Using UML packages for designing secure data warehouses

Rodolfo Villarroel, Emilio Soler, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

6 Scopus citations


Due to the sensitive data contained in Data Warehouses (DWs), it is essential to specify security measures from the early stages of the DWs design and enforce them. In this paper, we will present a UML profile to represent multidimensional and security aspects of our conceptual modeling. Our approach proposes the use of UML packages in order to group classes together into higher level units creating different levels of abstraction, and therefore, simplifying the final model. Furthermore, we present an extension of the relational model to consider security and audit measures represented in the conceptual modeling. To accomplish this, we based on the Relational Package of the Common Warehouse Metamodel (CWM) and extend it to properly represent all security and audit rules defined in the conceptual modeling of DWs. Finally, we will show an example to illustrate the applicability of our proposal.

Original languageEnglish
Title of host publicationComputational Science and Its Applications - ICCSA 2006
Subtitle of host publicationInternational Conference, Proceedings - Part III
PublisherSpringer Verlag
Number of pages11
ISBN (Print)3540340750, 9783540340751
StatePublished - 2006
Externally publishedYes
EventICCSA 2006: International Conference on Computational Science and Its Applications - Glasgow, United Kingdom
Duration: 8 May 200611 May 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3982 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


ConferenceICCSA 2006: International Conference on Computational Science and Its Applications
Country/TerritoryUnited Kingdom


Dive into the research topics of 'Using UML packages for designing secure data warehouses'. Together they form a unique fingerprint.

Cite this