Databases Reference
In-Depth Information
propagate data among the warehouses and to ensure that the data is acces-
sible only to those who are authorized to view, modify, or obtain that data.
Four major subcomponents are defined within control: data control, pro-
cess control, user control, and standards.
Data Control
The data control component contains the rules that are used to manage
the data in the enterprise warehouse. This component uses enterprise data
model and data owner information and applies to both the enterprise ware-
house and the business information directory data contents.
The data models contain information that allows the mapping of the data
selected from the optimal operational sources to the enterprise warehouse
data structures. This mapping is to both the logical and physical views of the
data and includes optimum source, enterprise data warehouse, and client
data warehouse locations. Through the use of these models and the pro-
cesses that build the enterprise warehouse, data redundancy can be con-
trolled and the integrity of the data maintained.
Process Control
The process control component contains the rules that are used to man-
age the data processes that propagate and deliver the data in the enter-
prise warehouse. This component incorporates data process models and
application owner information and applies to both the enterprise ware-
house and the business information directory.
The process models are used to identify the flow of data from the oper-
ational systems into the enterprise warehouse. They can identify the pro-
cesses that are required to perform a task, the sequence in which the tasks
are executed, the status of tasks, the scheduling information to be used,
and execution initiation for the tasks.
Additional information that is available from the process models pertains
to the priority of processing in the event multiple sources of information are
available, to the indications of the data's current state, and to the identifica-
tion of information that can be shared, or reused, by other processes.
User Control
User control is composed of security and registration functions and any
associated profiles. Additional security is required to control access at the
specific data element level. This control is usually managed at the applica-
tion level today and is typically controlled by a job, data set, or terminal
log-on classification with authorization codes for access.
Search WWH ::




Custom Search