Skip to main content

Data Warehouse Security

  • Living reference work entry
  • First Online:
Encyclopedia of Database Systems

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Recommended Reading

  1. ISO27001. ISO/IEC 27001 Information technology – security techniques – information security management systems – requirements. 2005.

    Google Scholar 

  2. Katic N, et al. A prototype model for DW security based on metadata. In: 9th International Workshop on DB and Expert Systems Applications, Vienna; 1998.

    Google Scholar 

  3. Priebe T, Pernul G. A pragmatic approach to conceptual modeling of OLAP security. In: 20th International Conference on Conceptual Modeling, Yokohama; 2001.

    Google Scholar 

  4. Saltor F, et al. Building secure data warehouse schemas from federated information systems. In: Bestougeff DT, editor. Heterogeneous information exchange and organizational hubs. Dordrecht: Kluwer; 2002.

    Google Scholar 

  5. Fernández-Medina E, Trujillo J, Piattini M. Model driven multidimensional modeling of secure data warehouses. Eur J Inf Syst. 2007;16:374–89.

    Article  Google Scholar 

  6. Mouratidis H, Giorgini P. An introduction. In: Integrating security and software engineering: advances and future visions. Idea Group Publishing; Hersey - New York, 2006.

    Google Scholar 

  7. Thuraisingham B, Kantarcioglu M, Iyer S. Extended RBAC-based design and implementation for a secure data warehouse. Int J Bus Intell Data Min (IJBIDM). 2007;2(4):367–82.

    Article  Google Scholar 

  8. Rosenthal A, Sciore E. View security as the basis for data warehouse security. In: International Workshop on Design and Management of Data Warehouses (DMDW 2000), Stockholm; 2000.

    Google Scholar 

  9. Simitsis A, Vassiliadis P. A method for the mapping of conceptual designs to logical blueprints for ETL processes. Decis Support Syst. 2008;45(1):22–40.

    Article  Google Scholar 

  10. Muñoz L, Mazón J-N, Trujillo J. Automatic generation of ETL processes from conceptual models. In: Proceedings of the ACM Twelfth International Workshop on Data Warehousing and OLAP. ACM: New York; 2009. p. 33–40.

    Google Scholar 

  11. Fernandez-Medina E, et al. Access control and audit model for the multidimensional modeling of data warehouses. Decis Support Syst. 2006;42(3):1270–89.

    Article  Google Scholar 

  12. Fernandez-Medina E, et al. Developing secure data warehouses with a UML extension. Inf Syst. 2007;32(6):826–56.

    Article  Google Scholar 

  13. Soler E, et al. SECRDW: an extension of the relational package from CWM for representing secure data warehouses at the logical level. In: International Workshop on Security in Information Systems, Funchal, Madeira; 2007.

    Google Scholar 

  14. Blanco C, et al. Showing the benefits of applying a model driven architecture for developing secure OLAP applications. J Univ Comput Sci. 2014;20(2):79–106.

    Google Scholar 

  15. Kirkgöze R, et al. A security concept for OLAP. In: 8th International Workshop on Database and Expert System Applications, Toulouse; 1997.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Carlos Blanco .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Science+Business Media LLC

About this entry

Cite this entry

Blanco, C., Fernández-Medina, E., Trujillo, J. (2017). Data Warehouse Security. In: Liu, L., Özsu, M. (eds) Encyclopedia of Database Systems. Springer, New York, NY. https://doi.org/10.1007/978-1-4899-7993-3_333-3

Download citation

  • DOI: https://doi.org/10.1007/978-1-4899-7993-3_333-3

  • Received:

  • Accepted:

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4899-7993-3

  • Online ISBN: 978-1-4899-7993-3

  • eBook Packages: Springer Reference Computer SciencesReference Module Computer Science and Engineering

Publish with us

Policies and ethics