Transforming Conceptual Model into Logical Model for Temporal Data Warehouse Security: A Case Study
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2012, Vol 3, Issue 3
Abstract
Extraction–transformation–loading (ETL) processes are responsible for the extraction of data from several sources, their cleansing, customization and insertion into a data warehouse. Data warehouse often store historical information which is extracted from multiple, heterogeneous, autonomous and distributed data sources, thereby, the survival of the organizations depends on the correct management, security and confidentiality of the information. In this paper, we are using the Model Driven Architecture (MDA) approach to represent logical model requirements for secure Temporal Data Warehouses (TDW). We use the Platform-Independent Model (PIM) which does not include information about specific platforms and technologies. Nowadays, the most crucial issue in MDA is the transformation between a PIM and Platform Specific Models PSM. Thus, OMG defines use the Query/View/Transformation (QVT) language, an approach for expressing these MDA transformations. This paper proposes a set of rules to transform PIM model for secure temporal data warehouse (TDW) to PSM model, we apply the QVT language to the development of a secure data warehouse by means of a case study
Authors and Affiliations
Marwa S. Farhan , Mohamed E. Marie , Laila M. El-Fangary , Yehia K. Helmy
Brain-Controlled for Changing Modular Robot Configuration by Employing Neurosky’s Headset
Currently, the Brain Computer Interfaces (BCI) system was designed mostly to be implemented for control purpose or navigation which are mostly being employed for mobile robot, manipulator robot and humanoid robot by usin...
Evaluation of the Segmentation by Multispectral Fusion Approach with Adaptive Operators : Application to Medical Images
With the development of acquisition image techniques, more and more image data from different sources of image become available. Multi-modality image fusion seeks to combine information from different images to obtain mo...
ATM Security Using Fingerprint Biometric Identifer: An Investigative Study
The growth in electronic transactions has resulted in a greater demand for fast and accurate user identification and authentication. Access codes for buildings, banks accounts and computer systems often use persona...
New Approach of Automatic Modulation Classification based on in Phase-Quadrature Diagram Combined with Artificial Neural Network
Automatic Modulation Classification (AMC) with intelligent system is an attracting area of research due to the development of SDR (Software Defined Radio). This paper proposes a new algorithm based on a combination of k-...
DBpedia based Ontological Concepts Driven Information Extraction from Unstructured Text
In this paper a knowledge base concept driven named entity recognition (NER) approach is presented. The technique is used for information extraction from news articles and linking it with background concepts in knowledge...