Skip to main content

Data Warehouse Security

  • Reference work entry
  • First Online:
  • 48 Accesses

Synonyms

Data warehouses confidentiality; Secure data warehouses

Definition

Security, as is stated in the ISO/IEC 9126 International Standard, is one of the components of software quality. Information Security can be defined as the preservation of confidentiality, integrity, and availability of information [1], in which confidentiality ensures that information is accessible only to those users with authorization privileges, integrity safeguards the accuracy and completeness of information and process methods, and availability ensures that authorized users have access to information and associated assets when required. Other modern definitions of Information Security also consider properties such as authenticity, accountability, nonrepudiation, and reliability. Therefore, Data Warehouse (DW) Security is defined as the mechanisms which ensure the confidentiality, integrity, and availability of the data warehouse and its components. Confidentiality is especially important once the Data...

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   4,499.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   6,499.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Recommended Reading

  1. ISO27001. ISO/IEC 27001 Information technology – security techniques – information security management systems – requirements. 2005.

    Google Scholar 

  2. Katic N, et al. A prototype model for DW security based on metadata. In: Proceedings of the 9th International Conference on Database and Expert Systems Applications; 1998.

    Google Scholar 

  3. Priebe T, Pernul G. A pragmatic approach to conceptual modeling of OLAP security. In: Proceedings of the 20th International Conference on Conceptual Modeling; 2001.

    Google Scholar 

  4. Saltor F, et al. Building secure data warehouse schemas from federated information systems. In: Bestougeff DT, editor. Heterogeneous information exchange and organizational hubs. Dordrecht: Kluwer; 2002.

    Google Scholar 

  5. Fernández-Medina E, Trujillo J, Piattini M. Model driven multidimensional modeling of secure data warehouses. Eur J Inf Syst. 2007;16(4):374–89.

    Article  Google Scholar 

  6. Mouratidis H, Giorgini P. An introduction. In: Integrating security and software engineering: advances and future visions. Idea Group Publishing; Hersey - New York; 2006.

    Google Scholar 

  7. Thuraisingham B, Kantarcioglu M, Iyer S. Extended RBAC-based design and implementation for a secure data warehouse. Int J Bus Intell Data Min. 2007;2(4):367–82.

    Article  Google Scholar 

  8. Rosenthal A, Sciore E. View security as the basis for data warehouse security. In: Proceedings of the 2nd International Workshop on Design and Management of Data Warehouses; 2000.

    Google Scholar 

  9. Simitsis A, Vassiliadis P. A method for the mapping of conceptual designs to logical blueprints for ETL processes. Decis Support Syst. 2008;45(1):22–40.

    Article  Google Scholar 

  10. Muñoz L, Mazón J-N, Trujillo J. Automatic generation of ETL processes from conceptual models. In: Proceedings of the ACM 12th International Workshop on Data Warehousing and OLAP; 2009. p. 33–40.

    Google Scholar 

  11. Fernandez-Medina E, et al. Access control and audit model for the multidimensional modeling of data warehouses. Decis Support Syst. 2006;42(3):1270–89.

    Article  Google Scholar 

  12. Fernandez-Medina E, et al. Developing secure data warehouses with a UML extension. Inf Syst. 2007;32(6):826–56.

    Article  Google Scholar 

  13. Soler E, et al. SECRDW: an extension of the relational package from CWM for representing secure data warehouses at the logical level. In: Proceedings of the 5th International Workshop on Security in Information Systems; 2007.

    Google Scholar 

  14. Blanco C, et al. Showing the benefits of applying a model driven architecture for developing secure OLAP applications. J Univ Comput Sci. 2014;20(2):79–106.

    Google Scholar 

  15. Kirkgöze R, et al. A security concept for OLAP. In: Proceedings of the 8th International Workshop on Database and Expert System Applications; 1997.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Carlos Blanco .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Science+Business Media, LLC, part of Springer Nature

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Blanco, C., Fernández-Medina, E., Trujillo, J. (2018). Data Warehouse Security. In: Liu, L., Özsu, M.T. (eds) Encyclopedia of Database Systems. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-8265-9_333

Download citation

Publish with us

Policies and ethics