Verification of Security Coherence in Data Warehouse Designs

This paper relies on a UML profile with a graphical concrete syntax for the design of secure data warehouses. The UML extensions define security concepts to adopt the RBAC and MAC standards, to define conflicts of interests, and to model multidimensional schemas. In addition, this profile has formal semantics defined in Prolog that provides for the verification of both the design well-formedness and the coherence of security policies of data warehouse designs.

[1]  Mario Piattini,et al.  A UML 2.0/OCL Extension for Designing Secure Data Warehouses , 2005, J. Res. Pract. Inf. Technol..

[2]  Jan Jürjens,et al.  Towards the Secure Modelling of OLAP Users' Behaviour , 2010, Secure Data Management.

[3]  Ramaswamy Chandramouli,et al.  Role-Based Access Control (2nd ed.) , 2007 .

[4]  Alfredo Cuzzocrea,et al.  Privacy Preserving OLAP and OLAP Security , 2009, Encyclopedia of Data Warehousing and Mining.

[5]  Bharat Bhargava Security in Data Warehousing * (Invited Talk) , 2000 .

[6]  A Min Tjoa,et al.  A security concept for OLAP , 1997, Database and Expert Systems Applications. 8th International Conference, DEXA '97. Proceedings.

[7]  Günther Pernul,et al.  Towards OLAP security design — survey and research issues , 2000, DOLAP '00.

[8]  Andreas Bauer,et al.  Identifying Security Holes in OLAP Applications , 2000, DBSec.

[9]  Mario Piattini,et al.  Towards Comprehensive Requirement Analysis for Data Warehouses: Considering Security Requirements , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[10]  Hanêne Ben-Abdallah,et al.  Modeling Conflict of Interest in the Design of Secure Data Warehouses , 2010, KEOD.

[11]  Bharat K. Bhargava Security in Data Warehousing , 2000, DaWaK.