Engineering privacy requirements in business intelligence applications

Annamaria Chiasera, Fabio Casati, Florian Daniel, Yannis Velegrakis

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Abstract

In this paper we discuss the problem of engineering privacy requirements for business intelligence applications, i.e., of eliciting, modeling, testing, and auditing privacy requirements imposed by the source data owner on the business intelligence applications that use these data to compute reports for analysts. We describe the peculiar challenges of this problem, propose and evaluate different solutions for eliciting and modeling such requirements, and make the case in particular for what we experienced as being the most promising and realistic approach: eliciting and modeling privacy requirements on the reports themselves, rather than on the source or as part of the data warehouse.

Original languageEnglish
Title of host publicationSecure Data Management - 5th VLDB Workshop, SDM 2008, Proceedings
Pages219-228
Number of pages10
Volume5159 LNCS
DOIs
Publication statusPublished - 2008
Externally publishedYes
Event5th VLDB Workshop on Secure Data Management, SDM 2008 - Auckland, New Zealand
Duration: 24 Aug 200824 Aug 2008

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5159 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference5th VLDB Workshop on Secure Data Management, SDM 2008
CountryNew Zealand
CityAuckland
Period24.8.0824.8.08

Fingerprint

Business Intelligence
Competitive intelligence
Privacy
Engineering
Data warehouses
Requirements
Modeling
Auditing
Data Warehouse
Testing
Evaluate

Keywords

  • Business intelligence
  • Compliance
  • Meta-reports
  • Outsourcing
  • Privacy
  • Provenance
  • Reports

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Chiasera, A., Casati, F., Daniel, F., & Velegrakis, Y. (2008). Engineering privacy requirements in business intelligence applications. In Secure Data Management - 5th VLDB Workshop, SDM 2008, Proceedings (Vol. 5159 LNCS, pp. 219-228). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 5159 LNCS). https://doi.org/10.1007/978-3-540-85259-9_15

Engineering privacy requirements in business intelligence applications. / Chiasera, Annamaria; Casati, Fabio; Daniel, Florian; Velegrakis, Yannis.

Secure Data Management - 5th VLDB Workshop, SDM 2008, Proceedings. Vol. 5159 LNCS 2008. p. 219-228 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 5159 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Chiasera, A, Casati, F, Daniel, F & Velegrakis, Y 2008, Engineering privacy requirements in business intelligence applications. in Secure Data Management - 5th VLDB Workshop, SDM 2008, Proceedings. vol. 5159 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 5159 LNCS, pp. 219-228, 5th VLDB Workshop on Secure Data Management, SDM 2008, Auckland, New Zealand, 24.8.08. https://doi.org/10.1007/978-3-540-85259-9_15
Chiasera A, Casati F, Daniel F, Velegrakis Y. Engineering privacy requirements in business intelligence applications. In Secure Data Management - 5th VLDB Workshop, SDM 2008, Proceedings. Vol. 5159 LNCS. 2008. p. 219-228. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-540-85259-9_15
Chiasera, Annamaria ; Casati, Fabio ; Daniel, Florian ; Velegrakis, Yannis. / Engineering privacy requirements in business intelligence applications. Secure Data Management - 5th VLDB Workshop, SDM 2008, Proceedings. Vol. 5159 LNCS 2008. pp. 219-228 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{2955945e69f04e3da9ce8c3fc2f5ae2a,
title = "Engineering privacy requirements in business intelligence applications",
abstract = "In this paper we discuss the problem of engineering privacy requirements for business intelligence applications, i.e., of eliciting, modeling, testing, and auditing privacy requirements imposed by the source data owner on the business intelligence applications that use these data to compute reports for analysts. We describe the peculiar challenges of this problem, propose and evaluate different solutions for eliciting and modeling such requirements, and make the case in particular for what we experienced as being the most promising and realistic approach: eliciting and modeling privacy requirements on the reports themselves, rather than on the source or as part of the data warehouse.",
keywords = "Business intelligence, Compliance, Meta-reports, Outsourcing, Privacy, Provenance, Reports",
author = "Annamaria Chiasera and Fabio Casati and Florian Daniel and Yannis Velegrakis",
year = "2008",
doi = "10.1007/978-3-540-85259-9_15",
language = "English",
isbn = "3540852581",
volume = "5159 LNCS",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "219--228",
booktitle = "Secure Data Management - 5th VLDB Workshop, SDM 2008, Proceedings",

}

TY - GEN

T1 - Engineering privacy requirements in business intelligence applications

AU - Chiasera, Annamaria

AU - Casati, Fabio

AU - Daniel, Florian

AU - Velegrakis, Yannis

PY - 2008

Y1 - 2008

N2 - In this paper we discuss the problem of engineering privacy requirements for business intelligence applications, i.e., of eliciting, modeling, testing, and auditing privacy requirements imposed by the source data owner on the business intelligence applications that use these data to compute reports for analysts. We describe the peculiar challenges of this problem, propose and evaluate different solutions for eliciting and modeling such requirements, and make the case in particular for what we experienced as being the most promising and realistic approach: eliciting and modeling privacy requirements on the reports themselves, rather than on the source or as part of the data warehouse.

AB - In this paper we discuss the problem of engineering privacy requirements for business intelligence applications, i.e., of eliciting, modeling, testing, and auditing privacy requirements imposed by the source data owner on the business intelligence applications that use these data to compute reports for analysts. We describe the peculiar challenges of this problem, propose and evaluate different solutions for eliciting and modeling such requirements, and make the case in particular for what we experienced as being the most promising and realistic approach: eliciting and modeling privacy requirements on the reports themselves, rather than on the source or as part of the data warehouse.

KW - Business intelligence

KW - Compliance

KW - Meta-reports

KW - Outsourcing

KW - Privacy

KW - Provenance

KW - Reports

UR - http://www.scopus.com/inward/record.url?scp=54249099152&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=54249099152&partnerID=8YFLogxK

U2 - 10.1007/978-3-540-85259-9_15

DO - 10.1007/978-3-540-85259-9_15

M3 - Conference contribution

AN - SCOPUS:54249099152

SN - 3540852581

SN - 9783540852582

VL - 5159 LNCS

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 219

EP - 228

BT - Secure Data Management - 5th VLDB Workshop, SDM 2008, Proceedings

ER -