE 5:1, pp. 73–75, 1978.

    Article  MathSciNet  Google Scholar 

  4. Jim Scott, Warehousing Over the Web, Communication of ACM, Vol. 41, No. 9, Sept. 1998.

    Google Scholar 

  5. Stephen R.Gardner, Building the Data Warehouse, Communication of ACM, Vol. 41, No. 9, Sept. 1998.

    Google Scholar 

  6. Sunil Samtani, Mukesh Mohania, Vijay Kumar, Yahiko Kambayashi, Recent Advances and Research Problems in Data Warehousing, Advances in Database Technologies, ER Workshop, LNCS Vol. 1552. 1998.

    Google Scholar 

  7. Meeliyal Annamalai and Bharat Bhargava, Defining Data Equivalence for Efficient Image Retrieval in a Distributed Environment, In Proceedings of the Second World Conference on Integrated Design and Process Technology, Austin, Texas, Dec. 1996.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bhargava, B. (2000). Security in Data Warehousing. In: Kambayashi, Y., Mohania, M., Tjoa, A.M. (eds) Data Warehousing and Knowledge Discovery. DaWaK 2000. Lecture Notes in Computer Science, vol 1874. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44466-1_28

Download citation

  • DOI: https://doi.org/10.1007/3-540-44466-1_28

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-67980-6

  • Online ISBN: 978-3-540-44466-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics