International Research journal of Management Science and Technology

  ISSN 2250 - 1959 (online) ISSN 2348 - 9367 (Print) New DOI : 10.32804/IRJMST

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 121    Submit Your Rating     Cite This   Download        Certificate

SECURITY CONCERNS IN DATA WAREHOUSING TECHNIQUES

    1 Author(s):  MANISHA

Vol -  10, Issue- 2 ,         Page(s) : 40 - 45  (2019 ) DOI : https://doi.org/10.32804/IRJMST

Abstract

The goal of an information distribution center is to make a lot of information effectively open to the clients, consequently enabling the clients to extricate data about the business in general. Be that as it may, we realize that there could be some security confinements connected on the information that can be a deterrent for getting to the data. In the event that the investigator has a confined perspective on information, at that point it is difficult to catch a total image of the patterns inside the business. The information from every expert can be outlined and passed on to the board where the diverse synopses can be totaled. As the accumulations of rundowns can't be equivalent to that of the collection in general, it is conceivable to miss some data inclines in the information except if somebody is dissecting the information overall.

1. Book: Paulraj Ponniah, Data Warehousing fundamentals, Wiley, 2005.
2. Journal paper : Arnon Rosenthal and Edward Sciore, View Security as the Basis for Data Warehouse Security, Proceedings of the International Workshop on Design and Management of Data Warehouse (DMDW’2000), Sweden, June, 2000.
3. Internet resource: Hari Mailvaganam, Design Methodologies of Kimball and Inmon plus a Third Way, http://www.dwreview.com/Articles/KimballInmon.html, 21 July 2009.
4. Systems Security Engineering Capability Maturity Model SSE-CMM - Model Description Document v3.0. Carnegie Mellon University, 2003. http://www.ssecmm.org/model/model.asp.
5. F. Emekci, O. Sahin, D. Agrawal, and A. E. Abbadi.Privacy preserving decision tree learning over multiple parties. Data & Knowledge Engineering, 63:348–361,2007.
6. E. Fernandez-Medina, J. Trujillo, R. Villarroel, and M. Piattini. Access control and audit model for the multidimensional modeling of data warehouses. Decision Support Systems, 42:1270–1289, 2006.
7. E. Fernandez-Medina, J. Trujillo, R. Villarroel, and M. Piattini. Developing secure data warehouses with a uml extension. Information systems, 32:826–859, 2007.
8. Y. Liu, S. Y. Sung, and H. Xiong. A cubic-wise balance approach for privacy preservation in data cubes. Information Sciences, 176:1215–1240, 2006.
9. Oracle Security and the data warehouse.Oracle While Paper, 2005. http://www.oracle.com/technology/ products/bi/db/10g/pdf/twp_bi_dw_security_10gr1_0405.pd f.
10. A. Rosenthal and E. Sciore. View security as the bases for data warehouse security. In Proceedings of the International Workshop on Design and Management of Data Warehouses (DMSW 2000), pages 8:1–8:8, 2000.

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details