TY - GEN
T1 - Towards a UML 2.0/OCL extension for designing secure data warehouses
AU - Villarroel, Rodolfo
AU - Fernández-Medina, Eduardo
AU - Trujillo, Juan
AU - Piattini, Mario
PY - 2005
Y1 - 2005
N2 - At present, it is very difficult to develop a methodology that fulfills all criteria and comprises all security constraints in terms of confidentiality, integrity and availability, to successfully design data warehouses. If that methodology was developed, its complexity would avoid its success. Therefore, the solution would be an approach in which techniques and models defined by the most accepted model standards (such as UML) were extended by integrating the necessary security aspects that, at present, are not covered by the existing methodologies. In this paper, we will focus on solving confidentiality problems in data warehouses conceptual modeling by defining a profile using the UML 2.0 extensibility mechanisms. In addition, we will define an OCL extension that allows us to specify the static and dynamic security constraints of the elements of data warehouses conceptual modeling, and we will show the benefit of our approach by applying this profile to an example.
AB - At present, it is very difficult to develop a methodology that fulfills all criteria and comprises all security constraints in terms of confidentiality, integrity and availability, to successfully design data warehouses. If that methodology was developed, its complexity would avoid its success. Therefore, the solution would be an approach in which techniques and models defined by the most accepted model standards (such as UML) were extended by integrating the necessary security aspects that, at present, are not covered by the existing methodologies. In this paper, we will focus on solving confidentiality problems in data warehouses conceptual modeling by defining a profile using the UML 2.0 extensibility mechanisms. In addition, we will define an OCL extension that allows us to specify the static and dynamic security constraints of the elements of data warehouses conceptual modeling, and we will show the benefit of our approach by applying this profile to an example.
UR - http://www.scopus.com/inward/record.url?scp=78651415493&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:78651415493
SN - 9728865252
SN - 9789728865252
T3 - Proceedings of the 3rd International Workshop on Security in Information Systems, WOSIS 2005, in Conjunction with ICEIS 2005
SP - 217
EP - 228
BT - Proceedings of the 3rd International Workshop on Security in Information Systems, WOSIS 2005, in Conjunction with ICEIS 2005
T2 - 3rd International Workshop on Security in Information Systems, WOSIS 2005, in Conjunction with ICEIS 2005
Y2 - 24 May 2005 through 25 May 2005
ER -