TY - GEN
T1 - Engineering privacy requirements in business intelligence applications
AU - Chiasera, Annamaria
AU - Casati, Fabio
AU - Daniel, Florian
AU - Velegrakis, Yannis
PY - 2008
Y1 - 2008
N2 - In this paper we discuss the problem of engineering privacy requirements for business intelligence applications, i.e., of eliciting, modeling, testing, and auditing privacy requirements imposed by the source data owner on the business intelligence applications that use these data to compute reports for analysts. We describe the peculiar challenges of this problem, propose and evaluate different solutions for eliciting and modeling such requirements, and make the case in particular for what we experienced as being the most promising and realistic approach: eliciting and modeling privacy requirements on the reports themselves, rather than on the source or as part of the data warehouse.
AB - In this paper we discuss the problem of engineering privacy requirements for business intelligence applications, i.e., of eliciting, modeling, testing, and auditing privacy requirements imposed by the source data owner on the business intelligence applications that use these data to compute reports for analysts. We describe the peculiar challenges of this problem, propose and evaluate different solutions for eliciting and modeling such requirements, and make the case in particular for what we experienced as being the most promising and realistic approach: eliciting and modeling privacy requirements on the reports themselves, rather than on the source or as part of the data warehouse.
KW - Business intelligence
KW - Compliance
KW - Meta-reports
KW - Outsourcing
KW - Privacy
KW - Provenance
KW - Reports
UR - http://www.scopus.com/inward/record.url?scp=54249099152&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=54249099152&partnerID=8YFLogxK
U2 - 10.1007/978-3-540-85259-9_15
DO - 10.1007/978-3-540-85259-9_15
M3 - Conference contribution
AN - SCOPUS:54249099152
SN - 3540852581
SN - 9783540852582
VL - 5159 LNCS
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 219
EP - 228
BT - Secure Data Management - 5th VLDB Workshop, SDM 2008, Proceedings
T2 - 5th VLDB Workshop on Secure Data Management, SDM 2008
Y2 - 24 August 2008 through 24 August 2008
ER -