期刊文献+

基于Analysis Services的OLAP安全性实现 被引量:2

下载PDF
导出
摘要 在线分析处理技术(OLAP)是数据仓库的重要应用之一,而安全性是许多OLAP产品的主要弱点,通过对OLAP的安全性分析,建立了OLAP的安全模型,快速、有效、安全地从数据仓库中提取有价值的信息,并以安装在Windows 2000的SQL SERVER为例,研究如何实现OLAP的安全性。
出处 《桂林航天工业高等专科学校学报》 2007年第3期39-42,共4页 Journal of Guilin College of Areospace Technology
  • 相关文献

参考文献5

二级参考文献33

  • 1.OLAP市场状况及产品评测[EB/OL].http://www.dmgroup.org.en/zs12.htm,2002-01.
  • 2刘夫涛.从OLAP、数据挖掘到OLAM[EB/OL].http://www.sqlmine.com/warehouse/olap/htm/olap4.htm,2002-01.
  • 3Jiawei Han, Micheline Kambr. Data Mining: Concepts and Techniques. BeiJing: Higher Education Press,2001.
  • 4Thomas Thoalhammer, Michael Schrefl, Mukesh Mohania, Active data warehouse:complementing OLAP with analysis rules, Data & Knowledge Engineering 39(2001 ) ,241 - 269.
  • 5Efrem G. Mallach, Decision Support and Data Warehouse Systems. Bcijing:Electronic Industry Press, 2001.3.
  • 6Albrecht, J., Lehner, W., On - line analytical processing in distrbuted data warehouses, Database Engineering and Applications Symposium, 1998.Proceedings, IDEAS'98. Intemational, 1998 Page(s) :78 - 85.
  • 7E F Codd, S B Codd, C T Salley. Providing OLAP to User-Analysts: An IT Mandate [ EB/OL ]. http ://www. cis. com. rex/pdf/wp _ providing_ olap _ to _ enduser, pdf, 2002-01.
  • 8A Multidimensional Database and View Model[ EB/OL]. http://crad. ict. ac. cn/papers/1999-2-214, htm, 2002-01.
  • 9Jiawei Han,Micheline Kamber.Data Mining Concepts and Techiques[M].北京:高等教育出版社,2001.
  • 10Rich Carickhoff. A New Face For OLAP[Z]. Internet Systems,January 1997.

共引文献117

同被引文献23

  • 1蔡榆榕,陈维斌.OLAP安全访问的层次化设计与实现[J].华侨大学学报(自然科学版),2007,28(4):382-384. 被引量:2
  • 2Gunderloy M.SQL Server开发指南-OLAP(联机分析处理)[M].张伟,宋霞,译.北京:电子工业出版社,2001.
  • 3汤姆森.OLAP解决方案-创建多维信息系统[M].朱建秋,译.第2版.北京:电子工业出版社,2004.
  • 4Kirkgoze R, Katic N, Stolba M, et al. A security concept for OLAP[ C]//Proc of Sth international workshop on database and expert system applications. Toulouse, France : IEEE Com- puter Society, 1997.
  • 5Katic N, Quirchmayr J, Schiefer M, et al. A prototype model for data warehouse security based on metadata[ C ]//Proc of 9th international workshop on database and expert system ap- plications. Vienna, Austria: [ s. n. ] , 1998.
  • 6Weippl E, Mangisengi O, Essmayr W, et al. An authorization model for data warehouses and OLAP [ C ]//Proc of SRDS' 01. New Orleans, LA, USA : IEEE Computer Society ,2001.
  • 7Rosenthal A, Sciore E. View security as the basis for data warehouse security[ C]//Proc of DMDW' 00. Stockholm ,Swe- den: [ s. n. ] ,2000.
  • 8Rizzi S, Abello A, Lechtenborger J, et al. Research in data warehouse modeling and design dead or alive[ C]//Proceed- ings of the 9th ACM international workshop on data warehou- sing and OLAP. Arlington : [ s. n. ] ,2006.
  • 9Priebe T,Pernul G. A pragmatic approach to conceptual mod- eling of OLAP security [ C ]//Proceedings of the 20th interna- tional conference on conceptual modeling. Yokohama, Japan: Is. n. ] ,2001:311-324.
  • 10Ahmad S,Ahmad R. An improved security framework for data warehouse : a hybrid approach [ C ]//Proc of international sym- posium on information technology. Kuala Lumpur: IEEE, 2010 : 1586-1590.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部