Towards comprehensive requirement analysis for data warehouses: considering security requirements
Empreu sempre aquest identificador per citar o enllaçar aquest ítem
http://hdl.handle.net/10045/21180
Títol: | Towards comprehensive requirement analysis for data warehouses: considering security requirements |
---|---|
Autors: | Soler, Emilio | Stefanov, Verónica | Mazón, Jose-Norberto | Trujillo, Juan | Fernández-Medina Patón, Eduardo | Piattini, Mario |
Grups d'investigació o GITE: | Lucentia |
Centre, Departament o Servei: | Universidad de Alicante. Departamento de Lenguajes y Sistemas Informáticos |
Paraules clau: | Data warehouses | Security | Requirements | MDA |
Àrees de coneixement: | Lenguajes y Sistemas Informáticos |
Data de publicació: | 2008 |
Editor: | IEEE |
Citació bibliogràfica: | SOLER, Emilio, et al. "Towards comprehensive requirement analysis for data warehouses: considering security requirements". En: Proceedings of the Third International Conference on Availability, Security, and Reliability : March 4-7, 2008, Barcelona, Spain. Los Alamitos, Calif. : IEEE Computer Society, 2008. ISBN 978-0-7695-3102-1, pp. 104-111 |
Resum: | Data warehouse (DW) systems integrate data from heterogeneous sources and are used by decision makers to analyze the status and the development of an organization. Traditionally, requirement analysis approaches for DWs have focused purely on information needs of decision makers, without considering other kinds of requirements such as security or performance. But modeling these issues in the early stages of the development is a cornerstone for building a DW that satisfies user expectations. In this paper, we define the two kinds of requirements for data warehousing as information and quality-of-service requirements and combine them in a comprehensive approach based on MDA (model driven architecture). This allows a separation of concerns to model requirements without losing the connection between information and quality-of-service, also in the following conceptual or logical design stages. Finally, in this paper, we introduce a security requirement model for data warehousing, and a three-step process for modeling security requirements, thus illustrating the applicability of our approach with an example. |
Patrocinadors: | This work has been supported by the METASIGN (TIN2004-00779) project from the Spanish Ministry of Science, and by the DADS (PBC-05-012-2) project from the Castilla-La Mancha Ministry of Science (Spain). Veronika Stefanov is funded by the Austrian Federal Ministry for Education, Science, and Culture, and the European Social Fund (ESF) under grant 31.963/46-VII/9/2002. Jose-Norberto Mazón is funded by the Spanish Ministry of Education and Science under a FPU grant (AP2005-1360). |
URI: | http://hdl.handle.net/10045/21180 |
ISBN: | 978-0-7695-3102-1 |
DOI: | 10.1109/ARES.2008.86 |
Idioma: | eng |
Tipus: | info:eu-repo/semantics/bookPart |
Drets: | © Copyright 2010 IEEE – All Rights Reserved |
Revisió científica: | si |
Versió de l'editor: | http://dx.doi.org/10.1109/ARES.2008.86 |
Apareix a la col·lecció: | INV - WaKe - Capítulos de Libros INV - LUCENTIA - Capítulos de Libros |
Arxius per aquest ítem:
Arxiu | Descripció | Tamany | Format | |
---|---|---|---|---|
ares08-soler-stefanov.pdf | Versión revisada (acceso abierto) | 249,48 kB | Adobe PDF | Obrir Vista prèvia |
ares08-soler-stefanov_final.pdf | Versión final (acceso restringido) | 403,45 kB | Adobe PDF | Obrir Sol·licitar una còpia |
Tots els documents dipositats a RUA estan protegits per drets d'autors. Alguns drets reservats.