Towards comprehensive requirement analysis for data warehouses: considering security requirements

Empreu sempre aquest identificador per citar o enllaçar aquest ítem http://hdl.handle.net/10045/21180
Información del item - Informació de l'item - Item information
Títol: Towards comprehensive requirement analysis for data warehouses: considering security requirements
Autors: Soler, Emilio | Stefanov, Verónica | Mazón, Jose-Norberto | Trujillo, Juan | Fernández-Medina Patón, Eduardo | Piattini, Mario
Grups d'investigació o GITE: Lucentia
Centre, Departament o Servei: Universidad de Alicante. Departamento de Lenguajes y Sistemas Informáticos
Paraules clau: Data warehouses | Security | Requirements | MDA
Àrees de coneixement: Lenguajes y Sistemas Informáticos
Data de publicació: 2008
Editor: IEEE
Citació bibliogràfica: SOLER, Emilio, et al. "Towards comprehensive requirement analysis for data warehouses: considering security requirements". En: Proceedings of the Third International Conference on Availability, Security, and Reliability : March 4-7, 2008, Barcelona, Spain. Los Alamitos, Calif. : IEEE Computer Society, 2008. ISBN 978-0-7695-3102-1, pp. 104-111
Resum: Data warehouse (DW) systems integrate data from heterogeneous sources and are used by decision makers to analyze the status and the development of an organization. Traditionally, requirement analysis approaches for DWs have focused purely on information needs of decision makers, without considering other kinds of requirements such as security or performance. But modeling these issues in the early stages of the development is a cornerstone for building a DW that satisfies user expectations. In this paper, we define the two kinds of requirements for data warehousing as information and quality-of-service requirements and combine them in a comprehensive approach based on MDA (model driven architecture). This allows a separation of concerns to model requirements without losing the connection between information and quality-of-service, also in the following conceptual or logical design stages. Finally, in this paper, we introduce a security requirement model for data warehousing, and a three-step process for modeling security requirements, thus illustrating the applicability of our approach with an example.
Patrocinadors: This work has been supported by the METASIGN (TIN2004-00779) project from the Spanish Ministry of Science, and by the DADS (PBC-05-012-2) project from the Castilla-La Mancha Ministry of Science (Spain). Veronika Stefanov is funded by the Austrian Federal Ministry for Education, Science, and Culture, and the European Social Fund (ESF) under grant 31.963/46-VII/9/2002. Jose-Norberto Mazón is funded by the Spanish Ministry of Education and Science under a FPU grant (AP2005-1360).
URI: http://hdl.handle.net/10045/21180
ISBN: 978-0-7695-3102-1
DOI: 10.1109/ARES.2008.86
Idioma: eng
Tipus: info:eu-repo/semantics/bookPart
Drets: © Copyright 2010 IEEE – All Rights Reserved
Revisió científica: si
Versió de l'editor: http://dx.doi.org/10.1109/ARES.2008.86
Apareix a la col·lecció: INV - WaKe - Capítulos de Libros
INV - LUCENTIA - Capítulos de Libros

Arxius per aquest ítem:
Arxius per aquest ítem:
Arxiu Descripció Tamany Format  
Thumbnailares08-soler-stefanov.pdfVersión revisada (acceso abierto)249,48 kBAdobe PDFObrir Vista prèvia
Thumbnailares08-soler-stefanov_final.pdfVersión final (acceso restringido)403,45 kBAdobe PDFObrir     Sol·licitar una còpia


Tots els documents dipositats a RUA estan protegits per drets d'autors. Alguns drets reservats.