Logo BSU

Please use this identifier to cite or link to this item: https://elib.bsu.by/handle/123456789/9304
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKadan, A.-
dc.date.accessioned2012-05-20T09:16:02Z-
dc.date.available2012-05-20T09:16:02Z-
dc.date.issued2012-
dc.identifier.citationModeling and Simulation : MS'2012 : Proc. of the Intern. Conf., 2—4 May 2012, Minsk, Belarus. - Minsk: Publ. Center of BSU, 2012. - 178 p. - ISBN 978-985-553-010-8.-
dc.identifier.urihttp://elib.bsu.by/handle/123456789/9304-
dc.description.abstractThe article discusses the security methods of intelligent technologies in Business Intelligence (BI) systems. Security technologies are considered taking into account BI four-layer architecture which includes: а) transactional systems layer; b) ETL-procedures – extraction, conversions and data loading layer; c) data warehouses and data marts layer; d) OLAP-tools and user interface layer. The characteristic of the general BI systems security technologies, data storage security strategies and intellectual data mining subsystems and OLAP-tools is resulted. For data mining models and to provide them with the analyst, considered the requirements of access rights to the analyzed information, database backups creation necessity, the requirements to hide sensitive data.ru
dc.language.isoenru
dc.publisherМинск: БГУru
dc.titleSecurity Management of Intelligent Technologies in Business Intelligence Systemsru
dc.typeArticleru
Appears in Collections:2012. Моделирование процессов систем: Труды Международной конференции

Files in This Item:
File Description SizeFormat 
17r 70.pdf179,49 kBAdobe PDFView/Open
Show simple item record Google Scholar



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.