![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Reference Work Entry In depth
Data Warehouse Security
-
Living Reference Work Entry In depth
Data Warehouse Security
-
Article
Open AccessAn analysis of security issues for cloud computing
Cloud Computing is a flexible, cost-effective, and proven delivery platform for providing business or consumer IT services over the Internet. However, cloud Computing presents an added level of risk because es...
-
Chapter and Conference Paper
Towards the Secure Modelling of OLAP Users’ Behaviour
Information Security is a crucial aspect for organizations, and must be considered during the development of Information Systems. The data in Data Warehouses (DWs) are highly sensitive since they manage histor...
-
Chapter and Conference Paper
Security Culture in Small and Medium-Size Enterprise
The information society depends ever-increasingly on Information Security Management Systems (ISMSs), and these systems have become vital to SMEs. However, ISMSs must be adapted to SME’s specific characteristi...
-
Chapter and Conference Paper
Applicability of Security Patterns
Information Security has become one of the fundamental mainstays in organizations owing to the ever-increasing cyber attacks against them in recent years. Both the designers of security mechanisms and the secu...
-
Chapter and Conference Paper
Building ISMS through the Reuse of Knowledge
The information society is increasingly more dependent upon Information Security Management Systems (ISMSs), and the availability of these systems has become crucial to the evolution of Small and Medium-size E...
-
Reference Work Entry In depth
Data Warehouse Security
-
Chapter and Conference Paper
Security Requirements Management in Software Product Line Engineering
Security requirements engineering is both a central task and a critical success factor in product line development due to the complexity and extensive nature of product lines. However, most of the current prod...
-
Chapter and Conference Paper
Automatic Generation of Secure Multidimensional Code for Data Warehouses: An MDA Approach
Data Warehouses (DW) manage enterprise information for the decision making process, and the establishment of security measures at all stages of the DW development process is also highly important as unauthoriz...
-
Chapter and Conference Paper
Analysis-Level Classes from Secure Business Processes Through Model Transformations
Nowadays, business processes (BP) are important in the maintenance of competitiveness within enterprises. Moreover, security is a crucial issue in business performance. In the last few years, the languages use...
-
Chapter and Conference Paper
Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes
Security is a crucial issue for business performance, but usually, it is considered after the business processes definition. Many security requirements can be expressed at the business process level. A busines...
-
Chapter and Conference Paper
Applying a Security Requirements Engineering Process
Nowadays, security solutions are mainly focused on providing security defences, instead of solving one of the main reasons for security problems that refers to an appropriate Information Systems (IS) design. I...