Encyclopedia of Database Systems

Living Edition
| Editors: Ling Liu, M. Tamer Özsu

Data Warehouse Security

  • Carlos Blanco
  • Eduardo Fernández-Medina
  • Juan Trujillo
Living reference work entry
DOI: https://doi.org/10.1007/978-1-4899-7993-3_333-3

Synonyms

Definition

Security, as is stated in the ISO/IEC 9126 International Standard, is one of the components of software quality. Information Security can be defined as the preservation of confidentiality, integrity, and availability of information [1], in which confidentiality ensures that information is accessible only to those users with authorization privileges, integrity safeguards the accuracy and completeness of information and process methods, and availability ensures that authorized users have access to information and associated assets when required. Other modern definitions of Information Security also consider properties such as authenticity, accountability, nonrepudiation, and reliability. Therefore, Data Warehouse (DW) Security is defined as the mechanisms which ensure the confidentiality, integrity, and availability of the data warehouse and its components. Confidentiality is especially important once the Data...

This is a preview of subscription content, log in to check access

Recommended Reading

  1. 1.
    ISO27001. ISO/IEC 27001 Information technology – security techniques – information security management systems – requirements. 2005.Google Scholar
  2. 2.
    Katic N, et al. A prototype model for DW security based on metadata. In: 9th International Workshop on DB and Expert Systems Applications, Vienna; 1998.Google Scholar
  3. 3.
    Priebe T, Pernul G. A pragmatic approach to conceptual modeling of OLAP security. In: 20th International Conference on Conceptual Modeling, Yokohama; 2001.Google Scholar
  4. 4.
    Saltor F, et al. Building secure data warehouse schemas from federated information systems. In: Bestougeff DT, editor. Heterogeneous information exchange and organizational hubs. Dordrecht: Kluwer; 2002.Google Scholar
  5. 5.
    Fernández-Medina E, Trujillo J, Piattini M. Model driven multidimensional modeling of secure data warehouses. Eur J Inf Syst. 2007;16:374–89.CrossRefGoogle Scholar
  6. 6.
    Mouratidis H, Giorgini P. An introduction. In: Integrating security and software engineering: advances and future visions. Idea Group Publishing; Hersey - New York, 2006.Google Scholar
  7. 7.
    Thuraisingham B, Kantarcioglu M, Iyer S. Extended RBAC-based design and implementation for a secure data warehouse. Int J Bus Intell Data Min (IJBIDM). 2007;2(4):367–82.CrossRefGoogle Scholar
  8. 8.
    Rosenthal A, Sciore E. View security as the basis for data warehouse security. In: International Workshop on Design and Management of Data Warehouses (DMDW 2000), Stockholm; 2000.Google Scholar
  9. 9.
    Simitsis A, Vassiliadis P. A method for the mapping of conceptual designs to logical blueprints for ETL processes. Decis Support Syst. 2008;45(1):22–40.CrossRefGoogle Scholar
  10. 10.
    Muñoz L, Mazón J-N, Trujillo J. Automatic generation of ETL processes from conceptual models. In: Proceedings of the ACM Twelfth International Workshop on Data Warehousing and OLAP. ACM: New York; 2009. p. 33–40.Google Scholar
  11. 11.
    Fernandez-Medina E, et al. Access control and audit model for the multidimensional modeling of data warehouses. Decis Support Syst. 2006;42(3):1270–89.CrossRefGoogle Scholar
  12. 12.
    Fernandez-Medina E, et al. Developing secure data warehouses with a UML extension. Inf Syst. 2007;32(6):826–56.CrossRefGoogle Scholar
  13. 13.
    Soler E, et al. SECRDW: an extension of the relational package from CWM for representing secure data warehouses at the logical level. In: International Workshop on Security in Information Systems, Funchal, Madeira; 2007.Google Scholar
  14. 14.
    Blanco C, et al. Showing the benefits of applying a model driven architecture for developing secure OLAP applications. J Univ Comput Sci. 2014;20(2):79–106.Google Scholar
  15. 15.
    Kirkgöze R, et al. A security concept for OLAP. In: 8th International Workshop on Database and Expert System Applications, Toulouse; 1997.Google Scholar

Copyright information

© Springer Science+Business Media LLC 2017

Authors and Affiliations

  • Carlos Blanco
    • 1
  • Eduardo Fernández-Medina
    • 2
  • Juan Trujillo
    • 3
  1. 1.GSyA and ISTR Research Groups, Department of Computer Science and Electronics, Faculty of SciencesUniversity of CantabriaSantanderSpain
  2. 2.GSyA Research Group, Department of Information Technologies and SystemsInstitute of Information Technologies and Systems, Escuela Superior de Informática, University of Castilla-La ManchaCiudad RealSpain
  3. 3.Lucentia Research Group, Department of Information Languages and Systems, Facultad de InformáticaUniversity of AlicanteAlicanteSpain

Section editors and affiliations

  • Torben Bach Pedersen
    • 1
  • Stefano Rizzi
    • 2
  1. 1.Department of Computer ScienceAalborg UniversityAalborgDenmark
  2. 2.DISI – University of BolognaBolognaItaly