Encyclopedia of Database Systems

2018 Edition
| Editors: Ling Liu, M. Tamer Özsu

Data Warehouse Security

  • Carlos BlancoEmail author
  • Eduardo Fernández-Medina
  • Juan Trujillo
Reference work entry
DOI: https://doi.org/10.1007/978-1-4614-8265-9_333


Data warehouses confidentiality; Secure data warehouses


Security, as is stated in the ISO/IEC 9126 International Standard, is one of the components of software quality. Information Security can be defined as the preservation of confidentiality, integrity, and availability of information [1], in which confidentiality ensures that information is accessible only to those users with authorization privileges, integrity safeguards the accuracy and completeness of information and process methods, and availability ensures that authorized users have access to information and associated assets when required. Other modern definitions of Information Security also consider properties such as authenticity, accountability, nonrepudiation, and reliability. Therefore, Data Warehouse (DW) Security is defined as the mechanisms which ensure the confidentiality, integrity, and availability of the data warehouse and its components. Confidentiality is especially important once the Data...

This is a preview of subscription content, log in to check access.

Recommended Reading

  1. 1.
    ISO27001. ISO/IEC 27001 Information technology – security techniques – information security management systems – requirements. 2005.Google Scholar
  2. 2.
    Katic N, et al. A prototype model for DW security based on metadata. In: Proceedings of the 9th International Conference on Database and Expert Systems Applications; 1998.Google Scholar
  3. 3.
    Priebe T, Pernul G. A pragmatic approach to conceptual modeling of OLAP security. In: Proceedings of the 20th International Conference on Conceptual Modeling; 2001.Google Scholar
  4. 4.
    Saltor F, et al. Building secure data warehouse schemas from federated information systems. In: Bestougeff DT, editor. Heterogeneous information exchange and organizational hubs. Dordrecht: Kluwer; 2002.Google Scholar
  5. 5.
    Fernández-Medina E, Trujillo J, Piattini M. Model driven multidimensional modeling of secure data warehouses. Eur J Inf Syst. 2007;16(4):374–89.CrossRefGoogle Scholar
  6. 6.
    Mouratidis H, Giorgini P. An introduction. In: Integrating security and software engineering: advances and future visions. Idea Group Publishing; Hersey - New York; 2006.Google Scholar
  7. 7.
    Thuraisingham B, Kantarcioglu M, Iyer S. Extended RBAC-based design and implementation for a secure data warehouse. Int J Bus Intell Data Min. 2007;2(4):367–82.CrossRefGoogle Scholar
  8. 8.
    Rosenthal A, Sciore E. View security as the basis for data warehouse security. In: Proceedings of the 2nd International Workshop on Design and Management of Data Warehouses; 2000.Google Scholar
  9. 9.
    Simitsis A, Vassiliadis P. A method for the mapping of conceptual designs to logical blueprints for ETL processes. Decis Support Syst. 2008;45(1):22–40.CrossRefGoogle Scholar
  10. 10.
    Muñoz L, Mazón J-N, Trujillo J. Automatic generation of ETL processes from conceptual models. In: Proceedings of the ACM 12th International Workshop on Data Warehousing and OLAP; 2009. p. 33–40.Google Scholar
  11. 11.
    Fernandez-Medina E, et al. Access control and audit model for the multidimensional modeling of data warehouses. Decis Support Syst. 2006;42(3):1270–89.CrossRefGoogle Scholar
  12. 12.
    Fernandez-Medina E, et al. Developing secure data warehouses with a UML extension. Inf Syst. 2007;32(6):826–56.CrossRefGoogle Scholar
  13. 13.
    Soler E, et al. SECRDW: an extension of the relational package from CWM for representing secure data warehouses at the logical level. In: Proceedings of the 5th International Workshop on Security in Information Systems; 2007.Google Scholar
  14. 14.
    Blanco C, et al. Showing the benefits of applying a model driven architecture for developing secure OLAP applications. J Univ Comput Sci. 2014;20(2):79–106.Google Scholar
  15. 15.
    Kirkgöze R, et al. A security concept for OLAP. In: Proceedings of the 8th International Workshop on Database and Expert System Applications; 1997.Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  • Carlos Blanco
    • 1
    Email author
  • Eduardo Fernández-Medina
    • 2
  • Juan Trujillo
    • 3
  1. 1.GSyA and ISTR Research Groups, Department of Computer Science and Electronics, Faculty of SciencesUniversity of CantabriaSantanderSpain
  2. 2.GSyA Research Group, Department of Information Technologies and SystemsInstitute of Information Technologies and Systems, Escuela Superior de Informática, University of Castilla-La ManchaCiudad RealSpain
  3. 3.Lucentia Research Group, Department of Information Languages and Systems, Facultad de InformáticaUniversity of AlicanteAlicanteSpain

Section editors and affiliations

  • Torben Bach Pedersen
    • 1
  • Stefano Rizzi
    • 2
  1. 1.Department of Computer ScienceAalborg UniversityAalborgDenmark
  2. 2.DISI – University of BolognaBolognaItaly