Buscar

Estamos realizando la búsqueda. Por favor, espere...

 Detalle_Publicacion

An architecture for automatically developing secure OLAP applications from models

Abstract: Context Decision makers query enterprise information stored in Data Warehouses (DW) by using tools (such as On-Line Analytical Processing (OLAP) tools) which use specific views or cubes from the corporate DW or Data Marts, based on the multidimensional modeling. Since the information managed is critical, security constraints have to be correctly established in order to avoid unauthorized accesses. Objective In previous work we have defined a Model-Driven based approach for developing a secure DWs repository by following a relational approach. Nevertheless, is also important to define security constraints in the metadata layer that connects the DWs repository with the OLAP tools, that is, over the same multidimensional structures that final users manage. This paper defines a proposal to develop secure OLAP applications and incorporates it into our previous approach. Method Our proposal is composed of models and transformations. Our models have been defined using the extension capabilities from UML (conceptual model) and extending the OLAP package of CWM with security (logical model). Transformations have been defined by using a graphical notation and implemented into QVT and MOFScript. Finally, this proposal has been evaluated through case studies. Results A complete MDA architecture for developing secure OLAP applications. The main contributions of this paper are: improvement of a UML profile for conceptual modeling; definition of a logical metamodel for OLAP applications; and definition and implementation of transformations from conceptual to logical models, and from logical models to the secure implementation into a specific OLAP tool (SSAS). Conclusion Our proposal allows us to develop secure OLAP applications, providing a complete MDA architecture composed of several security models and automatic transformations towards the final secure implementation. Security aspects are early identified and fitted into a most robust solution that provides us a better information assurance and a saving of time in maintenance. © 2014 Elsevier B.V. All rights reserved.

Otras publicaciones de la misma revista o congreso con autores/as de la Universidad de Cantabria

 Autoría: Blanco C., García-Rodríguez De Guzmán I., Fernández-Medina E., Trujillo J.,

 Fuente: Information and Software Technology 59 (2015) 1–16

Editorial: Elsevier

 Fecha de publicación: 01/03/2015

Nº de páginas: 16

Tipo de publicación: Artículo de Revista

 DOI: 10.1016/j.infsof.2014.10.008

ISSN: 0950-5849,1873-6025

 Proyecto español: SIGMA-CC (TIN2012-36904)

Url de la publicación: http://www.sciencedirect.com/science/article/pii/S0950584914002195

Autoría

GARCÍA-RODRÍGUEZ DE GUZMÁN, IGNACIO

FENÁNDEZ-MEDINA, EDUARDO

TRUJILLO, JUAN