Securing Data Warehouses: A Semi-automatic Approach for Inference Prevention at the Design Level
|
|
- Olivia Kelley Smith
- 8 years ago
- Views:
Transcription
1 Securing Data Warehouses: A Semi-automatic Approach for Inference Prevention at the Design Level Salah Triki 1, Hanene Ben-Abdallah 1, Nouria Harbi 2, and Omar Boussaid 2 1 Laboratoire Mir@cl, Département d Informatique, Faculté des Sciences Economiques et de Gestion de Sfax, Tunisie, Route de l Aéroport Km Sfax, BP {Salah.Triki,Hanene.BenAbdallah}@Fsegs.rnu.tn 2 Laboratoire ERIC, Université Lyon 2, 5 avenue P. Mendès France Bron, Cedex, France {Nouria.Harbi,Omar.Boussaid}@univ-lyon2.fr Abstract. Data warehouses contain sensitive data that must be secured in two ways: by defining appropriate access rights to the users and by preventing potential data inferences. Inspired from development methods for information systems, the first way of securing a data warehouse has been treated in the literature during the early phases of the development cycle. However, despite the high risks of inferences, the second way is not sufficiently taken into account in the design phase; it is rather left to the administrator of the data warehouse. However, managing inferences during the exploitation phase may induce high maintenance costs and complex OLAP server administration. In this paper, we propose an approach that, starting from the conceptual model of the data sources, assists the designer of the data warehouse in indentifying multidimensional sensitive data and those that may be subject to inferences. Keywords: Data warehouse, Security, Precise Inference, Partial inference. 1 Introduction Organizations have a significant amount of data that can be analyzed to identify trends, examine the effectiveness of their activities, and take decisions to increase their profits. By gathering and consolidating data issued from the organization s information system, a data warehouse (DW) allows decision makers to perform decision analyses and financial forecasts. In fact, several tools dedicated to data warehousing offer various operations for OnLine Analytical Processing (OLAP), assisting users in the decision analysis process. On the other hand, data in an organization s DW are proprietary and sensitive and should not be accessed without controles. Indeed, some data, like medical data, religious or ideological beliefs, are personal and may harm their owners if disclosed. For this, several governments passed laws for the protection of the citizens s private L. Bellatreche and F. Mota Pinto (Eds.): MEDI 2011, LNCS 6918, pp , Springer-Verlag Berlin Heidelberg 2011
2 72 S. Triki et al. lives. Among these laws, HIPAA 1 (Health Insurance Portability and Accountability Act) aims to protect patient medical data by forcing American health care establishments to follow strict safety rules. Similarly, GLBA 2 (Gramm-Leach-Bliley Act) requires U.S. financial institutions to protect customer data; on the other hand, Safe Harbor 3 allows companies conforming to transfer and use data on European Internet ; and Sarbanes-Oxley 4 Act guarantees the reliability of corporate financial data. Agencies must use strict safety rules to comply with these laws, otherwise they are punished. Securing a DW is a twofold task. The first fix the access rights of the DW users. Similar to information systems, this security task can be treated at a conceptual or logical level; the fixed access rights are enforced by the OLAP server. As for the second security task, it seeks to ban malicious users from infering prohibited information through permitted acceses. In fact, there are two types of inferences: precise inferences where the exact data values are deducted, and partial inferences where data values are partially disclosed. Inference prevention at design level reduces administration costs and maintenance of OLAP servers. Despite this, inference prevention at design level has not received enough interest from researchers. The aim of this paper is to propose an approach to model the prevention of inferences using the data source design represented as a class diagram. Our approach has two advantages over existing approaches. The first advantage is its genericity since it is applicable to any business domain. The second advantage is that it takes into account the data available to the malicious user to detect inferences; the majority of inference cases are produced by combining available data. The remainder of the paper is organized as follows: in section 2, we present a state of the art in the DW security domain at the requirement and design levels. In Section 3, we detail our approach. Section 4 presents an example illustrating the use of our approach. Finally, we summarize the work done and outline our work in progress. 2 Related Work The need for securing DW was felt long ago [1] [2]. Several proposed approaches tackled the DW security problem at the requirement, design or logical levels. At the requirement level, [3] propose a profile based on i and an approach that can model the security requirements. The proposed profile takes into account the RBAC ("Role Based Access Control") model and MAC (" Mondatory Access Control ") model. Thus, for each data to be protected, a security class must be defined in terms of: security role, security level and compartment. Using this profile, the proposed approach to model security requirements operates on three stages : i) analyzing the rules and privacy policies that exist in the organization; ii) interviewing the securityin-charge personnel to define the data to be secured; and iii) affecting security classes for each data. This approach is informally presented content-detail.html
3 Securing Data Warehouses 73 At design level, several studies have been carried out. [4] propose a UML profile for modeling security and extensions of OCL (Object Constraint Language) to specify security constraints. The UML profile, called SECDW (Secure Data Warehouse), includes new types, stereotypes and tagged values to model the RBAC and MAC models. [5] extended SECDW to represent the concept of conflict among multidimensional elements. However, neither work proposed an approach to design a secure DW model. On the other hand, [6] proposed an approach using the UML state-transition diagram to detect inferences in a DW design. In the state-transition diagram, the states represent the data to display and transitions represent users multidimensional queries. The approach takes into account the possibility of inferences from empty cells in a cube (i.e., unavailable data for measures), without addressing the possibility of inferences from available data. For their part, [7] proposed an approach specific to the field of market research in general and the particular case of the company GFK [9]. This approach addressed the case of partial and precise inferences. Precise inferences occur when the exact measure values is deduced, while partial inferences occur when an idea about the measure values is deduced. In this work, inferences were detected manually by studying the application domain of market research. At logical level, [5] treated the case of implementation in the multi-dimensional relational model based on the extension of the CWM ( Common Warehouse Metamodel ). This extension allows the definition of security constraints and audit rules for each element of the relational model. Security constraints allow the implementation of RBAC and MAC and audit rules can log access attempts to analyze problematic cases. After our review of the state of the art of DW security, we noticed the following four points: - Modeling access rights has been treated at the requirement, design and logical levels. Existing work ([3] [4] [5] [9]) were able to offer notations for modeling the MAC and RBAC models. However, the proposed approaches were informally described. - Prevention of inferences has been widely treated at the physical level ( [10] [11] [12] [13] [14]). This level can enduce high administrative costs and high maintenance. - Prevention of inferences at the design level has not been sufficiently addressed. The existing works ([6] [7]) do not take into account the potential inferences from the data available and are specific to a particular application domain. - Existing proposals lack assistance in identifying data from the DW that are potentially subject to inferences. In this paper, we treat the last two points by proposing at the design level: i) a UMLbased language for modeling data potentially subject to inferences, and ii) a semiautomatic approach to identify such data. 3 Proposed Approach The approach we propose is based on the data sources class diagram. In addition, it assumes that the DW schema is already designed and mapped to the data sources.
4 74 S. Triki et al. In fact, our approach fits in and complements the three types of DW design approaches: bottom-up ([15] ), top-down ([16]), and mixed ([17]). In all three types of design approaches, once the DW schema is developed, it must be matched with the data sources to indicate the source of the elements that will be used to load each element of the DW; this mapping is vital for the definition of the ETL procedures. In the case of bottom-up and mixed approaches, this mapping is produced by default since the DW schema definition is developed from the data sources. As for the topdown approaches, this mapping is needed to validate the specified DW schema. Our approach (see Fig. 1) comprises three phases. The first phase, carried out by the security designer, identifies the elements to be protected in the DW design. In the second phase, we first automatically build an inferences graph used to detect the elements which may lead to inferences; secondly, the designer distinguishes the elements that lead to precise inferences and those that lead to partial inferences. In the third phase, we automatically enrich the DW schema model by UML annotations highlighting the elements subject to both types of inferences. Note that we use in this paper the star schema to model the DW schema. 3.1 Definition of Sensitive Data Given a DW schema, the definition of sensitive data annotates the elements of the multidimensional model. It is made by the DW security designer who may be assisted by an expert in the field. The role of the domain expert is to identify the data to be protected. This data is indicated by annotations with the UML stereotype Sensitive data (see Fig. 1). 3.2 Inference Graph Construction Definition 1: An inference graph is a set of nodes connected by oriented arcs. The nodes represent the data (in the source) and the arcs indicate the direction of inference and the inference type (partial/precise). Graphical notations: An inference graph is graphically composed of: - Two types of nodes: nodes colored in gray represent the sensitive data, and nodes colored in white represent the non-sensitive data. - Two types of arcs: dotted arcs indicate partial inferences and solid arcs indicate precise inferences. Take the case of health, disease (sensitive data), treatment and service are represented by nodes. The correspondence between the disease and treatment is the inferences and their meaning (Fig. 2): Knowing the treatment, one can infer the disease. This inference is precise because two different diseases may not have the same treatment, so we have a solid arc treatment to illness. On the other hand, if in a hospital, each service treats a number of diseases, then, knowing the service, one can have an idea about the kind of disease but not its name; this is modeled by the dotted arc from service to illness.
5 Securing Data Warehouses 75 DW schema (1) Sensitive data identification DW schema: Sensitive data identified (2.a) Inference graph construction (2.b)Partial inference Identification A B C D E Inferences graph Data sources class diagram A B C D Inference graph : Partial inference detected E (2.c) Calculating the transitive closure A B C D Graph inferences: new partial inference detected E (3) DW schema enrichment DW schema enriched Fig. 1. Proposed Approach for DW schema security
6 76 S. Triki et al. Illness Treatment Service Fig. 2. Inference graph: Example The construction of an inferences graph involves the class diagram of data sources that will load the DW. We use the mapping to prune out the inference graph built from the data sources and restrict it to only the nodes corresponding to data used for the loading of the DW schema. In our approach (see Fig. 1), the inference graph is built automatically based on the cardinality of the class diagram of the data sources. To do this, we apply the following six rules: R1. Each class is represented by a node colored in gray if the corresponding data is sensitive and colored in white otherwise. R2. Each binary association / aggregation between two classes and will be represented by an arc according to the following three cases: Case 1 (see Fig. 3 (a, b)): if the association/aggregation has cardinality on s side and cardinality 1 or 0..1 on the s side, then an arc from to is added to the inference graph (see Fig. 3 (c)) Case 2 (see Fig. 4 (a, b)): if the association/aggregation has cardinality s side and cardinality 1 or 0..1 on s side and is also connected to C3 by an association/agregation with cardinality on side and the cardinality of 1 or 0..1 on C3 s side, then two arcs are added to the inference graph. The first from to C3 and the second from C3 to (see Fig. 3 (c)) Case 3 (see Fig. 5 (a)): if the association has a class C3, then two arcs are added to the inference graph; one from C3 to and another from C3 to (see Fig. 5 (b)). 1 or or 0..1 (a) (b) (c) Fig. 3. Inference first case
7 Securing Data Warehouses 77 1 or or 0..1 C3 1or0..1 1or0..1 (a) (b) (c) Fig. 4. Inference second case C3 (a) (b) Fig. 5. Inference third case 1 or 0..1 (a) (b) (c) (d) Fig. 6. Representing composition R3. Each composition (see Fig. 6 (a)) will be represented by an arc from the component to the composite (see Fig. 6 (b)). If in addition the cardinality of the component side is 1 or 0..1 (see Fig. 6 (c)), then a second arc from the composite is added to the component (see Fig. 6 (d)). R 4. Each n-ary association with cardinalities and 1 or 0..1 will be represented by arcs from classes with cardinalities 1 or 0..1 to those with the cardinality. For example, the ternary association in Fig. 7 (a) is represented by the graph in Fig. 7 (b).
8 78 S. Triki et al. 1 or 0..1 C3 (a) (b) Fig. 7. Representing n-ary association R5. If an inheritance relationship exists between two classes (parent) and (child) and if is connected to C3 by an association with a cardinality on s side and the cardinality on C3 s side is 1 or 0..1 (see Fig. 8 (a)), then an arc is added from to C3 (See Fig. 8 (b)). R6. If an inheritance relationship exists between two classes (parent) and (child) and if is connected to C3 by an association with a cardinality 1 or 0..1 on s side and the cardinality on C3 s side is (see Fig. 8 (c)), then an arc is added from C3 to (See Fig. 8 (d)). 1 or 0..1 C3 (a) (b) 1 or 0..1 C3 (c) (d) Fig. 8. Representing an inheritance relationship The automatic construction of the inference graph does not indicate the type of inferences: partial or precise. This indication cannot be, unfortunately, deducted automatically. Thus, after constructing the inference graph, the designer must distinguish partial inferences (drawn by dotted arcs).
9 Securing Data Warehouses 79 In addition, to ensure that all possible inferences have been determined, approach continues with the automatic calculation of the transitive closure of graph. On the resulting graph, we distinguish two types of paths: - Precise path: it is a path where all connected nodes allow precise inferences. - Partial path: it is a path with at least one node allows partial inferences. 3.3 Enrichment of the DW Schema The inference graph is used to enrich the DW schema (see Fig. 1). To do so, our approach assumes that the mapping between elements of the DW schema and the source is already done. We exploit this mapping to apply the two following enrichment rules: - For each element of the inference graph belonging to a Precise path annotate its corresponding element in the DW schema with Precise Inference: ElementName: NameInferedData. - For each element of the inference graph belonging to a partial path annotate its corresponding element in the DW schema with "Partial Inference: ElementName: NameInferedData. our the 4 Example Fig. 9 contains the class diagram of a fictitious data source in the healthcare domain. Table 1 contains details of various classes. Fig. 10 presents a DW schema that analyzes the costs and durations of the diagnostic along the analysis axes: Disease, Treatment, Critical Illness, Transfer, Date Time, and Doctor's specialty. The latter takes the value generalist if the doctor who performed the diagnostic is a generalist and specialty of the doctor otherwise. Fig. 9. Class diagram of the data sources
10 80 S. Triki et al. Table 1. Details of Fig. 9 classes Class Date and Time Admission Diagnostic Doctor Specialty Illness Treatment Critical illness Transfer Details Date and time of a patient admission. Patient admission. Patient diagnostic. Doctor who made the diagnostic. Specialty of doctor who made the diagnosis. Illness diagnosed. Treatment necessary to cure the disease. Serious disease requiring patient transfer to another hospital where he will receive appropriate care. This association class contains the date of transfer of the patient and the hospital will welcome. Fig. 10. Multidimensional Model 4.1 Inference Graph Illness corresponding to a given patient is a sensitive information since it is part of professional secrecy in medical activities. In our example, we look at the data that allow us to infer a patient's illness. Fig. 11 contains the inference graph constructed from the cardinality of the class diagram of the source data. In this graph, gray nodes are the sensitive data; dotted arcs represent the inferences that we considered partial, and those in solid line are believed to be precise inferences. This graph shows inferences seven partial and one precise. The calculation of the transitive closure of the graph has highlighted other potential inferences. For the sake of clarity, we have shown in Fig. 12 new paths. These paths are partial because they contain nodes that allow partial inferences. In Table 2 the first column shows some new inferences composed of the paths listed in the second column. From Table 2 and Fig. 12, we can deduce that: - A user with access to the dates and times of admission and transfer data, may infer that the diagnosed illness were critical,
11 Securing Data Warehouses 81 Illness Critical Illness Treatment Admission Diagnostic Transfer Date and Time Doctor Specialty Fig. 11. Initial Inferences graph Illness Critical Illness Treatment Admission Diagnostic Transfer Date and Time Doctor Specialty Fig. 12. Inference graph after calculating the transitive closure - Access to the date and time of admission and the specialty of the doctor who performed the corresponding diagnosis on admission, allow the user to infer the type of illness the patient has - Access to treatment received by a patient, allow a user to infer the disease the patient has.
12 82 S. Triki et al. Table 2. Partial paths Inference Date and Time Diagnostic Date and Time Doctor Date and Time Transfer Date and Time Illness Partial path Date and Time Admission, Admission Diagnostic Date and Time Admission Admission Diagnostic Diagnostic Doctor Date and Time Admission Admission Diagnostic Diagnostic Transfer Date and Time Admission Admission Diagnostic Diagnostic Illness 4.2 DW Schema Enrichment Based on the inference graph and the mapping between the data source and DW schema, we get automatically the security annotation for the DW schema elements with ptential inferences (see Fig. 13). In this model, the dimensions of time and date are have the same annotation to specify that the two sets can lead to inferences. In Fig. 11, for the sake of clarity, we have not listed all the annotations. Fig. 13. DW schema annotated with the security information 5 Conclusion In this paper, we presented an approach to produce a conceptual multidimensional model annotated with information for the prevention of inferences. Our approach has two advantages over existing approaches. The first is its independence from the data domain. The second advantage is the use of available data to detect inferences. Our approach constructs a graph of inferences based on the class diagram of data sources. The class diagram allows us with the assistance of the domain expert to identify the
13 Securing Data Warehouses 83 elements to lead to precise and partial inference. These elements will be annotated in the multidimensional model. Currently, we are studying how to transfer to the logical level the annotations defined at the design level. References 1. Bhargava, B.K.: Security in data warehousing (Invited talk). In: Kambayashi, Y., Mohania, M., Tjoa, A.M. (eds.) DaWaK LNCS, vol. 1874, pp Springer, Heidelberg (2000) 2. Pernul, G., Priebe, T.: Towards olap security design - survey and research issues. In: 3rd ACM International Workshop on Data Warehousing and OLAP DOLAP 2000, Washington, DC, Novembre 10, pp (2000) 3. Soler, E., Stefanov, V., Mazón, J.-N., Trujillo, J., Fernández-Medina, E., Piattini, M.: Towards comprehensive requirement analysis for data warehouses: Considering security requirements. In: The Third International Conference on Availability, Reliability and Security ARES 2008, Barcelone, Espagne, pp IEEE Computer Society, Los Alamitos (2008) 4. Soler, E., Villarroel, R., Trujillo, J., Fernández-Medina, E., Piattini, M.: Representing security and audit rules for data warehouses at the logical level by using the common warehouse metamodel. In: The First International Conference on Availability, Reliability and Security ARES 2006, Vienne, Autriche, pp IEEE Computer Society, Los Alamitos (2006) 5. Triki, S., Ben-Abdallah, H., Feki, J., Harbi, N.: Modeling Conflict of Interest in the design of secure data warehouses. In: The International Conference on Knowledge Engineering and Ontology Development 2010, Valencia, Espagne, pp (2010) 6. Carlos, B., Ignacio, G., Eduardo, F.-M., Juan, T., Mario, P.: Towards the Secure Modelling of OLAP Users Behaviour. In: The 7th VLDB Conference on Secure Data Management, Singapore, September 17, pp Springer, Heidelberg (2010) 7. Steger, J., Günzel, H.: Identifying Security Holes in OLAP Applications. In: Proc. Fourteenth Annual IFIP WG 11.3 Working Conference on Database Security, Schoorl (near Amsterdam), The Netherlands, August (2000) 8. Icon Group Ltd. GFK AG: International Competitive Benchmarks and Financial Gap Analysis (Financial Performance Series). Icon Group International (2000) 9. Villarroel, R., Fernández-Medina, E., Piattini, M., Trujillo, J.: A uml 2.0/ocl extension for designing secure data warehouses. Journal of Research and Practice in Information Technology 38(1), (2006) 10. Haibing, L., Yingjiu, L.: Practical Inference Control for Data Cubes. IEEE Transactions on Dependable and Secure Computing 5(2), (2008) 11. Cuzzocrea, A.: Privacy Preserving OLAP and OLAP Security. In: Encyclopedia of Data Warehousing and Mining, pp (2009) 12. Zhang, N., Zhao, W.: Privacy-Preserving OLAP: An Information-Theoretic Approach. IEEE Transactions on Knowledge and Data Engineering 23(1), (2011) 13. Terzi, E., Zhong, Y., Bhargava, B.K., Pankaj, Madria, S.K.: An Algorithm for Building User-Role Profiles in a Trust Environment. In: Kambayashi, Y., Winiwarter, W., Arikawa, M. (eds.) DaWaK LNCS, vol. 2454, pp Springer, Heidelberg (2002)
14 84 S. Triki et al. 14. Bhargava, B.K., Zhong, Y., Lu, Y.: Fraud Formalization and Detection. In: Kambayashi, Y., Mohania, M., Wöß, W. (eds.) DaWaK LNCS, vol. 2737, pp Springer, Heidelberg (2003) 15. Golfarelli, M., Rizzi, S.: A Methodological Framework for Data Warehouse Design. In: ACM First International Workshop on Data Warehousing and OLAP DOLAP, Bethesda, Maryland, USA, pp. 3 9 (Novembre 1998) 16. Feki, J., Nabli, A., Ben-Abdallah, H., Gargouri, F.: An Automatic Data Warehouse Conceptual Design Approach. In: Wang, J. (ed.) Encyclopedia of Data Warehousing and Mining, 2nd edn. (2008) 17. Lujan-Mora, S., Trujillo, J.A.: Comprehensive Method for Data Warehouse Design Fifth International Workshop on Design and Management of Data Warehouses, DMDW 2003, Berlin, Allemagne (Septembre 2003)
Comparative Analysis of Data warehouse Design Approaches from Security Perspectives
Comparative Analysis of Data warehouse Design Approaches from Security Perspectives Shashank Saroop #1, Manoj Kumar *2 # M.Tech (Information Security), Department of Computer Science, GGSIP University
More informationTOWARDS A FRAMEWORK INCORPORATING FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTS FOR DATAWAREHOUSE CONCEPTUAL DESIGN
IADIS International Journal on Computer Science and Information Systems Vol. 9, No. 1, pp. 43-54 ISSN: 1646-3692 TOWARDS A FRAMEWORK INCORPORATING FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTS FOR DATAWAREHOUSE
More informationINTEROPERABILITY IN DATA WAREHOUSES
INTEROPERABILITY IN DATA WAREHOUSES Riccardo Torlone Roma Tre University http://torlone.dia.uniroma3.it/ SYNONYMS Data warehouse integration DEFINITION The term refers to the ability of combining the content
More informationPartJoin: An Efficient Storage and Query Execution for Data Warehouses
PartJoin: An Efficient Storage and Query Execution for Data Warehouses Ladjel Bellatreche 1, Michel Schneider 2, Mukesh Mohania 3, and Bharat Bhargava 4 1 IMERIR, Perpignan, FRANCE ladjel@imerir.com 2
More informationTowards the Next Generation of Data Warehouse Personalization System A Survey and a Comparative Study
www.ijcsi.org 561 Towards the Next Generation of Data Warehouse Personalization System A Survey and a Comparative Study Saida Aissi 1, Mohamed Salah Gouider 2 Bestmod Laboratory, University of Tunis, High
More informationGoal-Driven Design of a Data Warehouse-Based Business Process Analysis System
Proceedings of the 6th WSEAS Int. Conf. on Artificial Intelligence, Knowledge Engineering and Data Bases, Corfu Island, Greece, February 16-19, 2007 243 Goal-Driven Design of a Data Warehouse-Based Business
More informationDIMENSION HIERARCHIES UPDATES IN DATA WAREHOUSES A User-driven Approach
DIMENSION HIERARCHIES UPDATES IN DATA WAREHOUSES A User-driven Approach Cécile Favre, Fadila Bentayeb, Omar Boussaid ERIC Laboratory, University of Lyon, 5 av. Pierre Mendès-France, 69676 Bron Cedex, France
More informationDWEB: A Data Warehouse Engineering Benchmark
DWEB: A Data Warehouse Engineering Benchmark Jérôme Darmont, Fadila Bentayeb, and Omar Boussaïd ERIC, University of Lyon 2, 5 av. Pierre Mendès-France, 69676 Bron Cedex, France {jdarmont, boussaid, bentayeb}@eric.univ-lyon2.fr
More informationPIONEER RESEARCH & DEVELOPMENT GROUP
Application Of Enhanced Security In Mondrian OLAP To Secure Big Data Fernandez raj D 1, Gunasekaran G 2 1 Research Scholar Department of Computer Science Engineering, St. Peter s University, Avadi, Chennai,
More informationOLAP Visualization Operator for Complex Data
OLAP Visualization Operator for Complex Data Sabine Loudcher and Omar Boussaid ERIC laboratory, University of Lyon (University Lyon 2) 5 avenue Pierre Mendes-France, 69676 Bron Cedex, France Tel.: +33-4-78772320,
More informationDimensional Modeling for Data Warehouse
Modeling for Data Warehouse Umashanker Sharma, Anjana Gosain GGS, Indraprastha University, Delhi Abstract Many surveys indicate that a significant percentage of DWs fail to meet business objectives or
More informationCurriculum of the research and teaching activities. Matteo Golfarelli
Curriculum of the research and teaching activities Matteo Golfarelli The curriculum is organized in the following sections I Curriculum Vitae... page 1 II Teaching activity... page 2 II.A. University courses...
More informationModeling the User Interface of Web Applications with UML
Modeling the User Interface of Web Applications with UML Rolf Hennicker,Nora Koch,2 Institute of Computer Science Ludwig-Maximilians-University Munich Oettingenstr. 67 80538 München, Germany {kochn,hennicke}@informatik.uni-muenchen.de
More informationExtending UML 2 Activity Diagrams with Business Intelligence Objects *
Extending UML 2 Activity Diagrams with Business Intelligence Objects * Veronika Stefanov, Beate List, Birgit Korherr Women s Postgraduate College for Internet Technologies Institute of Software Technology
More informationDetermining Preferences from Semantic Metadata in OLAP Reporting Tool
Determining Preferences from Semantic Metadata in OLAP Reporting Tool Darja Solodovnikova, Natalija Kozmina Faculty of Computing, University of Latvia, Riga LV-586, Latvia {darja.solodovnikova, natalija.kozmina}@lu.lv
More informationConceptual Workflow for Complex Data Integration using AXML
Conceptual Workflow for Complex Data Integration using AXML Rashed Salem, Omar Boussaïd and Jérôme Darmont Université de Lyon (ERIC Lyon 2) 5 av. P. Mendès-France, 69676 Bron Cedex, France Email: firstname.lastname@univ-lyon2.fr
More informationChapter 10. Practical Database Design Methodology. The Role of Information Systems in Organizations. Practical Database Design Methodology
Chapter 10 Practical Database Design Methodology Practical Database Design Methodology Design methodology Target database managed by some type of database management system Various design methodologies
More informationwww.ijreat.org Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1
Data Warehouse Security Akanksha 1, Akansha Rakheja 2, Ajay Singh 3 1,2,3 Information Technology (IT), Dronacharya College of Engineering, Gurgaon, Haryana, India Abstract Data Warehouses (DW) manage crucial
More informationAligning Data Warehouse Requirements with Business Goals
Aligning Data Warehouse Requirements with Business Goals Alejandro Maté 1, Juan Trujillo 1, Eric Yu 2 1 Lucentia Research Group Department of Software and Computing Systems University of Alicante {amate,jtrujillo}@dlsi.ua.es
More informationEncyclopedia of Database Technologies and Applications. Data Warehousing: Multi-dimensional Data Models and OLAP. Jose Hernandez-Orallo
Encyclopedia of Database Technologies and Applications Data Warehousing: Multi-dimensional Data Models and OLAP Jose Hernandez-Orallo Dep. of Information Systems and Computation Technical University of
More informationLeveraging UML for Security Engineering and Enforcement in a Collaboration on Duty and Adaptive Workflow Model that Extends NIST RBAC
Leveraging UML for Security Engineering and Enforcement in a Collaboration on Duty and Adaptive Workflow Model that Extends NIST RBAC S. Berhe 1, S. Demurjian 1, S. Gokhale 1, J. Pavlich-Mariscal 2,3,
More informationUsing the column oriented NoSQL model for implementing big data warehouses
Int'l Conf. Par. and Dist. Proc. Tech. and Appl. PDPTA'15 469 Using the column oriented NoSQL model for implementing big data warehouses Khaled. Dehdouh 1, Fadila. Bentayeb 1, Omar. Boussaid 1, and Nadia
More informationLogical Design of Data Warehouses from XML
Logical Design of Data Warehouses from XML Marko Banek, Zoran Skočir and Boris Vrdoljak FER University of Zagreb, Zagreb, Croatia {marko.banek, zoran.skocir, boris.vrdoljak}@fer.hr Abstract Data warehouse
More informationUsing Relational Algebra on the Specification of Real World ETL Processes
Using Relational Algebra on the Specification of Real World ETL Processes Vasco Santos CIICESI - School of Management and Technology Polytechnic of Porto Felgueiras, Portugal vsantos@estgf.ipp.pt Orlando
More informationA Design and implementation of a data warehouse for research administration universities
A Design and implementation of a data warehouse for research administration universities André Flory 1, Pierre Soupirot 2, and Anne Tchounikine 3 1 CRI : Centre de Ressources Informatiques INSA de Lyon
More informationDynamic index selection in data warehouses
Dynamic index selection in data warehouses Stéphane Azefack 1, Kamel Aouiche 2 and Jérôme Darmont 1 1 Université de Lyon (ERIC Lyon 2) 5 avenue Pierre Mendès-France 69676 Bron Cedex France jerome.darmont@univ-lyon2.fr
More informationThe use of UML to design agricultural data warehouses
Author-produced version of the paper presented10/4 at AGENG 2020 Conference, Septembre 6-8 2010, Clermont-Ferrand, France The use of UML to design agricultural data warehouses François Pinet 1, André Miralles
More informationMultidimensional Modeling with UML Package Diagrams
Multidimensional Modeling with UML Package Diagrams Sergio Luján-Mora 1, Juan Trujillo 1, and Il-Yeol Song 2 1 Dept. de Lenguajes y Sistemas Informáticos Universidad de Alicante (Spain) {slujan,jtrujillo}@dlsi.ua.es
More informationSecure Database Development
Secure Database Development Jan Jurjens () and Eduardo B. Fernandez (2) () Computing Department, The Open University, Milton Keynes, MK7 8LA GB http://www.jurjens.de/jan (2) Dept. of Computer Science,
More informationLecture 12: Entity Relationship Modelling
Lecture 12: Entity Relationship Modelling The Entity-Relationship Model Entities Relationships Attributes Constraining the instances Cardinalities Identifiers Generalization 2004-5 Steve Easterbrook. This
More informationA Hybrid Model Driven Development Framework for the Multidimensional Modeling of Data Warehouses
A Hybrid Model Driven Development Framework for the Multidimensional Modeling of Data Warehouses ABSTRACT Jose-Norberto Mazón Lucentia Research Group Dept. of Software and Computing Systems University
More informationA Knowledge Management Framework Using Business Intelligence Solutions
www.ijcsi.org 102 A Knowledge Management Framework Using Business Intelligence Solutions Marwa Gadu 1 and Prof. Dr. Nashaat El-Khameesy 2 1 Computer and Information Systems Department, Sadat Academy For
More informationOLAP Online Privacy Control
OLAP Online Privacy Control M. Ragul Vignesh and C. Senthil Kumar Abstract--- The major issue related to the protection of private information in online analytical processing system (OLAP), is the privacy
More informationData Warehouse Design
Data Warehouse Design Modern Principles and Methodologies Matteo Golfarelli Stefano Rizzi Translated by Claudio Pagliarani Mc Grauu Hill New York Chicago San Francisco Lisbon London Madrid Mexico City
More informationKeywords : Data Warehouse, Data Warehouse Testing, Lifecycle based Testing
Volume 4, Issue 12, December 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Lifecycle
More informationMDA Transformations Applied to Web Application Development 1
MDA Transformations Applied to Web Application Development 1 Santiago Meliá 1, Andreas Kraus 2, and Nora Koch 2, 3 1 Universidad de Alicante, Spain 2 Ludwig-Maximilians-Universität München, Germany 3 F.A.S.T
More informationBusiness Intelligence in E-Learning
Business Intelligence in E-Learning (Case Study of Iran University of Science and Technology) Mohammad Hassan Falakmasir 1, Jafar Habibi 2, Shahrouz Moaven 1, Hassan Abolhassani 2 Department of Computer
More informationA Model-based Software Architecture for XML Data and Metadata Integration in Data Warehouse Systems
Proceedings of the Postgraduate Annual Research Seminar 2005 68 A Model-based Software Architecture for XML and Metadata Integration in Warehouse Systems Abstract Wan Mohd Haffiz Mohd Nasir, Shamsul Sahibuddin
More informationSDWM: An Enhanced Spatial Data Warehouse Metamodel
SDWM: An Enhanced Spatial Data Warehouse Metamodel Alfredo Cuzzocrea 1, Robson do Nascimento Fidalgo 2 1 ICAR-CNR & University of Calabria, 87036 Rende (CS), ITALY cuzzocrea@si.deis.unical.it. 2. CIN,
More informationLinking BPMN, ArchiMate, and BWW: Perfect Match for Complete and Lawful Business Process Models?
Linking BPMN, ArchiMate, and BWW: Perfect Match for Complete and Lawful Business Process Models? Ludmila Penicina Institute of Applied Computer Systems, Riga Technical University, 1 Kalku, Riga, LV-1658,
More informationMetadata Management for Data Warehouse Projects
Metadata Management for Data Warehouse Projects Stefano Cazzella Datamat S.p.A. stefano.cazzella@datamat.it Abstract Metadata management has been identified as one of the major critical success factor
More informationManaging a Fragmented XML Data Cube with Oracle and Timesten
ACM Fifteenth International Workshop On Data Warehousing and OLAP (DOLAP 2012) Maui, Hawaii, USA November 2nd, 2012 Managing a Fragmented XML Data Cube with Oracle and Timesten Doulkifli BOUKRAA, ESI,
More informationEfficient Integration of Data Mining Techniques in Database Management Systems
Efficient Integration of Data Mining Techniques in Database Management Systems Fadila Bentayeb Jérôme Darmont Cédric Udréa ERIC, University of Lyon 2 5 avenue Pierre Mendès-France 69676 Bron Cedex France
More informationConceptual Workflow for Complex Data Integration using AXML
Conceptual Workflow for Complex Data Integration using AXML Rashed Salem, Omar Boussaid, Jérôme Darmont To cite this version: Rashed Salem, Omar Boussaid, Jérôme Darmont. Conceptual Workflow for Complex
More informationChapter 7 Data Modeling Using the Entity- Relationship (ER) Model
Chapter 7 Data Modeling Using the Entity- Relationship (ER) Model Copyright 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 7 Outline Using High-Level Conceptual Data Models for
More informationPerformance Improvement Techniques for Customized Data Warehouse
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-661, p- ISSN: 2278-8727Volume 9, Issue 3 (Mar. - Apr. 213), PP 1-5 Performance Improvement Techniques for Customized Data Warehouse Md. Al Mamun
More information1. Introduction. Nouha Arfaoui 1 and Jalel Akaichi 2 ABSTRACT KEY WORDS
Nouha Arfaoui 1 and Jalel Akaichi 2 Computer science department, Institut superieur de gestion, 41, Avenue de la liberté, Cité Bouchoucha, Le Bardo 2000, Tunisia 1 Arfaoui.nouha@yahoo.fr 2 Akaichi.jalel@isg.rnu.tn
More informationCIM to PIM Transformation: A criteria Based Evaluation
ISSN:2229-6093 CIM to PIM Transformation: A criteria Based Evaluation Abdelouahed KRIOUILE *, Taoufiq GADI, Youssef BALOUKI Univ Hassan 1, LAVETE Laboratory, 26000 Settat, Maroc * E-mail of the corresponding
More informationVARIABILITY MODELING FOR CUSTOMIZABLE SAAS APPLICATIONS
VARIABILITY MODELING FOR CUSTOMIZABLE SAAS APPLICATIONS Ashraf A. Shahin 1, 2 1 College of Computer and Information Sciences, Al Imam Mohammad Ibn Saud Islamic University (IMSIU) Riyadh, Kingdom of Saudi
More informationAutomatic Selection of Bitmap Join Indexes in Data Warehouses
Automatic Selection of Bitmap Join Indexes in Data Warehouses Kamel Aouiche, Jérôme Darmont, Omar Boussaïd, Fadila Bentayeb To cite this version: Kamel Aouiche, Jérôme Darmont, Omar Boussaïd, Fadila Bentayeb
More informationA Comprehensive Security Model for Patient Data Warehouse
A Comprehensive Security Model for Patient Data Warehouse Paramasivam. Suraj thyagarajan 1, Neeraj Harikrishnan Girija Paramasivam 2 1 Department of Computer Science and Engineering, University at Buffalo,
More informationA Critical Review of Data Warehouse
Global Journal of Business Management and Information Technology. Volume 1, Number 2 (2011), pp. 95-103 Research India Publications http://www.ripublication.com A Critical Review of Data Warehouse Sachin
More informationDesign of a Multi Dimensional Database for the Archimed DataWarehouse
169 Design of a Multi Dimensional Database for the Archimed DataWarehouse Claudine Bréant, Gérald Thurler, François Borst, Antoine Geissbuhler Service of Medical Informatics University Hospital of Geneva,
More informationData warehouse life-cycle and design
SYNONYMS Data Warehouse design methodology Data warehouse life-cycle and design Matteo Golfarelli DEIS University of Bologna Via Sacchi, 3 Cesena Italy matteo.golfarelli@unibo.it DEFINITION The term data
More informationMy Favorite Issues in Data Warehouse Modeling
University of Münster My Favorite Issues in Data Warehouse Modeling Jens Lechtenbörger University of Münster & ERCIS, Germany http://dbms.uni-muenster.de Context Data Warehouse (DW) modeling ETL design
More informationII. OLAP(ONLINE ANALYTICAL PROCESSING)
Association Rule Mining Method On OLAP Cube Jigna J. Jadav*, Mahesh Panchal** *( PG-CSE Student, Department of Computer Engineering, Kalol Institute of Technology & Research Centre, Gujarat, India) **
More informationThe Importance of Multidimensional Modeling in Data warehouses
COVER FEATURE Designing Data Warehouses with OO Conceptual Models Based on a subset of the Unified Modeling Language, the authors objectoriented approach to building data warehouses frees conceptual design
More informationDC Proposal: Online Analytical Processing of Statistical Linked Data
DC Proposal: Online Analytical Processing of Statistical Linked Data Benedikt Kämpgen Institute AIFB, Karlsruhe Institute of Technology, 76128 Karlsruhe, Germany benedikt.kaempgen@kit.edu Abstract. The
More informationETL evolution from data sources to data warehouse using mediator data storage
ETL evolution from data sources to data warehouse using mediator data storage Alexander Dolnik (alexander.dolnik@gmail.com) Saint-Petersburg State University Abstract. The problem of evolution in the ETL
More informationData Warehouse: Introduction
Base and Mining Group of Base and Mining Group of Base and Mining Group of Base and Mining Group of Base and Mining Group of Base and Mining Group of Base and Mining Group of base and data mining group,
More informationAlejandro Vaisman Esteban Zimanyi. Data. Warehouse. Systems. Design and Implementation. ^ Springer
Alejandro Vaisman Esteban Zimanyi Data Warehouse Systems Design and Implementation ^ Springer Contents Part I Fundamental Concepts 1 Introduction 3 1.1 A Historical Overview of Data Warehousing 4 1.2 Spatial
More informationModeling Temporal Data in Electronic Health Record Systems
International Journal of Information Science and Intelligent System, 3(3): 51-60, 2014 Modeling Temporal Data in Electronic Health Record Systems Chafiqa Radjai 1, Idir Rassoul², Vytautas Čyras 3 1,2 Mouloud
More informationDATA WAREHOUSING AND OLAP TECHNOLOGY
DATA WAREHOUSING AND OLAP TECHNOLOGY Manya Sethi MCA Final Year Amity University, Uttar Pradesh Under Guidance of Ms. Shruti Nagpal Abstract DATA WAREHOUSING and Online Analytical Processing (OLAP) are
More informationChapter 10 Practical Database Design Methodology and Use of UML Diagrams
Chapter 10 Practical Database Design Methodology and Use of UML Diagrams Copyright 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 10 Outline The Role of Information Systems in
More informationLost in Space? Methodology for a Guided Drill-Through Analysis Out of the Wormhole
Paper BB-01 Lost in Space? Methodology for a Guided Drill-Through Analysis Out of the Wormhole ABSTRACT Stephen Overton, Overton Technologies, LLC, Raleigh, NC Business information can be consumed many
More informationDesigning Data Warehouses for Geographic OLAP querying by using MDA
Designing Data Warehouses for Geographic OLAP querying by using MDA Octavio Glorio and Juan Trujillo University of Alicante, Spain, Department of Software and Computing Systems Lucentia Research Group
More informationFoundations of Business Intelligence: Databases and Information Management
Foundations of Business Intelligence: Databases and Information Management Problem: HP s numerous systems unable to deliver the information needed for a complete picture of business operations, lack of
More informationTraining Management System for Aircraft Engineering: indexing and retrieval of Corporate Learning Object
Training Management System for Aircraft Engineering: indexing and retrieval of Corporate Learning Object Anne Monceaux 1, Joanna Guss 1 1 EADS-CCR, Centreda 1, 4 Avenue Didier Daurat 31700 Blagnac France
More informationBUILDING OLAP TOOLS OVER LARGE DATABASES
BUILDING OLAP TOOLS OVER LARGE DATABASES Rui Oliveira, Jorge Bernardino ISEC Instituto Superior de Engenharia de Coimbra, Polytechnic Institute of Coimbra Quinta da Nora, Rua Pedro Nunes, P-3030-199 Coimbra,
More informationCHAPTER 4: BUSINESS ANALYTICS
Chapter 4: Business Analytics CHAPTER 4: BUSINESS ANALYTICS Objectives Introduction The objectives are: Describe Business Analytics Explain the terminology associated with Business Analytics Describe the
More informationMeta-data and Data Mart solutions for better understanding for data and information in E-government Monitoring
www.ijcsi.org 78 Meta-data and Data Mart solutions for better understanding for data and information in E-government Monitoring Mohammed Mohammed 1 Mohammed Anad 2 Anwar Mzher 3 Ahmed Hasson 4 2 faculty
More informationChapter 8 The Enhanced Entity- Relationship (EER) Model
Chapter 8 The Enhanced Entity- Relationship (EER) Model Copyright 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 8 Outline Subclasses, Superclasses, and Inheritance Specialization
More informationOptimization of ETL Work Flow in Data Warehouse
Optimization of ETL Work Flow in Data Warehouse Kommineni Sivaganesh M.Tech Student, CSE Department, Anil Neerukonda Institute of Technology & Science Visakhapatnam, India. Sivaganesh07@gmail.com P Srinivasu
More informationPatient Trajectory Modeling and Analysis
Patient Trajectory Modeling and Analysis Jalel Akaichi and Marwa Manaa Higher Institute of Management of tunis, 41 Rue de la Liberté, Cité Bouchoucha, 2000 Bardo, Tunisia j.akaichi@gmail.com, manaamarwa@gmail.com
More informationPersonalized e-learning a Goal Oriented Approach
Proceedings of the 7th WSEAS International Conference on Distance Learning and Web Engineering, Beijing, China, September 15-17, 2007 304 Personalized e-learning a Goal Oriented Approach ZHIQI SHEN 1,
More informationData Validation with OWL Integrity Constraints
Data Validation with OWL Integrity Constraints (Extended Abstract) Evren Sirin Clark & Parsia, LLC, Washington, DC, USA evren@clarkparsia.com Abstract. Data validation is an important part of data integration
More informationBusiness Process Modelling Languages, Goals and Variabilities
Business Process Modelling Languages, Goals and Variabilities Birgit Korherr Women s Postgraduate College for Internet Technologies Institute of Software Technology and Interactive Systems Vienna University
More informationAn Object Oriented Role-based Access Control Model for Secure Domain Environments
International Journal of Network Security, Vol.4, No.1, PP.10 16, Jan. 2007 10 An Object Oriented -based Access Control Model for Secure Domain Environments Cungang Yang Department of Electrical and Computer
More informationHorizontal Aggregations In SQL To Generate Data Sets For Data Mining Analysis In An Optimized Manner
24 Horizontal Aggregations In SQL To Generate Data Sets For Data Mining Analysis In An Optimized Manner Rekha S. Nyaykhor M. Tech, Dept. Of CSE, Priyadarshini Bhagwati College of Engineering, Nagpur, India
More informationData Modeling Basics
Information Technology Standard Commonwealth of Pennsylvania Governor's Office of Administration/Office for Information Technology STD Number: STD-INF003B STD Title: Data Modeling Basics Issued by: Deputy
More informationApplication Of Business Intelligence In Agriculture 2020 System to Improve Efficiency And Support Decision Making in Investments.
Application Of Business Intelligence In Agriculture 2020 System to Improve Efficiency And Support Decision Making in Investments Anuraj Gupta Department of Electronics and Communication Oriental Institute
More informationFoundations of Business Intelligence: Databases and Information Management
Chapter 5 Foundations of Business Intelligence: Databases and Information Management 5.1 Copyright 2011 Pearson Education, Inc. Student Learning Objectives How does a relational database organize data,
More informationTracking System for GPS Devices and Mining of Spatial Data
Tracking System for GPS Devices and Mining of Spatial Data AIDA ALISPAHIC, DZENANA DONKO Department for Computer Science and Informatics Faculty of Electrical Engineering, University of Sarajevo Zmaja
More informationAccess control for data integration in presence of data dependencies. Mehdi Haddad, Mohand-Saïd Hacid
Access control for data integration in presence of data dependencies Mehdi Haddad, Mohand-Saïd Hacid 1 Outline Introduction Motivating example Related work Approach Detection phase (Re)configuration phase
More informationAdding Semantics to Business Intelligence
Adding Semantics to Business Intelligence Denilson Sell 1,2, Liliana Cabral 2, Enrico Motta 2, John Domingue 2 and Roberto Pacheco 1,3 1 Stela Group, Universidade Federal de Santa Catarina, Brazil 2 Knowledge
More informationCHAPTER 5: BUSINESS ANALYTICS
Chapter 5: Business Analytics CHAPTER 5: BUSINESS ANALYTICS Objectives The objectives are: Describe Business Analytics. Explain the terminology associated with Business Analytics. Describe the data warehouse
More informationChapter 6 Basics of Data Integration. Fundamentals of Business Analytics RN Prasad and Seema Acharya
Chapter 6 Basics of Data Integration Fundamentals of Business Analytics Learning Objectives and Learning Outcomes Learning Objectives 1. Concepts of data integration 2. Needs and advantages of using data
More information1. OLAP is an acronym for a. Online Analytical Processing b. Online Analysis Process c. Online Arithmetic Processing d. Object Linking and Processing
1. OLAP is an acronym for a. Online Analytical Processing b. Online Analysis Process c. Online Arithmetic Processing d. Object Linking and Processing 2. What is a Data warehouse a. A database application
More informationTHE TECHNOLOGY OF USING A DATA WAREHOUSE TO SUPPORT DECISION-MAKING IN HEALTH CARE
THE TECHNOLOGY OF USING A DATA WAREHOUSE TO SUPPORT DECISION-MAKING IN HEALTH CARE Dr. Osama E.Sheta 1 and Ahmed Nour Eldeen 2 1,2 Department of Mathematics (Computer Science) Faculty of Science, Zagazig
More informationPRACTICAL DATA MINING IN A LARGE UTILITY COMPANY
QÜESTIIÓ, vol. 25, 3, p. 509-520, 2001 PRACTICAL DATA MINING IN A LARGE UTILITY COMPANY GEORGES HÉBRAIL We present in this paper the main applications of data mining techniques at Electricité de France,
More informationTowards Privacy aware Big Data analytics
Towards Privacy aware Big Data analytics Pietro Colombo, Barbara Carminati, and Elena Ferrari Department of Theoretical and Applied Sciences, University of Insubria, Via Mazzini 5, 21100 - Varese, Italy
More informationNursing Diagnosis and Multidimensional Design
Proceedings of the 3 rd INFORMS Workshop on Data Mining and Health Informatics (DM-HI 2008) J. Li, D. Aleman, R. Sikora, eds. NursingCareWare: Warehousing for Nursing Care Research and Knowledge Discovery
More informationOLAP. Business Intelligence OLAP definition & application Multidimensional data representation
OLAP Business Intelligence OLAP definition & application Multidimensional data representation 1 Business Intelligence Accompanying the growth in data warehousing is an ever-increasing demand by users for
More informationRequirements are elicited from users and represented either informally by means of proper glossaries or formally (e.g., by means of goal-oriented
A Comphrehensive Approach to Data Warehouse Testing Matteo Golfarelli & Stefano Rizzi DEIS University of Bologna Agenda: 1. DW testing specificities 2. The methodological framework 3. What & How should
More informationA Survey on Data Warehouse Architecture
A Survey on Data Warehouse Architecture Rajiv Senapati 1, D.Anil Kumar 2 1 Assistant Professor, Department of IT, G.I.E.T, Gunupur, India 2 Associate Professor, Department of CSE, G.I.E.T, Gunupur, India
More informationA Modeling Tool for Multidimensional Data using the ADAPT Notation
A Modeling Tool for Multidimensional Data using the ADAPT Notation Peter Gluchowski, Christian Kurze, Christian Schieder Chemnitz University of Technology {petergluchowski christiankurze christianschieder}@wirtschafttu-chemnitzde
More informationImproving Agility in Model-Driven Web Engineering
Improving Agility in Model-Driven Web Engineering José Matías Rivero 1,2, Julián Grigera 1, Gustavo Rossi 1,2, Esteban Robles Luna 1, Nora Koch 3,4 1 LIFIA, Facultad de Informática, UNLP, La Plata, Argentina
More informationTwo approaches to the integration of heterogeneous data warehouses
Distrib Parallel Databases (2008) 23: 69 97 DOI 10.1007/s10619-007-7022-z Two approaches to the integration of heterogeneous data warehouses Riccardo Torlone Published online: 23 December 2007 Springer
More informationReverse Engineering in Data Integration Software
Database Systems Journal vol. IV, no. 1/2013 11 Reverse Engineering in Data Integration Software Vlad DIACONITA The Bucharest Academy of Economic Studies diaconita.vlad@ie.ase.ro Integrated applications
More informationAn Agent Based Etl System: Towards an Automatic Code Generation
World Applied Sciences Journal 31 (5): 979-987, 2014 ISSN 1818-4952 IDOSI Publications, 2014 DOI: 10.5829/idosi.wasj.2014.31.05.268 An Agent Based Etl System: Towards an Automatic Code Generation Abderrahmane
More information