The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Background/Objectives: The Aim of this research work to demonstrate that the security enhancement of data warehousing, the methods face major challenges in integrity management and have the responsibility to restrict the unauthorized user. Methods/Statistical Analysis: There are many access control methods discussed earlier for the problem of integrity management, and some of them have been discussed using the user profiles. Still they suffer from the problem of efficiency in integrity management. Findings: To overcome such issues, in this paper a multi-user profile orient access depths measure based integrity management is proposed. The method maintains a set of Meta data which keep track of data objects in a hierarchical manner according to their importance and sensitivity of the data. The method first identifies a set of objects being specified from the input query and the sensitive tree; the method computes the access depthness measure. The access depthness is computed based on the level of objects being called and the access level the user has been given and the number of objects the user has access. Application/Improvement: Based on computed access depths measure user query is being processed, and the method improves the performance of integrity management.

Keywords

Access Depth Measure, Access Control, Data warehouse Security, Integrity Management, Multi User Profile.
User