{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:14:22Z","timestamp":1729620862881,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1109\/aiccsa.2015.7507207","type":"proceedings-article","created":{"date-parts":[[2016,8,11]],"date-time":"2016-08-11T20:26:39Z","timestamp":1470947199000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Considering dependability requirements in the context of Decision Support Systems"],"prefix":"10.1109","author":[{"given":"Imane","family":"Hilal","sequence":"first","affiliation":[]},{"given":"Nadia","family":"Afifi","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Ouzzif","sequence":"additional","affiliation":[]},{"given":"Hicham","family":"Belhaddaoui","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2011.179"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2347696.2347705"},{"key":"ref12","first-page":"7","article-title":"Towards Data Security in Affordable Data Warehouses","author":"vieir","year":"2008","journal-title":"7th European Dependable Computing Conference (EDCC-7)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2006.12.006"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2008.86"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1504\/IJBIDM.2010.031283"},{"article-title":"Advancing Clinical Decision Support: Key Lessons In Clinical Decision Support Implementation","year":"2010","author":"byrne","key":"ref16"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"1223","DOI":"10.1001\/jama.293.10.1223","article-title":"Effects of Computerized Clinical Decision Support Systems on Practitioner Performance","volume":"293","author":"adhikari","year":"2005","journal-title":"J Amer Med Assoc"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1001\/archinte.163.12.1409"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1111\/1468-0009.12023"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/11546849_9"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2487766.2487768"},{"article-title":"Approved Cryptographic Algorithms Good Practice Guideline","year":"2012","author":"wood","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICMCS.2014.6911213"},{"key":"ref6","first-page":"2","article-title":"Etat de l'art sur le d&#x00E9;veloppement logiciel bas&#x00E9; sur les transformations de mod&#x00E8;les","volume":"29","author":"diaw","year":"2010","journal-title":"Num&#x00E9;ro sp&#x00E9;cial TSI - Ing&#x00E9;nierie Dirig&#x00E9;e par les Mod&#x00E8;les"},{"journal-title":"MDA en action Ing&#x00E9;nierie logicielle guid&#x00E9;e par les mod&#x00E8;les","year":"2011","author":"blanc","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"year":"2011","key":"ref7","article-title":"UCCD Benefit Guide - Start Here"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSA.2014.54"},{"key":"ref9","first-page":"703","article-title":"An integrated approach to recovery and high availability in an updatable, distributed data warehouse","author":"lau","year":"2006","journal-title":"Proceedings of the 32nd international conference on Very large data bases"},{"key":"ref1","first-page":"1","article-title":"From User Requirements to Conceptual Design in Data Warehouse Design","author":"golfarelli","year":"2009","journal-title":"Data Warehousing Design and Advanced Engineering Applications Methods for Complex Construction"},{"key":"ref20","first-page":"414","article-title":"On Implementing Clinical Decision Support: Achieving Scalability and Maintainability by Combining Business Rules and Ontologies","volume":"2006","author":"kashyap","year":"2006","journal-title":"AMIA Annu Symp Proc"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02463-4_19"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2345396.2345408"},{"journal-title":"Data Warehouse Design Modern Principles and Methodologies","year":"2009","author":"golfarelli","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30469-2_25"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/978-3-642-19379-8_4","article-title":"Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization","author":"waters","year":"2011","journal-title":"Public Key Cryptography-PKC 2011"},{"key":"ref25","article-title":"Towards an integrated aspect-oriented modeling approach for software architecture design","volume":"6","author":"krechetov","year":"2006","journal-title":"8th Workshop on Aspect-Oriented Modelling (AOM 06) AOSD"}],"event":{"name":"2015 IEEE\/ACS 12th International Conference of Computer Systems and Applications (AICCSA)","start":{"date-parts":[[2015,11,17]]},"location":"Marrakech, Morocco","end":{"date-parts":[[2015,11,20]]}},"container-title":["2015 IEEE\/ACS 12th International Conference of Computer Systems and Applications (AICCSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7502233\/7507087\/07507207.pdf?arnumber=7507207","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T16:32:56Z","timestamp":1498321976000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7507207\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/aiccsa.2015.7507207","relation":{},"subject":[],"published":{"date-parts":[[2015,11]]}}}