Authors: Eduardo Fernaandez-Medina, Juan Trujillo, Mario Piattini, Rodolfo Villarroel
Tags: 2005, conceptual modeling
Due to the sensitive data contained in Data Warehouses (DW), it is essential to specify security measures from the early stages of the DW design and enforce them. Traditional access control models for transactional (relational) databases, based on tables, columns and rows, are not appropriate for DWs. Instead, security and audit rules defined for DWs must be specified based on the multidimensional (MD) modeling used to design data warehouses. Current approaches for the conceptual modeling of DWs do not allow us to specify security and confidentiality constraints in the conceptual modeling phase. In this paper, we propose an Access Control and Audit (ACA) model for DWs by specifying security rules in the conceptual MD modeling. Thus, we define authorization rules for users and objects and we assign sensitive information rules and authorization rules to the main elements of a MD model (e.g., facts or dimensions). Moreover, we also specify certain audit rules allowing us to analyze user behaviors. To be able to include and use our ACA model in the conceptual MD modeling, we extend the Unified Modeling Language (UML) with our ACA model, thereby allowing us to design secure MD models. Finally, to show the benefit of our approach, we apply our approach to a health care case study.
Read the full paper here: https://pdf.sciencedirectassets.com/271653/1-s2.0-S0167923606X01677/1-s2.0-S0167923605001570/main.pdf?X-Amz-Security-Token=IQoJb3JpZ2luX2VjENb%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEaCXVzLWVhc3QtMSJHMEUCICuVQ2KwY952TD2%2BhMycsw0Ie3wSNemtrcvMeZaw%2BwJBAiEA9Dm3ZRBkKtKiIwoFozmXYFymjO3A9yuAtFokmsJl5yQqvQMIvv%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FARADGgwwNTkwMDM1NDY4NjUiDOzdpr7R0oVim81e5CqRAy7kS78KbsvvEHjRZXF9HBfcWZxyuAYm4qD7BpkDaDuggShplu4fV6MseueUF%2By84UvGpBzUQ%2BVqsj6%2FF8fQvyJawvTChBhYPIOaYhyASigiSNdlc8CQb1Y0Ix6UrRcQG%2BL0ckKVfJ%2Fus2su3KW8mHK2gqws0Ys9zyBvJWk96QjPDcGUTHOrMsAIyPP82lhnAD%2BXXXce83sfFqYQoW%2BK5ht60hOzegHmdLz%2BPQ7cNu5gxOfA3Kf4x2sEcrf%2F0BM5vSZuU2LVutB%2BRZr4NJOBzAECnwc9vcFsGKvBRP1Q2Aw%2BvzTAJ4R1cJDOr15ixo8xHdyY%2FgMwdcXLIx%2FNMyG2AS6QJfFqCwLZ39Zj9UeqwK4T26THhCOlE9VGq6MKrHBucIlJv%2BveCIFLx376TpI8%2Fm8UTf5HArAhIg8s3k1zlvMxMFOwQSJeGincjjMlGoYWCNJB3A1oxlPqjnVYsgaZtWiMwR8IT%2Fc1MXOoXbcxQ9Johu22nfwZ8Of6C%2BswZePTnonAvmSVc60tGEq091arjKmYML%2BglPoFOusBEvriEimEWJzEEl1ok42w9JlGqzaeR%2B03udd0Q5LaB3RoEnB0C7wI6xxH4AATVgWBJkPD%2Fx9B%2Bx9qU8IsNV3UwxTB0QsBUBa9x%2FTAS7zN4z4vzAWgJBFAN%2BiWXTcK7F6a1qbeFxZ4QUg3DNA36eXxbwTa4AnQ8j%2Fsl7eYe6g2v6MELk8fVGa4%2BulM7uLiFqUuGRuftBJeBawYeSl87Uirq%2B5bGe1u9P4HwITzdI8EKuueeDa2wEuwSaFE3BzynIRPzEfWcngLFKz7QUF1%2BTFVRkpSNmPlkOq3oOV6WurA%2FppMpSSjJV470spHxQ%3D%3D&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20200825T143518Z&X-Amz-SignedHeaders=host&X-Amz-Expires=300&X-Amz-Credential=ASIAQ3PHCVTY46MQ5VHO%2F20200825%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=278f05ef93a1b5c6abd4e710dbca95c119d00dbe091b87493f8051ae67a2bdf4&hash=3d3f6393cea67f2a579ced382df746bb20a8cccfa5532c3870870c88a588f56f&host=68042c943591013ac2b2430a89b270f6af2c76d8dfd086a07176afe7c76c2c61&pii=S0167923605001570&tid=spdf-95af07cf-9049-4408-81c3-dc990e3752f3&sid=6675431d1f93d24bc00a2406701bcf4bbb2agxrqa&type=client