Security in Data Warehousing* (Invited Talk)

نویسنده

  • Bharat Bhargava
چکیده

Data warehouse [2,4,5,6] is an integrated repository derived from multiple source (operational and legacy) databases. The data warehouse is created by either replicating the different source data or transforming them to new representation. This process involves reading, cleaning, aggregating and storing the data in the warehouse model. The software tools are used to access the warehouse for strategic analysis, decision-making, marketing types of applications. It can be used for inventory control of shelf stock in many departmental stores.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Model Free Data Mining

This is the second volume of the Advances in Data Warehousing and Mining (ADWM) book series. ADWM publishes books in the areas of data warehousing and mining. The topic of this volume is data mining and knowledge discovery. This volume consists of 14 chapters in four section, contributed by authors and editorial board members from the International Journal of Data Warehousing and Mining, as wel...

متن کامل

Data Warehousing and Data Mining Techniques for Cyber Security

Why should wait for some days to get or receive the data warehousing and data mining techniques for cyber security advances in information security book that you order? Why should you take it if you can get the faster one? You can find the same book that you order right here. This is it the book that you can receive directly after purchasing. This data warehousing and data mining techniques for...

متن کامل

Why Safety and Security Should and Will Merge

of invited Talk for 23nd Intern. Conference SAFECOMP 2004, Potsdam, September 2004, LNCS 3219, Springer-Verlag, Heidelberg 2004, 1-2. Why Safety and Security should and will merge

متن کامل

Constructing cryptographic definitions

This paper mirrors an invited talk to ISCISC 2011. It is not a conventional paper so much as an essay summarizing thoughts on a little-talked-about subject. My goal is to intermix some introspection about definitions with examples of them, these examples drawn mostly from cryptography. Underpinning our discussion are two themes. The first is that definitions are constructed. They are i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000