{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T04:44:49Z","timestamp":1725597889373},"publisher-location":"Berlin, Heidelberg","reference-count":43,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642227134"},{"type":"electronic","value":"9783642227141"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22714-1_2","type":"book-chapter","created":{"date-parts":[[2011,7,25]],"date-time":"2011-07-25T12:01:51Z","timestamp":1311595311000},"page":"9-18","source":"Crossref","is-referenced-by-count":0,"title":["Evaluation of Approaches for Modeling of Security in Data Warehouses"],"prefix":"10.1007","author":[{"given":"Krishna","family":"Khajaria","sequence":"first","affiliation":[]},{"given":"Manoj","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","first-page":"227","volume-title":"The Future of Software Engineering","author":"P. Devbandu","year":"2000","unstructured":"Devbandu, P., Stubblebine, S.: Software Engineering for Security: a roadmap. In: Finkelstein, A. (ed.) The Future of Software Engineering, pp. 227\u2013239. ACM Press, New York (2000)"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Rizzi, S., Abello, A., Lechtenborger, J., Trujillo, J.: Research in data warehouse modeling and design: dead or alive? In: DOLAP, pp. 3\u201310 (2006)","DOI":"10.1145\/1183512.1183515"},{"key":"2_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/978-3-642-02463-4_19","volume-title":"Conceptual Modeling: Foundations and Applications","author":"L. Chung","year":"2009","unstructured":"Chung, L., do Prado Leite, J.C.S.: On Non-Functional Requirements in Software Engineering. In: Borgida, A.T., Chaudhri, V.K., Giorgini, P., Yu, E.S. (eds.) Conceptual Modeling: Foundations and Applications. LNCS, vol.\u00a05600, pp. 363\u2013379. Springer, Heidelberg (2009)"},{"key":"2_CR4","first-page":"104","volume-title":"Towards Comprehensive Requirement Analysis for Data Warehouses: Considering Security Requirements","author":"E. Soler","year":"2008","unstructured":"Soler, E., Stefanov, V., Mazon, N.J.: Towards Comprehensive Requirement Analysis for Data Warehouses: Considering Security Requirements, pp. 104\u2013111. IEEE, Los Alamitos (2008)"},{"key":"2_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/978-3-540-30464-7_18","volume-title":"Conceptual Modeling \u2013 ER 2004","author":"E. Fern\u00e1ndez-Medina","year":"2004","unstructured":"Fern\u00e1ndez-Medina, E., Trujillo, J., Villarroel, R., Piattini, M.: Extending UML for Designing Secure Data Warehouses. In: Atzeni, P., Chu, W., Lu, H., Zhou, S., Ling, T.-W. (eds.) ER 2004. LNCS, vol.\u00a03288, pp. 217\u2013230. Springer, Heidelberg (2004)"},{"key":"2_CR6","doi-asserted-by":"publisher","first-page":"1270","DOI":"10.1016\/j.dss.2005.10.008","volume":"42","author":"E.F. Medina","year":"2006","unstructured":"Medina, E.F., Trujillo, J., Villarroel, R., Piattini, M.: Access Control and Audit model for the multidimensional modeling of data warehouses. Decision Support Systems\u00a042, 1270\u20131289 (2006)","journal-title":"Decision Support Systems"},{"issue":"1","key":"2_CR7","first-page":"31","volume":"38","author":"R. Villarroel","year":"2006","unstructured":"Villarroel, R., Medina, E.F., Piattini, M.: A UML 2.0\/ OCL Extension for designing Secure Data Warehouses. Journal of Research and Practice in Information Technology\u00a038(1), 31\u201343 (2006)","journal-title":"Journal of Research and Practice in Information Technology"},{"key":"2_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1024","DOI":"10.1007\/11751595_107","volume-title":"Computational Science and Its Applications - ICCSA 2006","author":"R. Villarroel","year":"2006","unstructured":"Villarroel, R., Soler, E., Fern\u00e1ndez-Medina, E., Trujillo, J., Piattini, M.: Using UML Packages for Designing Secure Data Warehouses. In: Gavrilova, M.L., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Lagan\u00e1, A., Mun, Y., Choo, H. (eds.) ICCSA 2006. LNCS, vol.\u00a03982, pp. 1024\u20131034. Springer, Heidelberg (2006)"},{"key":"2_CR9","volume-title":"ARES","author":"E. Soler","year":"2007","unstructured":"Soler, E., Villarroel, R., Trujillo, J., Medina, E.F., Piattini, M.: A Framework for the Development of secure Data Warehouses based on MDA and QVT. In: ARES. IEEE, Los Alamitos (2007)"},{"key":"2_CR10","volume-title":"ARES","author":"E. Soler","year":"2007","unstructured":"Soler, E., Villarroel, R., Trujillo, J., Medina, E.F., Piattini, M.: A set of QVT relations to transform PIM to PSM in the Design of Secure Data Warehouses. In: ARES. IEEE, Los Alamitos (2007)"},{"key":"2_CR11","volume-title":"ARES","author":"E. Soler","year":"2007","unstructured":"Soler, E., Villarroel, R., Trujillo, J., Medina, E.F., Piattini, M.: Application of QVT for the Development of Secure Data Warehouses: A case study. In: ARES. IEEE, Los Alamitos (2007)"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Blanco, C., Guzman, I.G.R., Medina, E.F., Trujillo, J., Piattini, M.: Applying an MDA-based approach to consider security rules in the development of secure DWs. In: ARES, pp. 528\u2013238 (2009)","DOI":"10.1109\/ARES.2009.68"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Blanco, C., Guzman, I.G.R., Medina, E.F., Trujillo, J., Piattini, M.: Including security rules in a MDA approach for secure DWs. In: ARES, pp. 528\u2013238 (2009)","DOI":"10.1109\/ARES.2009.67"},{"key":"2_CR14","first-page":"1586","volume-title":"An Improved Security Framework for Data Warehouse: A Hybrid Approach","author":"S. Ahmad","year":"2010","unstructured":"Ahmad, S., Ahmad, R.: An Improved Security Framework for Data Warehouse: A Hybrid Approach, pp. 1586\u20131590. IEEE, Los Alamitos (2010)"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Golfarelli, M., Rizzi, S.: A Methodological framework for Data Warehouse design. In: Proceedings of the First International Workshop on Data Warehousing and OLAP (1998)","DOI":"10.1145\/294260.294261"},{"key":"2_CR16","unstructured":"Weippl, E.R.: Security in Data Warehouses"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Thuraisingham, B., Kantarciogiu, M., Iyer, S.: Extended RBAC-Based design and Implementation for a Secure Data Warehouse (2007)","DOI":"10.1109\/ARES.2007.86"},{"key":"2_CR18","volume-title":"DEXA 1998","author":"N. Katie","year":"1998","unstructured":"Katie, N., Quirchmayr, G., Schifer, J., Stoba, M., Tjoa, M.: A Prototype Model for Data Warehouse Security based on Metadata. In: DEXA 1998. IEEE Computer Society, Vienna (1998)"},{"key":"2_CR19","unstructured":"Rosenthal, A., Sciore, E.: View Security as the basis for data warehouse security. In: 2nd International Workshop on Design and Management of Data Warehouse, Swedan (2000)"},{"key":"2_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1052","DOI":"10.1007\/978-3-540-88873-4_9","volume-title":"On the Move to Meaningful Internet Systems: OTM 2008","author":"C. Blanco","year":"2008","unstructured":"Blanco, C., Guzman, I.G.R., Medina, E.F., Trujillo, J., Piattini, M.: Automatic generation of secure Multidimensional Code for Data Warehouses: An MDA Approach, In OTM 2008, Part II, LNCS 5332. In: Chung, S. (ed.) OTM 2008, Part II. LNCS, vol.\u00a05332, pp. 1052\u20131068. Springer, Heidelberg (2008)"},{"key":"2_CR21","series-title":"Lecture Notes in Computer Science","first-page":"265","volume-title":"\u00abUML\u00bb 2002 - The Unified Modeling Language. Model Engineering, Concepts, and Tools","author":"S. Luj\u00e1n-Mora","year":"2002","unstructured":"Luj\u00e1n-Mora, S., Trujillo, J., Song, I.-Y.: Extending the UML for Multidimensional Modeling. In: J\u00e9z\u00e9quel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol.\u00a02460, pp. 265\u2013276. Springer, Heidelberg (2002)"},{"key":"2_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/BFb0100985","volume-title":"Advances in Database Technology - EDBT \u201998","author":"L. Cabibbo","year":"1998","unstructured":"Cabibbo, L., Torlone, R.: A Logical Approach to Multidimensional Databases. In: Schek, H.-J., Saltor, F., Ramos, I., Alonso, G. (eds.) EDBT 1998. LNCS, vol.\u00a01377, pp. 183\u2013197. Springer, Heidelberg (1998)"},{"key":"2_CR23","first-page":"231","volume-title":"Proc. of 36th Annual Hawaii Int. Conf. on System Sciences","author":"R. Winter","year":"2003","unstructured":"Winter, R., Strauch, B.: A method for Demand-driven Information Requirements Analysis in DW Projects. In: Proc. of 36th Annual Hawaii Int. Conf. on System Sciences, pp. 231\u2013239. IEEE, Los Alamitos (2003)"},{"key":"2_CR24","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1145\/319757.319780","volume-title":"Proc. of 2nd Int. Workshop on Data Warehousing and OLAP","author":"M. Bohnlein","year":"1999","unstructured":"Bohnlein, M., Ende, U.: Deriving Initial Data Warehouse Structure from the Conceptual Data Models of the Underlying Operation Information Systems. In: Proc. of 2nd Int. Workshop on Data Warehousing and OLAP, pp. 15\u201321. ACM, New York (1999)"},{"key":"2_CR25","unstructured":"Husemann, B., Lechtenborger, J., Vossen, G.: Conceptual Data Warehouse Modeling. In: Proc. of 2nd Int. Workshop on Design and Management of Data Warehouses (2000), CEUR-WS.org"},{"key":"2_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/3-540-46146-9_21","volume-title":"Database and Expert Systems Applications","author":"B. List","year":"2002","unstructured":"List, B., Bruckner, R.M., Machaczek, K., Schiefer, J.: A Comparison of Data Warehouse Development Methodologies Case Study of the Process Warehouse. In: Hameurlain, A., Cicchetti, R., Traunm\u00fcller, R. (eds.) DEXA 2002. LNCS, vol.\u00a02453, pp. 203\u2013215. Springer, Heidelberg (2002)"},{"key":"2_CR27","unstructured":"Moody, D.L., Kortink, M.K.: From Enterprise Models to Dimensional Models: A Methodology for Data Warehouse and Data Mart Design. In: Proc. of 2nd Int. Workshop on Design and Management of Data Warehouses (2000), CEUR-WS.org"},{"issue":"4","key":"2_CR28","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1145\/384189.384190","volume":"10","author":"A. Bonifati","year":"2001","unstructured":"Bonifati, A., Cattaneo, A., Ceri, S., Fuggetta, A., Paraboschi, S.: Designing Data Marts for Data Warehouses. ACM Trans. Softw. Eng. Methodol.\u00a010(4), 452\u2013483 (2001)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"2_CR29","unstructured":"Phipps, C., Davis, K.C.: Automating Data Warehouse Conceptual Schema Design and Evaluation. In: Proc. of 4th Int. Workshop on Design and Management of Data Warehouses, vol.\u00a058, pp. 23\u201332 (2002), CEUR-WS.org"},{"key":"2_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/978-3-540-45228-7_10","volume-title":"Data Warehousing and Knowledge Discovery","author":"B. Vrdoljak","year":"2003","unstructured":"Vrdoljak, B., Banek, M., Rizzi, S.: Designing Web Warehouses from XML Schemas. In: Kambayashi, Y., Mohania, M., W\u00f6\u00df, W. (eds.) DaWaK 2003. LNCS, vol.\u00a02737, pp. 89\u201398. Springer, Heidelberg (2003)"},{"key":"2_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/978-3-540-30076-2_14","volume-title":"Data Warehousing and Knowledge Discovery","author":"M.R. Jensen","year":"2004","unstructured":"Jensen, M.R., Holmgren, T., Pedersen, T.B.: Discovering Multidimensional Structure in Relational Data. In: Kambayashi, Y., Mohania, M., W\u00f6\u00df, W. (eds.) DaWaK 2004. LNCS, vol.\u00a03181, pp. 138\u2013148. Springer, Heidelberg (2004)"},{"key":"2_CR32","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1145\/1097002.1097011","volume-title":"Proc. of 8th Int. Workshop on Data Warehousing and OLAP","author":"P. Giorgini","year":"2005","unstructured":"Giorgini, P., Rizzi, S., Garzetti, M.: Goal-oriented Requirement Analysis for Data Warehouse Design. In: Proc. of 8th Int. Workshop on Data Warehousing and OLAP, pp. 47\u201356. ACM Press, New York (2005)"},{"issue":"3","key":"2_CR33","doi-asserted-by":"publisher","first-page":"1449","DOI":"10.1016\/j.dss.2005.12.001","volume":"42","author":"N. Prat","year":"2006","unstructured":"Prat, N., Akoka, J., Comyn-Wattiau, I.: A UML-based Data Warehouse Design Method. Decision Support Systems\u00a042(3), 1449\u20131473 (2006)","journal-title":"Decision Support Systems"},{"issue":"3","key":"2_CR34","doi-asserted-by":"publisher","first-page":"725","DOI":"10.1016\/j.datak.2007.04.004","volume":"23","author":"J.N. Mazon","year":"2007","unstructured":"Mazon, J.N., Trujillo, J., Lechtenborger, J.: Reconciling Requirement-Driven Data Warehouses with Data Sources Via Multidimensional Normal Forms. Data & Knowledge Engineering\u00a023(3), 725\u2013751 (2007)","journal-title":"Data & Knowledge Engineering"},{"key":"2_CR35","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1145\/1317331.1317334","volume-title":"Proc. of the 10th Int Workshop on Data Warehousing and OLAP","author":"I.Y. Song","year":"2007","unstructured":"Song, I.Y., Khare, R., Dai, B.: SAMSTAR: A Semi-Automated Lexical Method for Generating STAR Schemas from an ER Diagram. In: Proc. of the 10th Int Workshop on Data Warehousing and OLAP, pp. 9\u201316. ACM Press, New York (2007)"},{"issue":"1","key":"2_CR36","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/s102070100003","volume":"1","author":"C.E. Landwehr","year":"2001","unstructured":"Landwehr, C.E.: Computer security. Int. Journal of Information Security\u00a01(1), 13 (2001)","journal-title":"Int. Journal of Information Security"},{"key":"2_CR37","unstructured":"Jajodia, S., Wijesekera, D.: Securing OLAP data cubes against privacy breaches. In: Proc. IEEE Symp. on Security and Privacy, pp. 161\u2013178 (2004)"},{"key":"2_CR38","doi-asserted-by":"crossref","unstructured":"Priebe, T., Pernul, G.: A pragmatic approach to conceptual modeling of OLAP security. In: Proc. ER, pp. 311\u2013324 (2000)","DOI":"10.1007\/3-540-45581-7_24"},{"key":"2_CR39","unstructured":"Fernandez-Medina, E., Trujillo, J., Villaroel, R., Piattini, M.: Extending UML for designing secure data warehouses. In: Decision Support Systems (2006)"},{"key":"2_CR40","volume-title":"Pro. of the ist Int. Conf. on Availability, Reliability and Security","author":"E. Soler","year":"2006","unstructured":"Soler, E., Villarroel, R., Trujillo, J., Medina, E.F., Piattini, M.: Representing Security and audit rules for data warehouse at logical level by using a Common Warehouse Metamodel. In: Pro. of the ist Int. Conf. on Availability, Reliability and Security. IEEE, Los Alamitos (2006)"},{"key":"2_CR41","doi-asserted-by":"crossref","unstructured":"Medina, E.F., Trujillo, J., Villarroel, R., Piattini, M.: Developing secure data warehouses with the UML extension, pp. 826\u2013856 (2006), doi:10.1016\/j.is.2006.07.003","DOI":"10.1016\/j.is.2006.07.003"},{"key":"2_CR42","doi-asserted-by":"crossref","unstructured":"Bhargava, B.: Security in Data Warehousing (Invited Talk). In: Proceedings of the 3rd Data Warehousing and Knowledge Discovery (2000)","DOI":"10.1007\/3-540-44466-1_28"},{"key":"2_CR43","volume-title":"Building the Data Warehouse","author":"H. Inmon","year":"2002","unstructured":"Inmon, H.: Building the Data Warehouse, 3rd edn. John Wiley & Sons, USA (2002)","edition":"3"}],"container-title":["Communications in Computer and Information Science","Advances in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22714-1_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,13]],"date-time":"2019-06-13T05:15:07Z","timestamp":1560402907000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22714-1_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642227134","9783642227141"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22714-1_2","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}