{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T17:46:45Z","timestamp":1742924805687,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642244421"},{"type":"electronic","value":"9783642244438"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24443-8_10","type":"book-chapter","created":{"date-parts":[[2011,10,6]],"date-time":"2011-10-06T04:34:12Z","timestamp":1317875652000},"page":"71-84","source":"Crossref","is-referenced-by-count":1,"title":["Securing Data Warehouses: A Semi-automatic Approach for Inference Prevention at the Design Level"],"prefix":"10.1007","author":[{"given":"Salah","family":"Triki","sequence":"first","affiliation":[]},{"given":"Hanene","family":"Ben-Abdallah","sequence":"additional","affiliation":[]},{"given":"Nouria","family":"Harbi","sequence":"additional","affiliation":[]},{"given":"Omar","family":"Boussaid","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/3-540-44466-1_28","volume-title":"Data Warehousing and Knowledge Discovery","author":"B.K. Bhargava","year":"2000","unstructured":"Bhargava, B.K.: Security in data warehousing (Invited talk). In: Kambayashi, Y., Mohania, M., Tjoa, A.M. (eds.) DaWaK 2000. LNCS, vol.\u00a01874, pp. 287\u2013288. Springer, Heidelberg (2000)"},{"doi-asserted-by":"crossref","unstructured":"Pernul, G., Priebe, T.: Towards olap security design - survey and research issues. In: 3rd ACM International Workshop on Data Warehousing and OLAP DOLAP 2000, Washington, DC, Novembre 10, pp. 114\u2013121 (2000)","key":"10_CR2","DOI":"10.1145\/355068.355313"},{"key":"10_CR3","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1109\/ARES.2008.86","volume-title":"The Third International Conference on Availability, Reliability and Security ARES 2008","author":"E. Soler","year":"2008","unstructured":"Soler, E., Stefanov, V., Maz\u00f3n, J.-N., Trujillo, J., Fern\u00e1ndez-Medina, E., Piattini, M.: Towards comprehensive requirement analysis for data warehouses: Considering security requirements. In: The Third International Conference on Availability, Reliability and Security ARES 2008, Barcelone, Espagne, pp. 104\u2013111. IEEE Computer Society, Los Alamitos (2008)"},{"key":"10_CR4","first-page":"914","volume-title":"The First International Conference on Availability, Reliability and Security ARES 2006","author":"E. Soler","year":"2006","unstructured":"Soler, E., Villarroel, R., Trujillo, J., Fern\u00e1ndez-Medina, E., Piattini, M.: Representing security and audit rules for data warehouses at the logical level by using the common warehouse metamodel. In: The First International Conference on Availability, Reliability and Security ARES 2006, Vienne, Autriche, pp. 914\u2013921. IEEE Computer Society, Los Alamitos (2006)"},{"unstructured":"Triki, S., Ben-Abdallah, H., Feki, J., Harbi, N.: Modeling Conflict of Interest in the design of secure data warehouses. In: The International Conference on Knowledge Engineering and Ontology Development 2010, Valencia, Espagne, pp. 445\u2013448 (2010)","key":"10_CR5"},{"key":"10_CR6","first-page":"101","volume-title":"The 7th VLDB Conference on Secure Data Management","author":"B. Carlos","year":"2010","unstructured":"Carlos, B., Ignacio, G., Eduardo, F.-M., Juan, T., Mario, P.: Towards the Secure Modelling of OLAP Users\u2019 Behaviour. In: The 7th VLDB Conference on Secure Data Management, Singapore, September 17, pp. 101\u2013112. Springer, Heidelberg (2010)"},{"unstructured":"Steger, J., G\u00fcnzel, H.: Identifying Security Holes in OLAP Applications. In: Proc. Fourteenth Annual IFIP WG 11.3 Working Conference on Database Security, Schoorl (near Amsterdam), The Netherlands, August 21-23 (2000)","key":"10_CR7"},{"unstructured":"Icon Group Ltd. GFK AG: International Competitive Benchmarks and Financial Gap Analysis (Financial Performance Series). Icon Group International (2000)","key":"10_CR8"},{"issue":"1","key":"10_CR9","first-page":"31","volume":"38","author":"R. Villarroel","year":"2006","unstructured":"Villarroel, R., Fern\u00e1ndez-Medina, E., Piattini, M., Trujillo, J.: A uml 2.0\/ocl extension for designing secure data warehouses. Journal of Research and Practice in Information Technology\u00a038(1), 31\u201343 (2006)","journal-title":"Journal of Research and Practice in Information Technology"},{"issue":"2","key":"10_CR10","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1109\/TDSC.2007.70217","volume":"5","author":"L. Haibing","year":"2008","unstructured":"Haibing, L., Yingjiu, L.: Practical Inference Control for Data Cubes. IEEE Transactions on Dependable and Secure Computing\u00a05(2), 87\u201398 (2008)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"doi-asserted-by":"crossref","unstructured":"Cuzzocrea, A.: Privacy Preserving OLAP and OLAP Security. In: Encyclopedia of Data Warehousing and Mining, pp. 1575\u20131158 (2009)","key":"10_CR11","DOI":"10.4018\/978-1-60566-010-3.ch241"},{"issue":"1","key":"10_CR12","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/TKDE.2010.25","volume":"23","author":"N. Zhang","year":"2011","unstructured":"Zhang, N., Zhao, W.: Privacy-Preserving OLAP: An Information-Theoretic Approach. IEEE Transactions on Knowledge and Data Engineering\u00a023(1), 122\u2013138 (2011)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"10_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/3-540-46145-0_11","volume-title":"Data Warehousing and Knowledge Discovery","author":"E. Terzi","year":"2002","unstructured":"Terzi, E., Zhong, Y., Bhargava, B.K., Pankaj, Madria, S.K.: An Algorithm for Building User-Role Profiles in a Trust Environment. In: Kambayashi, Y., Winiwarter, W., Arikawa, M. (eds.) DaWaK 2002. LNCS, vol.\u00a02454, pp. 104\u2013113. Springer, Heidelberg (2002)"},{"key":"10_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1007\/978-3-540-45228-7_33","volume-title":"Data Warehousing and Knowledge Discovery","author":"B.K. Bhargava","year":"2003","unstructured":"Bhargava, B.K., Zhong, Y., Lu, Y.: Fraud Formalization and Detection. In: Kambayashi, Y., Mohania, M., W\u00f6\u00df, W. (eds.) DaWaK 2003. LNCS, vol.\u00a02737, pp. 330\u2013339. Springer, Heidelberg (2003)"},{"doi-asserted-by":"crossref","unstructured":"Golfarelli, M., Rizzi, S.: A Methodological Framework for Data Warehouse Design. In: ACM First International Workshop on Data Warehousing and OLAP DOLAP, Bethesda, Maryland, USA, pp. 3\u20139 (Novembre 1998)","key":"10_CR15","DOI":"10.1145\/294260.294261"},{"doi-asserted-by":"crossref","unstructured":"Feki, J., Nabli, A., Ben-Abdallah, H., Gargouri, F.: An Automatic Data Warehouse Conceptual Design Approach. In: Wang, J. (ed.) Encyclopedia of Data Warehousing and Mining, 2nd edn. (2008)","key":"10_CR16","DOI":"10.4018\/978-1-60566-010-3.ch019"},{"unstructured":"Lujan-Mora, S., Trujillo, J.A.: Comprehensive Method for Data Warehouse Design Fifth International Workshop on Design and Management of Data Warehouses, DMDW 2003, Berlin, Allemagne (Septembre 2003)","key":"10_CR17"}],"container-title":["Lecture Notes in Computer Science","Model and Data Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24443-8_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,9]],"date-time":"2021-12-09T04:31:35Z","timestamp":1639024295000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24443-8_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642244421","9783642244438"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24443-8_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}