Security in Data Warehousing* (Invited Talk)
نویسنده
چکیده
Data warehouse [2,4,5,6] is an integrated repository derived from multiple source (operational and legacy) databases. The data warehouse is created by either replicating the different source data or transforming them to new representation. This process involves reading, cleaning, aggregating and storing the data in the warehouse model. The software tools are used to access the warehouse for strategic analysis, decision-making, marketing types of applications. It can be used for inventory control of shelf stock in many departmental stores.
منابع مشابه
Model Free Data Mining
This is the second volume of the Advances in Data Warehousing and Mining (ADWM) book series. ADWM publishes books in the areas of data warehousing and mining. The topic of this volume is data mining and knowledge discovery. This volume consists of 14 chapters in four section, contributed by authors and editorial board members from the International Journal of Data Warehousing and Mining, as wel...
متن کاملData Warehousing and Data Mining Techniques for Cyber Security
Why should wait for some days to get or receive the data warehousing and data mining techniques for cyber security advances in information security book that you order? Why should you take it if you can get the faster one? You can find the same book that you order right here. This is it the book that you can receive directly after purchasing. This data warehousing and data mining techniques for...
متن کاملWhy Safety and Security Should and Will Merge
of invited Talk for 23nd Intern. Conference SAFECOMP 2004, Potsdam, September 2004, LNCS 3219, Springer-Verlag, Heidelberg 2004, 1-2. Why Safety and Security should and will merge
متن کاملConstructing cryptographic definitions
This paper mirrors an invited talk to ISCISC 2011. It is not a conventional paper so much as an essay summarizing thoughts on a little-talked-about subject. My goal is to intermix some introspection about definitions with examples of them, these examples drawn mostly from cryptography. Underpinning our discussion are two themes. The first is that definitions are constructed. They are i...
متن کامل