Paper title:

Ensuring Data Protection in the SAP Business Information Warehouse: A Case Study

Published in: Issue 3, (Vol. 4) / 2010
Publishing date: 2010-10-26
Pages: 83-87
Author(s): NAGY Ilona Mariana , STEFANACHE Cristina-Maria
Abstract. Today’s business environment is highly vulnerable to private data disclosure considering the permanently increasing amounts of data used in the business and decision-making processes. Ever more measures for data protection are applied by companies regardless of their activity area or size, some of them implying great costs and efforts. This article presents a series of protection measures available in the SAP Business Intelligence and operational systems, in form of authentication and authorizations procedures implemented for an application designed for the efficient management of employees’ data and time scheduling.
Keywords: Data Protection, Data Warehousing, Data Modeling, Analytical System, Authorization Concept, Authentication System.
References:

1. Warigon, S., “Data Warehouse: control and security”, The Ledger, 1997

2. “Modeling the data layer with SAP NetWeaver Business Intelligence”, SAP Press, 2006

3. “Modeling data transformations in SAP NetWeaver Business Intelligence”, SAP Press, 2006

4. Security measures – RFC overview, www.help.sap.com

5. Martin, L., “Protecting your data”, www.infosectoday.com, 2008

6. Tumulak, D., “Enterprise data protection: a security strategy for improving business processes and reducing data losses”, www.networksecurityedge.com, 2010

7. Wagener, M., “Short manual: analysis authorizations”, www.mariewagener.de, 2009

8. Barthel, T.; Honhorst, G.; Glauch, T., “Guideline to data protection and privacy for SAP R/3”, SAP Press, 2001

9. IBM Business Consulting GmbH, “SAP authorization system: design and implementation of authorization concepts for SAP R/3 and SAP Enterprise Portals”, SAP Press, 2003

10. “Authorizations in a SAP BW project – Business Information Warehouse”, SAP AG, 2004

Back to the journal content
Creative Commons License
This article is licensed under a
Creative Commons Attribution-ShareAlike 4.0 International License.
Home | Editorial Board | Author info | Archive | Contact
Copyright JACSM 2007-2024