Data warehouses are widely used in the fields of Big Data and Business Intelligence for statistics on business activity. Their use through multidimensional queries allows to have aggregated results of the data. The confidential nature of certain data leads malicious people to use means of deduction of this information. Among these means are data inference methods. To solve these security problems, the researchers have proposed several solutions based on the architecture of the warehouses, the design phase, the cuboids of a data cube and the materialized views of multidimensional queries. In this work, we propose a mechanism for detecting inference in data warehouses. The objective of this approach is to highlight partial inferences during ...
Today’s databases store information with sensitivity levels that range from public to highly sensiti...
International audienceNowadays, users are permanently prompted to create web accounts when they buy ...
Abstract. Access control mechanisms are commonly used to provide control over who may access sensiti...
International audienceData warehouses contain sensitive data that must be secured in two ways: by de...
International audienceThe detections of inferences between multidimensional queries tend to be more ...
Abstract: Data Warehouses (DW) manage enterprise information that is queried for decision making pur...
Abstract—Online Analytical Processing (OLAP) has become an increasingly important and prevalent comp...
Data Warehouses (DW) manage enterprise information that is queried for decision making purposes by u...
Publicly accessible data warehouses are an indispensable resource for data analysis. But they also p...
Les entrepôts des données centralisent des données critiques et sensibles qui sont nécessaires pour ...
This paper addresses the inference problem in on-line analytical processing (OLAP) systems. The in-f...
Decision makers query enterprise information stored in Data Warehouses (DW) by using tools (such as ...
Today’s databases store information with sensitivity levels that range from public to highly sensiti...
OLAP cubes enable aggregation-centric analysis of transactional data by shaping data records into me...
The basic inference problem is defined as follows: For a finite set X equals left brace x//1,. . . ,...
Today’s databases store information with sensitivity levels that range from public to highly sensiti...
International audienceNowadays, users are permanently prompted to create web accounts when they buy ...
Abstract. Access control mechanisms are commonly used to provide control over who may access sensiti...
International audienceData warehouses contain sensitive data that must be secured in two ways: by de...
International audienceThe detections of inferences between multidimensional queries tend to be more ...
Abstract: Data Warehouses (DW) manage enterprise information that is queried for decision making pur...
Abstract—Online Analytical Processing (OLAP) has become an increasingly important and prevalent comp...
Data Warehouses (DW) manage enterprise information that is queried for decision making purposes by u...
Publicly accessible data warehouses are an indispensable resource for data analysis. But they also p...
Les entrepôts des données centralisent des données critiques et sensibles qui sont nécessaires pour ...
This paper addresses the inference problem in on-line analytical processing (OLAP) systems. The in-f...
Decision makers query enterprise information stored in Data Warehouses (DW) by using tools (such as ...
Today’s databases store information with sensitivity levels that range from public to highly sensiti...
OLAP cubes enable aggregation-centric analysis of transactional data by shaping data records into me...
The basic inference problem is defined as follows: For a finite set X equals left brace x//1,. . . ,...
Today’s databases store information with sensitivity levels that range from public to highly sensiti...
International audienceNowadays, users are permanently prompted to create web accounts when they buy ...
Abstract. Access control mechanisms are commonly used to provide control over who may access sensiti...