Title: How to implement multidimensional security into OLAP tools

Authors: Carlos Blanco, Eduardo Fernandez-Medina, Juan Trujillo, Mario Piattini

Addresses: Department of Information Technologies and Systems, Escuela Superior de Informatica, Alarcos Research Group – Institute of Information Technologies and Systems, University of Castilla-La Mancha, Paseo de la Universidad, 4. 13071, Ciudad Real, Spain. ' Department of Information Technologies and Systems, Escuela Superior de Informatica, Alarcos Research Group – Institute of Information Technologies and Systems, University of Castilla-La Mancha, Paseo de la Universidad, 4. 13071, Ciudad Real, Spain. ' Department of Software and Computing Systems, LUCENTIA Research Group, University of Alicante, San Vicente s/n, 03690, Alicante, Spain. ' Department of Information Technologies and Systems, Escuela Superior de Informatica, Alarcos Research Group – Institute of Information Technologies and Systems, University of Castilla-La Mancha, Paseo de la Universidad, 4. 13071, Ciudad Real, Spain

Abstract: Data Warehouses (DWs) manage historical information for the decision-making process and for enterprises. Online Analytical Processing Applications (OLAP) tools are the most used tools for implementing and consulting DWs and it is necessary to define security measures to avoid the accessing of unauthorised information by users by executing queries. It is vitally important to consider security requirements from the earliest stages of the development process. We have created a Model-Driven Architecture (MDA) to develop a secure DW and in this paper, we propose how to implement the security measures that are defined at upper abstraction levels using our approach to SQL Server Analysis Services (SSAS).

Keywords: multidimensional modelling; security; online analytical processing applications; OLAP tools; SQL Server Analysis Services; SSAS; data warehouses; unauthorised access; model-driven architecture.

DOI: 10.1504/IJBIDM.2008.022136

International Journal of Business Intelligence and Data Mining, 2008 Vol.3 No.3, pp.255 - 276

Published online: 19 Dec 2008 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article