{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T12:00:52Z","timestamp":1725796852266},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319086071"},{"type":"electronic","value":"9783319086088"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-08608-8_3","type":"book-chapter","created":{"date-parts":[[2014,7,4]],"date-time":"2014-07-04T05:30:34Z","timestamp":1404451834000},"page":"26-37","source":"Crossref","is-referenced-by-count":0,"title":["OSSM: The OLAP Security Specification Model"],"prefix":"10.1007","author":[{"given":"Ahmad","family":"Altamimi","sequence":"first","affiliation":[]},{"given":"Todd","family":"Eavis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","first-page":"94","volume":"5","author":"A. Altamimi","year":"2012","unstructured":"Altamimi, A., Eavis, T.: Securing Access to Data in Business Intelligence Domains. J. International Journal on Advances in Security\u00a05, 94\u2013111 (2012)","journal-title":"J. International Journal on Advances in Security"},{"key":"3_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2020976.2020989","volume":"36","author":"K. Khajaria","year":"2011","unstructured":"Khajaria, K., Kumar, M.: Modeling of security requirements for decision information systems. J. SIGSOFT Softw. Eng. Notes\u00a036, 1\u20134 (2011)","journal-title":"J. SIGSOFT Softw. Eng. Notes"},{"key":"3_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-642-30955-7_10","volume-title":"Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems","author":"M. Dell\u2019Amico","year":"2012","unstructured":"Dell\u2019Amico, M., Serme, G., Idrees, M.S., Santana de Olivera, A., Roudier, Y.: HiPoLDS: A security policy language for distributed systems. In: Askoxylakis, I., P\u00f6hls, H.C., Posegga, J. (eds.) WISTP 2012. LNCS, vol.\u00a07322, pp. 97\u2013112. Springer, Heidelberg (2012)"},{"key":"3_CR4","doi-asserted-by":"crossref","first-page":"619","DOI":"10.3233\/JCS-2009-0364","volume":"18","author":"M. Becker","year":"2010","unstructured":"Becker, M., Fournet, C., Gordon, A.: SecPAL: Design and semantics of a decentralized authorization language. J. Comput. Secur.\u00a018, 619\u2013665 (2010)","journal-title":"J. Comput. Secur."},{"key":"3_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/3-540-44569-2_2","volume-title":"Policies for Distributed Systems and Networks","author":"N. Damianou","year":"2001","unstructured":"Damianou, N., Dulay, N., Lupu, E.C., Sloman, M.: The Ponder Policy Specification Language. In: Sloman, M., Lobo, J., Lupu, E.C. (eds.) POLICY 2001. LNCS, vol.\u00a01995, pp. 18\u201338. Springer, Heidelberg (2001)"},{"key":"3_CR6","first-page":"330","volume-title":"IEEE Workshop on Policies for Distributed Systems and Networks","author":"K. Twidle","year":"2009","unstructured":"Twidle, K., Dulay, N., Lupu, E., Sloman, M.: Ponder2: A Policy System for Autonomous Pervasive Environments. In: IEEE Workshop on Policies for Distributed Systems and Networks, pp. 330\u2013335. IEEE Computer Society, Washington (2009)"},{"key":"3_CR7","first-page":"47","volume":"2","author":"M. Alam","year":"2007","unstructured":"Alam, M., Breu, R., Hafner, M.: Model-Driven Security Engineering for Trust Management in SECTET. J. Journal of Software\u00a02, 47\u201359 (2007)","journal-title":"J. Journal of Software"},{"key":"3_CR8","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MC.2009.56","volume":"42","author":"S. Halvard","year":"2009","unstructured":"Halvard, S., Hamid, M., Boualem, B., Fabio, C.: Modeling Trust Negotiation for Web Services. J. Journal of Computer\u00a042, 54\u201361 (2009)","journal-title":"J. Journal of Computer"},{"key":"3_CR9","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1145\/1559845.1559875","volume-title":"ACM SIGMOD","author":"B. Corcoran","year":"2009","unstructured":"Corcoran, B., Swamy, N., Hicks, M.: Cross-tier, label-based security enforcement for web applications. In: ACM SIGMOD, pp. 269\u2013282. ACM, New York (2009)"},{"key":"3_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/978-3-642-22546-8_18","volume-title":"Rule-Based Reasoning, Programming, and Applications","author":"I. Jacobi","year":"2011","unstructured":"Jacobi, I., Kagal, L., Khandelwal, A.: Rule-Based Trust Assessment on the Semantic Web. In: Bassiliades, N., Governatori, G., Paschke, A. (eds.) RuleML 2011 - Europe. LNCS, vol.\u00a06826, pp. 227\u2013241. Springer, Heidelberg (2011)"},{"key":"3_CR11","first-page":"416","volume-title":"6th ACM Symposium on Information, Computer and Communications Security","author":"A. Felt","year":"2011","unstructured":"Felt, A., Finifter, M., Weinberger, J., Wagner, D.: Diesel: applying privilege separation to database access. In: 6th ACM Symposium on Information, Computer and Communications Security, pp. 416\u2013422. ACM, New York (2011)"},{"key":"3_CR12","first-page":"181","volume-title":"South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries","author":"W. Staden Van","year":"2007","unstructured":"Van Staden, W., Olivier, M.: SQL\u2019s revoke with a view on privacy. In: South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, pp. 181\u2013188. ACM, New York (2007)"},{"key":"3_CR13","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1145\/1698790.1698820","volume-title":"EDBT\/ICDT Workshops","author":"G. Leighton","year":"2009","unstructured":"Leighton, G.: Preserving SQL access control policies over published XML data. In: EDBT\/ICDT Workshops, pp. 185\u2013192. ACM, New York (2009)"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Soler, E., Trujillo, J., Fernandez-Medina, E., Piattini, M.: Application of QVT for the Development of Secure Data Warehouses: A case study. In: Int. Conference on Availability, Reliability and Security, pp. 829\u2013836 (2007)","DOI":"10.1109\/ARES.2007.39"},{"key":"3_CR15","first-page":"69","volume-title":"Int. Conference on Advances in Computing, Communications and Informatics","author":"I. Singh","year":"2012","unstructured":"Singh, I., Kumar, M.: Evaluation of approaches for designing secure data warehouse. In: Int. Conference on Advances in Computing, Communications and Informatics, pp. 69\u201373. ACM, New York (2012)"},{"key":"3_CR16","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1023\/A:1009726021843","volume":"1","author":"G. Jim","year":"1997","unstructured":"Jim, G., Adam, B., Andrew, L., Don, R., Hamid, P.: Data cube: A relational aggregation operator generalizing group-by, cross-tab, and sub-totals. J. Data Mining and Knowledge Discovery.\u00a01, 29\u201353 (1997)","journal-title":"J. Data Mining and Knowledge Discovery."},{"key":"3_CR17","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1145\/233269.233333","volume-title":"ACM SIGMOD","author":"V. Harinarayan","year":"1996","unstructured":"Harinarayan, V., Rajaraman, A., Ullman, J.: Implementing data cubes efficiently. In: ACM SIGMOD, pp. 205\u2013216. ACM, New York (1996)"},{"key":"3_CR18","unstructured":"Mondrian. Pentaho Analysis Services, \n                  \n                    http:\/\/mondrian.pentaho.com"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Linwood, J., Minter, D.: Beginning Hibernate, 2nd edn. Apress (2010)","DOI":"10.1007\/978-1-4302-2851-6"}],"container-title":["Lecture Notes in Computer Science","Databases Theory and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-08608-8_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T06:54:27Z","timestamp":1558940067000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-08608-8_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319086071","9783319086088"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-08608-8_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}