메뉴 건너뛰기




Volumn 32, Issue 6, 2007, Pages 826-856

Developing secure data warehouses with a UML extension

Author keywords

Confidentiality; Data warehouses; Multidimensional conceptual modeling; Secure data warehouses; UML extension

Indexed keywords

CONFIDENTIALITY PROBLEMS; DATA WAREHOUSE (DW) DESIGN; MULTIDIMENSIONAL CONCEPTUAL MODELING; UML EXTENSION;

EID: 34247643088     PISSN: 03064379     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.is.2006.07.003     Document Type: Article
Times cited : (67)

References (59)
  • 1
    • 0002698747 scopus 로고    scopus 로고
    • Information system security management in the new millennium
    • G. Dhillon, J. Backhouse, Information system security management in the new millennium, Commun. ACM 43 (7) (2000) 125-128.
    • (2000) Commun. ACM , vol.43 , Issue.7 , pp. 125-128
    • Dhillon, G.1    Backhouse, J.2
  • 2
    • 84970947585 scopus 로고    scopus 로고
    • Software engineering for security: A roadmap
    • A. Finkelstein (Ed.), ACM Press, New York
    • P. Devanbu, S. Stubblebine, Software engineering for security: a roadmap, in: A. Finkelstein (Ed.), The Future of Software Engineering, ACM Press, New York, 2000, pp. 227-239.
    • (2000) The Future of Software Engineering , pp. 227-239
    • Devanbu, P.1    Stubblebine, S.2
  • 4
    • 0036149234 scopus 로고    scopus 로고
    • Correctness by construction: Developing a commercial secure system
    • A. Hall, R. Chapman, Correctness by construction: developing a commercial secure system, IEEE Software 19 (1) (2002) 18-25.
    • (2002) IEEE Software , vol.19 , Issue.1 , pp. 18-25
    • Hall, A.1    Chapman, R.2
  • 11
    • 0037848141 scopus 로고    scopus 로고
    • Access control: Policies, models, and mechanisms
    • R. Focardi, R. Gorrieri (Eds.), Springer, Berlin
    • P. Samarati, S. De Capitani di Vimercati, Access control: policies, models, and mechanisms, in: R. Focardi, R. Gorrieri (Eds.), Foundations of Security Analysis and Design, Springer, Berlin, 2000, pp. 137-196.
    • (2000) Foundations of Security Analysis and Design , pp. 137-196
    • Samarati, P.1    De Capitani Di Vimercati, S.2
  • 14
    • 84873992648 scopus 로고    scopus 로고
    • Oracle label security
    • 1
    • J. Levinger, Oracle label security. Administrator's guide 10 g. Release 1 (10.1) http://www.csis.gvsu.edu/GeneralInfo/Oracle/network.920/a96578.pdf, 2003.
    • (2003) Administrator's Guide 10 G. Release , vol.1 , Issue.10
    • Levinger, J.1
  • 15
    • 1542285409 scopus 로고    scopus 로고
    • For certain eyes only
    • S. Cota, For certain eyes only, DB2 Mag. 9 (1) (2004) 40-45.
    • (2004) DB2 Mag. , vol.9 , Issue.1 , pp. 40-45
    • Cota, S.1
  • 22
    • 0006822834 scopus 로고    scopus 로고
    • The dimensional fact model: A conceptual model for data warehouses
    • M. Golfarelli, D. Maio, S. Rizzi, The dimensional fact model: a conceptual model for data warehouses, Int. J. Cooper. Inform. Syst. 7 (2-3) (1998) 215-247.
    • (1998) Int. J. Cooper. Inform. Syst. , vol.7 , Issue.2-3 , pp. 215-247
    • Golfarelli, M.1    Maio, D.2    Rizzi, S.3
  • 26
    • 84923069907 scopus 로고    scopus 로고
    • Conceptual multidimensional data model based on object-oriented metacube
    • Las Vegas, Nevada, USA
    • N. Binh, A. Tjoa, Conceptual multidimensional data model based on object-oriented metacube, Proceedings of ACM Simposium on Applied Computing, Las Vegas, Nevada, USA, 2001, pp. 295-300.
    • (2001) Proceedings of ACM Simposium on Applied Computing , pp. 295-300
    • Binh, N.1    Tjoa, A.2
  • 29
    • 26444484310 scopus 로고    scopus 로고
    • OMG, Object management group, OMG document ptc/03-10-14
    • OMG, Object management group. UML 2.0. OCL specification, OMG document ptc/03-10-14. 2004.
    • (2004) UML 2.0. OCL Specification
  • 30
    • 0026260025 scopus 로고
    • Modeling security-relevant data semantics
    • G.W. Smith, Modeling security-relevant data semantics, IEEE Trans Software Eng. 17 (11) (1991) 1195-1203.
    • (1991) IEEE Trans Software Eng. , vol.17 , Issue.11 , pp. 1195-1203
    • Smith, G.W.1
  • 32
    • 0030195327 scopus 로고    scopus 로고
    • MOMT: A multi-level object modeling technique for designing secure database applications
    • D. Marks, P. Sell, B. Thuraisingham, MOMT: a multi-level object modeling technique for designing secure database applications, J. Object-Oriented Program. 9 (4) (1996) 22-29.
    • (1996) J. Object-Oriented Program. , vol.9 , Issue.4 , pp. 22-29
    • Marks, D.1    Sell, P.2    Thuraisingham, B.3
  • 34
    • 79955163100 scopus 로고    scopus 로고
    • UMLsec: Extending UML for secure systems development
    • J. Jézéquel, H. Hussmann, S. Cook (Eds.), Springer, Berlin
    • J. Jü rjens, UMLsec: extending UML for secure systems development, in: J. Jézéquel, H. Hussmann, S. Cook (Eds.), UML 2002-The UnifiedModeling Language, Model Engineering, Concepts and Tools, Springer, Berlin, 2002, pp. 412-425.
    • (2002) UML 2002-The UnifiedModeling Language, Model Engineering, Concepts and Tools , pp. 412-425
    • Jürjens, J.1
  • 35
    • 79955143136 scopus 로고    scopus 로고
    • SecureUML: A UMLbased modeling language for model-driven security
    • Springer. LNCS 2460, Dresden, Germany
    • T. Lodderstedt, D. Basin, J. Doser, SecureUML: A UMLbased modeling language for model-driven security, In Proceedings of The Unified Modeling Language Conference, Springer. LNCS 2460, Dresden, Germany, 2002. pp. 426-441.
    • (2002) Proceedings of the Unified Modeling Language Conference , pp. 426-441
    • Lodderstedt, T.1    Basin, D.2    Doser, J.3
  • 38
    • 0003809443 scopus 로고    scopus 로고
    • Second Ed., Getting Your Models Ready for MDA, Addison Wesley
    • J. Warmer, A. Kleppe, The Object Constraint Language, Second Ed., Getting Your Models Ready for MDA, Addison Wesley, 2003.
    • (2003) The Object Constraint Language
    • Warmer, J.1    Kleppe, A.2
  • 40
    • 84956859694 scopus 로고    scopus 로고
    • A pragmatic approach to conceptual modeling of OLAP security
    • Springer, LNCS 2224, Yokohama, Japan
    • T. Priebe, G. Pernul, A pragmatic approach to conceptual modeling of OLAP security, In Proceedings of 20th Int. Conference on Conceptual Modeling, Springer, LNCS 2224, Yokohama, Japan, 2001, pp. 311-324.
    • (2001) Proceedings of 20th Int. Conference on Conceptual Modeling , pp. 311-324
    • Priebe, T.1    Pernul, G.2
  • 54
    • 70449691856 scopus 로고    scopus 로고
    • Keeping information private with VPD
    • A. Nanda, Keeping Information Private with VPD, Oracle XVIII (2) (2004) 81-84.
    • (2004) Oracle , vol.18 , Issue.2 , pp. 81-84
    • Nanda, A.1
  • 55
    • 28444433118 scopus 로고    scopus 로고
    • Oracle privacy security auditing
    • A. Nanda, D. Burleson, Oracle privacy security auditing, RAMPANT, 2003.
    • (2003) RAMPANT
    • Nanda, A.1    Burleson, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.