{"title":"A content-based data masking technique for a built-in framework in Business Intelligence platform","authors":"Osama Ali, Abdelkader H. Ouda","doi":"10.1109/CCECE.2017.7946661","DOIUrl":null,"url":null,"abstract":"The implementation of a Business Intelligence (BI) platform in different types of organizations including healthcare, has become an important project. One common implementation is to extract sensitive data from production databases and then load them into an enterprise Data Warehouse (DW). However, the internal privacy breach that occurs when developers, researchers, and testers access the DW is a serious threat that should be taken into consideration.","PeriodicalId":238720,"journal":{"name":"2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCECE.2017.7946661","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
The implementation of a Business Intelligence (BI) platform in different types of organizations including healthcare, has become an important project. One common implementation is to extract sensitive data from production databases and then load them into an enterprise Data Warehouse (DW). However, the internal privacy breach that occurs when developers, researchers, and testers access the DW is a serious threat that should be taken into consideration.