2001
DOI: 10.1007/3-540-45581-7_24
|View full text |Cite
|
Sign up to set email alerts
|

A Pragmatic Approach to Conceptual Modeling of OLAP Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0
2

Year Published

2003
2003
2018
2018

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 43 publications
(34 citation statements)
references
References 4 publications
0
32
0
2
Order By: Relevance
“…In this sense, we find the work of [2], which proposed the use of the permits schema de-fined for federated databases without any modification to build a secure Data Warehouse, and [3] that propose revising requests in order to verify that they comply with the limitations determined in the sources.  Some writers [19] [20] aimed to make the access assure model in the Data Warehouse, from data beginnings, while others [16] [26] have conceived this suggestion as difficult since the source data arise from unlike systems (with different policies). And functional systems use the relational model while the OLAP organizations use the multidimensional example.…”
Section: Synthesismentioning
confidence: 99%
See 1 more Smart Citation
“…In this sense, we find the work of [2], which proposed the use of the permits schema de-fined for federated databases without any modification to build a secure Data Warehouse, and [3] that propose revising requests in order to verify that they comply with the limitations determined in the sources.  Some writers [19] [20] aimed to make the access assure model in the Data Warehouse, from data beginnings, while others [16] [26] have conceived this suggestion as difficult since the source data arise from unlike systems (with different policies). And functional systems use the relational model while the OLAP organizations use the multidimensional example.…”
Section: Synthesismentioning
confidence: 99%
“… The circumspection of the Data Warehouse has traditionally been conceived in the authoritative carrying out of a Data Warehouse [16] [17], nevertheless the latest works [14] [18] believe its inclusion body in the growth levels which can develop more full-bodied lineament results, and the system can adapt these security demands in a more innate way.  In the explore work [5], the authors aimed an reflex MDA architecture established on the UML denotation to assure a Data Warehouse, but the doubtfulness that develops in this case is: What is the use of précising the protection level in the user visibility as well as for the elements of the Data Warehouse since the licenses are defined.…”
Section: Synthesismentioning
confidence: 99%
“…The authors in [10] proposed a set of security policies which are based on the UML (Unified Modeling Language). According to the authors, UML (Unified Modeling Language) is not appropriate for modeling security constraints in data warehouse [11]- [13].…”
Section: Existing Models and Their Limitationsmentioning
confidence: 99%
“…In [13,14] the authors focus on the dynamic [13] and static [14] modeling of the ETL processes. There are few research papers on DW security and OLAP (Online Analytical Processing) security [15,16,17,18]. But none of the above mentioned papers discuss an integrated security model for ETL processes.…”
Section: A Etl Modelingmentioning
confidence: 99%