Abstract
This paper describes the panel discussion on data warehousing, data mining and security.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
S. De Capitani di Vimercati and P. Samarati. Authorization Specification and Enforcement in Federated Database Systems. Journal of Computer Security, 1997.
Barry Devlin, Data Warehouse from Architecture to Implementation, Addison-Wesley, 1997.
W. H. Inmon, J. D. Welch, and Katherine L. Glassey. Managing the Data Warehouse, John Wiley & Sons, Inc., New York, 1997.
S. Jajodia “Database security and privacy,” ACM Computing Surveys, 50th anniversary commemorative issue, Vol. 28, No. 1, March 1996, pages 129–131.
S. Jajodia, P. Samarati, and V.S. Subramanian. A Logical Language for Expressing Authorizations. In Proceedings of the 1997 IEEE Symposium on Security and Privacy, May 1997.
Ralph Kimball, Hackers, Crackers, and Spooks, Ensuring that Your Data Warehouse is Secure, DBMS, April 1997, pp. 14–16.
T.Y. Lin, Rough Set Theory in Very Large Databases, Symposium on Modeling, Analysis and Simulation, IMACS Multi Conference (Computational Engineering in Systems Applications), Lille, France, July 9–12, 1996, Vol. 2 of 2, pp. 936–941.
T. Y. Lin and Rayne Chen, Supporting Rough Set Theory in Very Large Database Using ORACLE RDBMS, Soft Computing in Intelligent Systems and Information Processing, Proceedings of 1996, Asian Fuzzy Systems Symposium, Kenting, Taiwan, December 11–14, 1996, pp. 332–337 ( Coauthor: R. Chen ).
T. Y. Lin, T. Hinke, D. Marks, B. Thuraisingham, Security and Database Mining, Database Security IX Status and Prospects, Edited by D. L. Spooner, S. A. Demurjian and J. E. Dobson, 1996, pp. 391–399.
T. Y. Lin and Rayne Chen, Finding Reducts in Very Large Databases, Proceedings of Joint Conference of Information Science, Research Triangle Park, North Carolina, March 1–5, 1997, pp. 350–352. ( Co-author: R. Chen ).
T. Y. Lin, N. Cercone, Rough Sets and Data Mining: Analysis of Imprecise Data, Kluwer Academic Publishers, 1997.
Matthew Morgenstern, Teresa F. Lunt, Bhavani Thuraisingham, and David L. Spooner. Security Issues in Federated Database Systems: Panel Contributions. In C. E. Landwehr and S. Jajodia, editors, Database Security, V:Status and Prospects, pp. 131–148, 1992.
Z. Pawlak, Rough sets: Theoretical Aspects of Reasoning about Data, Kluwer Academic Publishers, 1991.
Arnon Rosenthal, Paul A. Dell, Pamela D. Campbell, Integrity and Security in Data Warehousing, AFCEA,1997.
Steven J. Ross, “Control Issues in Data Warehousing,” Infosecurity News, July/August 1996, pp. 22–24.
A. Skowron, C. Rauszer, The discernibility matrices and functions in information systems, Decision Support by Experience–Application of the Rough Sets Theory, R. Slowinski (ed.), Kluwer Academic Publishers, 1992, pp. 331–362.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1998 IFIP
About this chapter
Cite this chapter
Thuraisingham, B., Schlipper, L., Samarati, P., Lin, T.Y., Jajodia, S., Clifton, C. (1998). Security issues in data warehousing and data mining: panel discussion. In: Lin, T.Y., Qian, S. (eds) Database Security XI. IFIP Advances in Information and Communication Technology. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35285-5_1
Download citation
DOI: https://doi.org/10.1007/978-0-387-35285-5_1
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-5041-2914-5
Online ISBN: 978-0-387-35285-5
eBook Packages: Springer Book Archive