Skip to main content
Top

2021 | OriginalPaper | Chapter

Secure Business Intelligence

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Enterprise organizations have relied on correct data in business intelligence visualization and analytics for years. Before the adoption of the cloud, most data visualizations were executed and displayed inside enterprise applications. As application architectures have moved to the cloud, many cloud services now provide business intelligence functionality. The services are delivered in a way that is more accessible for end users using web browsers, mobile devices, data feeds, and email attachments. Unfortunately, along with all the benefits of the cloud business intelligence services comes complexity. The complexity can lead to slow response times, errors, data leakage, and integrity issues. An information technology department or service provider must get ahead of the problems by automating the execution of reports to know when availability or integrity issues exist and dealing with those issues before they turn into end-user trouble tickets. The development of the business intelligence code must also include tools to express the privacy requirements of the data exposed in the report or document. In this paper, we present two tools we developed to help guarantee the confidentiality, integrity, and availability of business intelligence. The first tool is our client-side correctness programming language that allows execution against many cloud documents and business intelligence services. The secBIML language enables issues to be proactively discovered before the end-users experience the problems. The other tool in our work is a server-side programming language that allows the creation of reports and business documents. The secBIrpts language enables an organization to express their privacy requirements utilizing a hierarchical security model.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference B. Evelson, Topic Overview: Business Intelligence (Forrester, 2018) B. Evelson, Topic Overview: Business Intelligence (Forrester, 2018)
2.
go back to reference A. Olmsted, Secure business intelligence markup language (secBIML) for the cloud, in Proceedings of The Eleventh International Conference on Cloud Computing, GRIDs, and Virtualization, Nice, France, 2020 A. Olmsted, Secure business intelligence markup language (secBIML) for the cloud, in Proceedings of The Eleventh International Conference on Cloud Computing, GRIDs, and Virtualization, Nice, France, 2020
3.
go back to reference P. Sack, E. Austin, S. Gaetjen, Mandatory access control label security. Patent US7831570B2, 2010 P. Sack, E. Austin, S. Gaetjen, Mandatory access control label security. Patent US7831570B2, 2010
4.
go back to reference I. Letca, A. Coelho, V.S.K. Kurapati, R. Sudhakar, D. Savage, A. Sanghvi, J. Soon Lim, Measuring actual end user performance and availability of web applications. Patent US 8,938,721 B2, 2015 I. Letca, A. Coelho, V.S.K. Kurapati, R. Sudhakar, D. Savage, A. Sanghvi, J. Soon Lim, Measuring actual end user performance and availability of web applications. Patent US 8,938,721 B2, 2015
5.
go back to reference E.F. Codd, A relational model of data for large shared data banks. Commun. ACM 13(6), 377–387 (1970)CrossRef E.F. Codd, A relational model of data for large shared data banks. Commun. ACM 13(6), 377–387 (1970)CrossRef
6.
go back to reference N. Khoury, P. Zavarsky, D. Lindskog, R. Ruhl, An analysis of black-box web application security scanners against stored SQL injection, in 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing, Boston, MA, 2011 N. Khoury, P. Zavarsky, D. Lindskog, R. Ruhl, An analysis of black-box web application security scanners against stored SQL injection, in 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing, Boston, MA, 2011
7.
go back to reference S. Osborn, R. Sandhu, Q. Munawer, Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Trans. Inf. Syst. Secur. 3(2), 85–106 (2000)CrossRef S. Osborn, R. Sandhu, Q. Munawer, Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Trans. Inf. Syst. Secur. 3(2), 85–106 (2000)CrossRef
Metadata
Title
Secure Business Intelligence
Author
Aspen Olmsted
Copyright Year
2021
DOI
https://doi.org/10.1007/978-3-030-69984-0_79