{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:21:26Z","timestamp":1725517286255},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642322860"},{"type":"electronic","value":"9783642322877"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-32287-7_18","type":"book-chapter","created":{"date-parts":[[2012,8,20]],"date-time":"2012-08-20T06:35:41Z","timestamp":1345444541000},"page":"207-213","source":"Crossref","is-referenced-by-count":7,"title":["Verification of Security Coherence in Data Warehouse Designs"],"prefix":"10.1007","author":[{"given":"Ali","family":"Salem","sequence":"first","affiliation":[]},{"given":"Salah","family":"Triki","sequence":"additional","affiliation":[]},{"given":"Han\u00eane","family":"Ben-Abdallah","sequence":"additional","affiliation":[]},{"given":"Nouria","family":"Harbi","sequence":"additional","affiliation":[]},{"given":"Omar","family":"Boussaid","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","volume-title":"Proc. of DEXA 1997","author":"R. Kirkg\u00f6ze","year":"1997","unstructured":"Kirkg\u00f6ze, R., Katic, N., Stolba, M., Tjoa, A.M.: A Security Concept for OLAP. In: DEXA 1997. IEEE Computer Society, Washington, DC (1997)"},{"key":"18_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/3-540-44466-1_28","volume-title":"Data Warehousing and Knowledge Discovery","author":"B.K. Bhargava","year":"2000","unstructured":"Bhargava, B.K.: Security in Data Warehousing (Invited Talk). In: Kambayashi, Y., Mohania, M., Tjoa, A.M. (eds.) DaWaK 2000. LNCS, vol.\u00a01874, pp. 287\u2013288. Springer, Heidelberg (2000)"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Pernul, G., Priebe, T.: Towards OLAP security design - survey and research issues. In: Proc. of DOLAP 2000, Washington, DC, pp. 114\u2013121 (2000)","DOI":"10.1145\/355068.355313"},{"key":"18_CR4","unstructured":"Steger, J., G\u00fcnzel, H.: Identifying Security Holes in OLAP Applications. In: Proc. DBSec 2000, August 21-23 (2000)"},{"issue":"1","key":"18_CR5","first-page":"31","volume":"38","author":"R. Villarroel","year":"2006","unstructured":"Villarroel, R., Fern\u00e1ndez-Medina, E., Piattini, M., Trujillo, J.: A UML 2.0\/OCL extension for designing secure data warehouses. Journal of Research and Practice in Information Technology\u00a038(1), 31\u201343 (2006)","journal-title":"Journal of Research and Practice in Information Technology"},{"key":"18_CR6","unstructured":"Ferraiolo, D.F.D., Kuhn, D.R., Chandramouli, R.: Role-Based Access Control, 2nd edn. Artech Print on Demand (2007)"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Soler, E., Stefanov, V., Maz\u00f3n, J.-N., Trujillo, J., Fern\u00e1ndez-Medina, E., Piattini, M.: Towards comprehensive requirement analysis for data warehouses: Considering security requirements. In: Proc. of ARES 2008, Barcelone, Espagne, pp. 104\u2013111. IEEE Computer Society (2008)","DOI":"10.1109\/ARES.2008.86"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Cuzzocrea, A.: Privacy Preserving OLAP and OLAP Security. Encyclopedia of Data Warehousing and Mining, 1575\u20131581 (2009)","DOI":"10.4018\/978-1-60566-010-3.ch241"},{"key":"18_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-3-642-15546-8_8","volume-title":"Secure Data Management","author":"C. Blanco","year":"2010","unstructured":"Blanco, C., Fern\u00e1ndez-Medina, E., Trujillo, J., Jurjens, J.: Towards the Secure Modelling of OLAP Users\u2019 Behaviour. In: Jonker, W., Petkovi\u0107, M. (eds.) SDM 2010. LNCS, vol.\u00a06358, pp. 101\u2013112. Springer, Heidelberg (2010)"},{"key":"18_CR10","unstructured":"Triki, S., Ben-Abdallah, H., Feki, J., Harbi, N.: Modeling Conflict of Interest in the design of secure data warehouses. In: Proc. of KEOD 2010, Valencia, Espagne, pp. 445\u2013448 (2010)"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy and Security in Digital Business"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-32287-7_18.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:59:56Z","timestamp":1620129596000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-32287-7_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642322860","9783642322877"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-32287-7_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}