A set of QVT relations to transform PIM to PSM in the Design of Secure Data Warehouses

Author(s):  
Emilio Soler ◽  
Juan Trujillo ◽  
Eduardo Fernandez-Medina ◽  
Mario Piattini
Author(s):  
Rodolfo Villarroel ◽  
Eduardo Fernández-Medina ◽  
Juan Trujillo ◽  
Mario Piattini

This chapter presents an approach for designing secure Data Warehouses (DWs) that accomplish the conceptual modeling of secure DWs independently from the target platform where the DW has to be implemented, because our complete approach follows the Model Driven Architecture (MDA) and the Model Driven Security (MDS). In most of real world DW projects, the security aspects are issues that usually rely on the DBMS administrators. We argue that the design of these security aspects should be considered together with the conceptual modeling of DWs from the early stages of a DW project, and being able to attach user security information to the basic structures of a Multidimensional (MD) model. In this way, we would be able to generate this information in a semi or automatic way into a target platform and the final DW will better suits the user security requirements.


Author(s):  
Villarroel Rodolfo ◽  
Fernández-Medina Eduardo ◽  
Trujillo Juan ◽  
Piattini Mario

This chapter presents an approach for designing secure Data Warehouses (DWs) that accomplish the conceptual modeling of secure DWs independently from the target platform where the DW has to be implemented, because our complete approach follows the Model Driven Architecture (MDA) and the Model Driven Security (MDS). In most of real world DW projects, the security aspects are issues that usually rely on the DBMS administrators. We argue that the design of these security aspects should be considered together with the conceptual modeling of DWs from the early stages of a DW project, and being able to attach user security information to the basic structures of a Multidimensional (MD) model. In this way, we would be able to generate this information in a semi or automatic way into a target platform and the final DW will better suits the user security requirements.


Author(s):  
Rodolfo Villarroel ◽  
Emilio Soler ◽  
Eduardo Fernández-Medina ◽  
Juan Trujillo ◽  
Mario Piattini
Keyword(s):  

2007 ◽  
Vol 32 (6) ◽  
pp. 826-856 ◽  
Author(s):  
Eduardo Fernández-Medina ◽  
Juan Trujillo ◽  
Rodolfo Villarroel ◽  
Mario Piattini

2007 ◽  
Vol 16 (4) ◽  
pp. 374-389 ◽  
Author(s):  
Eduardo Fernández-Medina ◽  
Juan Trujillo ◽  
Mario Piattini

2021 ◽  
Vol 27 (5) ◽  
pp. 259-266
Author(s):  
L. V. Arshinskiy ◽  
◽  
G. N. Shurkhovetsky ◽  

The article considers the application of the dissection-placing method for secure storage of information in external, primarily cloud-based data warehouses. Various approaches to the implementation of the method, including patent material, are analyzed. It is shown that the method is most effective for bitwise dissection of files and random placement of bits in data streams sent to separate warehouses.


2009 ◽  
Vol 51 (6) ◽  
pp. 1033-1051 ◽  
Author(s):  
Juan Trujillo ◽  
Emilio Soler ◽  
Eduardo Fernández-Medina ◽  
Mario Piattini

Sign in / Sign up

Export Citation Format

Share Document