期刊文献+

数据仓库安全模型研究与设计 被引量:2

Security model for data warehouse
下载PDF
导出
摘要 随着数据仓库的发展,安全问题日益突出,一方面数据仓库本身需要足够的开放性,另一方面数据仓库的数据价值很大,要求对数据仓库用户加强数据访问的限制。开放与限制,两者的矛盾会严重制约数据仓库使用。论述了数据仓库安全问题产生背景及安全模型的重要性,针对数据仓库的安全问题提出安全模型。该模型能够减少数据仓库会出现的安全问题,为企业进行数据仓库设计提供参考。 With the development of data warehouse, the security problem is becoming more and more serious.On the one hand, the data warehouse itself needs enough openness. On the other hand, the data warehouse is of great value, which is required to strengthen the restriction of data access for the users. Opening and restriction, the contradiction between the two will seriously restrict the use of data warehouse. This article discussed the background of data warehouse security and the importance of security model, put forward a security model for the security ofdata warehouse. The security model could reduce security problems and provide a reference for the design of data warehouse to the enterprise.
作者 焦怡博 刘湘黔 崔亦博 JIAO Yibo;LIU Xiangqian;CUI Yibo(School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044, China)
出处 《铁路计算机应用》 2016年第9期88-91,共4页 Railway Computer Application
关键词 数据仓库 安全模型 元数据 角色 data warehouse security model metadata role
  • 相关文献

参考文献7

二级参考文献32

  • 1徐兰芳,潘芸.数据仓库安全需求模型研究[J].华中科技大学学报(自然科学版),2005,33(7):44-46. 被引量:7
  • 2Remzi kirkgoze,NevenaKatie,MladenStolba.A Security ConcePt for OLAP.IEEE Computer,1997:53-59.
  • 3N KaticG·Quirchlnayr.A PrototyPe Model for DataWarehouse Security Based On Metadata.IEEE Computer,1999:68-79.
  • 4Sandhu R,Bhamidipati V,Munawer Q.The ARBAC97 model for role-based administration of roles.ACM Trans.on Information and Systems Security(TISSEC),1999,2(1):105-135.
  • 5Oh S,Sandhu R.A model for role administration using organization structure[C] //Sandhu R,Bertino E.Proc.of the 6th ACM Symp.on Access Control Models and Technologies (SACMAT 2002).Monterey:ACM Press,2002:155-162.
  • 6Crampton J,Loizou G.Administrative scope:A foundation for role-based administrative models.ACM Trans.on Information and System Security(TISSEC),2003,6(2):201-231.
  • 7Lingyu Wang,Sushil Jajodia.Security in Data Warehouses and OLAP Systems[M] //Michael Gertz,Sushil Jaijodia.The Handbook of Database Security:Applications and Trends.Springer,Berlin,2007.
  • 8Sandhu R.Lattice-based access control models[J].IEEE Computer,1993,26(11):9-19.
  • 9Lapadula L J,Bell D E.Secure Computer System:A Mathematical Model[R].TR22547,1973.
  • 10Sandhu R,Coyne E.Role-based access control models[J].IEEE Computer,1996,29(2):38-47.

共引文献2

同被引文献8

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部