Towards comprehensive requirement analysis for data warehouses: considering security requirements
Por favor, use este identificador para citar o enlazar este ítem:
http://hdl.handle.net/10045/21180
Título: | Towards comprehensive requirement analysis for data warehouses: considering security requirements |
---|---|
Autor/es: | Soler, Emilio | Stefanov, Verónica | Mazón, Jose-Norberto | Trujillo, Juan | Fernández-Medina Patón, Eduardo | Piattini, Mario |
Grupo/s de investigación o GITE: | Lucentia |
Centro, Departamento o Servicio: | Universidad de Alicante. Departamento de Lenguajes y Sistemas Informáticos |
Palabras clave: | Data warehouses | Security | Requirements | MDA |
Área/s de conocimiento: | Lenguajes y Sistemas Informáticos |
Fecha de publicación: | 2008 |
Editor: | IEEE |
Cita bibliográfica: | SOLER, Emilio, et al. "Towards comprehensive requirement analysis for data warehouses: considering security requirements". En: Proceedings of the Third International Conference on Availability, Security, and Reliability : March 4-7, 2008, Barcelona, Spain. Los Alamitos, Calif. : IEEE Computer Society, 2008. ISBN 978-0-7695-3102-1, pp. 104-111 |
Resumen: | Data warehouse (DW) systems integrate data from heterogeneous sources and are used by decision makers to analyze the status and the development of an organization. Traditionally, requirement analysis approaches for DWs have focused purely on information needs of decision makers, without considering other kinds of requirements such as security or performance. But modeling these issues in the early stages of the development is a cornerstone for building a DW that satisfies user expectations. In this paper, we define the two kinds of requirements for data warehousing as information and quality-of-service requirements and combine them in a comprehensive approach based on MDA (model driven architecture). This allows a separation of concerns to model requirements without losing the connection between information and quality-of-service, also in the following conceptual or logical design stages. Finally, in this paper, we introduce a security requirement model for data warehousing, and a three-step process for modeling security requirements, thus illustrating the applicability of our approach with an example. |
Patrocinador/es: | This work has been supported by the METASIGN (TIN2004-00779) project from the Spanish Ministry of Science, and by the DADS (PBC-05-012-2) project from the Castilla-La Mancha Ministry of Science (Spain). Veronika Stefanov is funded by the Austrian Federal Ministry for Education, Science, and Culture, and the European Social Fund (ESF) under grant 31.963/46-VII/9/2002. Jose-Norberto Mazón is funded by the Spanish Ministry of Education and Science under a FPU grant (AP2005-1360). |
URI: | http://hdl.handle.net/10045/21180 |
ISBN: | 978-0-7695-3102-1 |
DOI: | 10.1109/ARES.2008.86 |
Idioma: | eng |
Tipo: | info:eu-repo/semantics/bookPart |
Derechos: | © Copyright 2010 IEEE – All Rights Reserved |
Revisión científica: | si |
Versión del editor: | http://dx.doi.org/10.1109/ARES.2008.86 |
Aparece en las colecciones: | INV - WaKe - Capítulos de Libros INV - LUCENTIA - Capítulos de Libros |
Archivos en este ítem:
Archivo | Descripción | Tamaño | Formato | |
---|---|---|---|---|
ares08-soler-stefanov.pdf | Versión revisada (acceso abierto) | 249,48 kB | Adobe PDF | Abrir Vista previa |
ares08-soler-stefanov_final.pdf | Versión final (acceso restringido) | 403,45 kB | Adobe PDF | Abrir Solicitar una copia |
Todos los documentos en RUA están protegidos por derechos de autor. Algunos derechos reservados.