Towards comprehensive requirement analysis for data warehouses: considering security requirements

Por favor, use este identificador para citar o enlazar este ítem: http://hdl.handle.net/10045/21180
Información del item - Informació de l'item - Item information
Título: Towards comprehensive requirement analysis for data warehouses: considering security requirements
Autor/es: Soler, Emilio | Stefanov, Verónica | Mazón, Jose-Norberto | Trujillo, Juan | Fernández-Medina Patón, Eduardo | Piattini, Mario
Grupo/s de investigación o GITE: Lucentia
Centro, Departamento o Servicio: Universidad de Alicante. Departamento de Lenguajes y Sistemas Informáticos
Palabras clave: Data warehouses | Security | Requirements | MDA
Área/s de conocimiento: Lenguajes y Sistemas Informáticos
Fecha de publicación: 2008
Editor: IEEE
Cita bibliográfica: SOLER, Emilio, et al. "Towards comprehensive requirement analysis for data warehouses: considering security requirements". En: Proceedings of the Third International Conference on Availability, Security, and Reliability : March 4-7, 2008, Barcelona, Spain. Los Alamitos, Calif. : IEEE Computer Society, 2008. ISBN 978-0-7695-3102-1, pp. 104-111
Resumen: Data warehouse (DW) systems integrate data from heterogeneous sources and are used by decision makers to analyze the status and the development of an organization. Traditionally, requirement analysis approaches for DWs have focused purely on information needs of decision makers, without considering other kinds of requirements such as security or performance. But modeling these issues in the early stages of the development is a cornerstone for building a DW that satisfies user expectations. In this paper, we define the two kinds of requirements for data warehousing as information and quality-of-service requirements and combine them in a comprehensive approach based on MDA (model driven architecture). This allows a separation of concerns to model requirements without losing the connection between information and quality-of-service, also in the following conceptual or logical design stages. Finally, in this paper, we introduce a security requirement model for data warehousing, and a three-step process for modeling security requirements, thus illustrating the applicability of our approach with an example.
Patrocinador/es: This work has been supported by the METASIGN (TIN2004-00779) project from the Spanish Ministry of Science, and by the DADS (PBC-05-012-2) project from the Castilla-La Mancha Ministry of Science (Spain). Veronika Stefanov is funded by the Austrian Federal Ministry for Education, Science, and Culture, and the European Social Fund (ESF) under grant 31.963/46-VII/9/2002. Jose-Norberto Mazón is funded by the Spanish Ministry of Education and Science under a FPU grant (AP2005-1360).
URI: http://hdl.handle.net/10045/21180
ISBN: 978-0-7695-3102-1
DOI: 10.1109/ARES.2008.86
Idioma: eng
Tipo: info:eu-repo/semantics/bookPart
Derechos: © Copyright 2010 IEEE – All Rights Reserved
Revisión científica: si
Versión del editor: http://dx.doi.org/10.1109/ARES.2008.86
Aparece en las colecciones:INV - WaKe - Capítulos de Libros
INV - LUCENTIA - Capítulos de Libros

Archivos en este ítem:
Archivos en este ítem:
Archivo Descripción TamañoFormato 
Thumbnailares08-soler-stefanov.pdfVersión revisada (acceso abierto)249,48 kBAdobe PDFAbrir Vista previa
Thumbnailares08-soler-stefanov_final.pdfVersión final (acceso restringido)403,45 kBAdobe PDFAbrir    Solicitar una copia


Todos los documentos en RUA están protegidos por derechos de autor. Algunos derechos reservados.