![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Open AccessImproving security in NoSQL document databases through model-driven modernization
NoSQL technologies have become a common component in many information systems and software applications. These technologies are focused on performance, enabling scalable processing of large volumes of structur...
-
Reference Work Entry In depth
Data Warehouse Security
-
Chapter and Conference Paper
How the Conceptual Modelling Improves the Security on Document Databases
Big Data is becoming a prominent trend in our society. Ever larger amounts of data, including sensitive and personal information, are being loaded into NoSQL and other Big Data technologies for analysis and pr...
-
Living Reference Work Entry In depth
Data Warehouse Security
-
Chapter and Conference Paper
Security Culture in Small and Medium-Size Enterprise
The information society depends ever-increasingly on Information Security Management Systems (ISMSs), and these systems have become vital to SMEs. However, ISMSs must be adapted to SME’s specific characteristi...
-
Reference Work Entry In depth
Data Warehouse Security
-
Chapter and Conference Paper
Applying a UML Extension to Build Use Cases Diagrams in a Secure Mobile Grid Application
Systems based on Grid computing have not traditionally been developed through suitable methodologies and have not taken into account security requirements throughout their development, offering technical secur...
-
Chapter and Conference Paper
Towards a Modernization Process for Secure Data Warehouses
Data Warehouses (DW) manage crucial enterprise information used for the decision making process which has to be protected from unauthorized accesses. However, security constraints are not properly integrated i...
-
Chapter and Conference Paper
Towards Obtaining Analysis-Level Class and Use Case Diagrams from Business Process Models
Nowadays, business process modeling, using industrial standards such as UML or BPMN, offers us a good opportunity to incorporate requirements at high levels of abstraction. In the context of Model Driven Archi...
-
Chapter and Conference Paper
Automatic Generation of Secure Multidimensional Code for Data Warehouses: An MDA Approach
Data Warehouses (DW) manage enterprise information for the decision making process, and the establishment of security measures at all stages of the DW development process is also highly important as unauthoriz...
-
Chapter and Conference Paper
M-BPSec: A Method for Security Requirement Elicitation from a UML 2.0 Business Process Specification
The early attainment of requirements in a software development process allows us to improve the quality of the product. Although many methods through which to elicit requirements exist, few of them are specifi...
-
Chapter and Conference Paper
Capturing Security Requirements in Business Processes Through a UML 2.0 Activity Diagrams Profile
Security has become a crucial aspect for the performance of present organizations since the protected object is the mission of them. Therefore, the management approach oriented to business processes has been a...
-
Chapter and Conference Paper
Applying a Security Requirements Engineering Process
Nowadays, security solutions are mainly focused on providing security defences, instead of solving one of the main reasons for security problems that refers to an appropriate Information Systems (IS) design. I...
-
Chapter and Conference Paper
Extending UML for Designing Secure Data Warehouses
Data Warehouses (DW), Multidimensional (MD) Databases, and On-Line Analytical Processing Applications are used as a very powerful mechanism for discovering crucial business information. Considering the extreme...
-
Chapter and Conference Paper
Designing Secure Databases for OLS
Some Database Management Systems (DBMS) allow to implement multilevel databases, but there are no methodologies for designing these databases. Security must be considered as a fundamental requirement in Inform...