2015 IEEE/ACIS 14th International Conference on Computer and Information Science (ICIS) 2015
DOI: 10.1109/icis.2015.7166672
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive security for Cloud data warehouse as a service

Abstract: The growing interest in cloud-based data warehousing is driven by the high return on investment. Nonetheless, the adoption of cloud computing for data warehousing faces security challenges given the proprietary nature of the enclosed data. This paper first, presents an adaptive security solution for sensitive data in cloud-based data warehouses. Second, it illustrates how the security solution can be implemented as a service through a model-driven approach.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 13 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…Like existing works, BPMN is our choice to model the ETL process for two main reasons: the expressive power of BPMN covers the ETL concepts, and the existence of many tools support the conceptual model of BPMN, which can be mapped into many execution languages. However, because of the Cloud context, it is important to Meta-model of secure BPMN for specifying secure ETL processes extend BPMN with concepts to model several DW security requirements [15].…”
Section: E a Service-oriented Architecture For Businessmentioning
confidence: 99%
See 1 more Smart Citation
“…Like existing works, BPMN is our choice to model the ETL process for two main reasons: the expressive power of BPMN covers the ETL concepts, and the existence of many tools support the conceptual model of BPMN, which can be mapped into many execution languages. However, because of the Cloud context, it is important to Meta-model of secure BPMN for specifying secure ETL processes extend BPMN with concepts to model several DW security requirements [15].…”
Section: E a Service-oriented Architecture For Businessmentioning
confidence: 99%
“…Our previous work in [15] shows how the above security requirements can be mapped to the ETL process:…”
Section: E a Service-oriented Architecture For Businessmentioning
confidence: 99%