메뉴 건너뛰기




Volumn 51, Issue 6, 2009, Pages 1033-1051

An engineering process for developing Secure Data Warehouses

Author keywords

Access control; Data Warehouses; i*; Security requirements engineering

Indexed keywords

ACCESS CONTROL; DIELECTRIC WAVEGUIDES; EMBEDDED SYSTEMS; ENGINEERING; LIFE CYCLE; REQUIREMENTS ENGINEERING; SECURITY SYSTEMS;

EID: 62349117518     PISSN: 09505849     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.infsof.2008.12.003     Document Type: Article
Times cited : (31)

References (53)
  • 3
    • 0141733117 scopus 로고    scopus 로고
    • Modelling access policies using roles in requirements engineering
    • Crook R., Ince D.C., and Nuseibeh B. Modelling access policies using roles in requirements engineering. Information & Software Technology 45 (2003) 979-991
    • (2003) Information & Software Technology , vol.45 , pp. 979-991
    • Crook, R.1    Ince, D.C.2    Nuseibeh, B.3
  • 19
    • 84948988629 scopus 로고    scopus 로고
    • Conflict detection and resolution in access control policy specifications
    • Proceedings of the 5th International Conference on Foundations of Software Science and Computation Structures FoSSaCS'02, Grenoble, France
    • M. Koch, L.V. Mancini, F. Parisi-Presicce, Conflict detection and resolution in access control policy specifications, in: Proceedings of the 5th International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'02), LNCS, vol. 2303, Grenoble, France, 2002, pp. 223-238.
    • (2002) LNCS , vol.2303 , pp. 223-238
    • Koch, M.1    Mancini, L.V.2    Parisi-Presicce, F.3
  • 22
    • 62349129369 scopus 로고    scopus 로고
    • S. Luján, J. Trujillo, A Data Warehouse engineering process, in: Proceedings of the 3rd International Conference on Advances in Information Systems (ADVIS'04), Izmir, Turkey, 2004, pp. 20-22.
    • S. Luján, J. Trujillo, A Data Warehouse engineering process, in: Proceedings of the 3rd International Conference on Advances in Information Systems (ADVIS'04), Izmir, Turkey, 2004, pp. 20-22.
  • 25
    • 41149159850 scopus 로고    scopus 로고
    • An MDA approach for the development of Data Warehouses
    • Mazón J.M., and Trujillo J. An MDA approach for the development of Data Warehouses. Decision Support Systems 45 (2008) 41-58
    • (2008) Decision Support Systems , vol.45 , pp. 41-58
    • Mazón, J.M.1    Trujillo, J.2
  • 26
    • 38349030898 scopus 로고    scopus 로고
    • A model-driven goal-oriented engineering approach for Data Warehouses
    • Proceedings of the International Workshop on Requirements, Intentions and Goals in Conceptual Modelling RIGiM'07, Auckland, New Zealand
    • J.N. Mazón, J. Pardillo, J. Trujillo, A model-driven goal-oriented engineering approach for Data Warehouses, in: Proceedings of the International Workshop on Requirements, Intentions and Goals in Conceptual Modelling (RIGiM'07), LNCS, vol. 4802, Auckland, New Zealand, 2007, pp. 255-264.
    • (2007) LNCS , vol.4802 , pp. 255-264
    • Mazón, J.N.1    Pardillo, J.2    Trujillo, J.3
  • 28
    • 32044433021 scopus 로고    scopus 로고
    • Core security requirements artefacts
    • Technical Report, Department of Computing, The Open University, Milton Keynes, UK
    • J.D. Moffett, C.B. Haley, B. Nuseibeh, Core security requirements artefacts, Technical Report, vol. 23, Department of Computing, The Open University, Milton Keynes, UK, 2004, pp. 1-47.
    • (2004) , vol.23 , pp. 1-47
    • Moffett, J.D.1    Haley, C.B.2    Nuseibeh, B.3
  • 32
    • 62349118266 scopus 로고    scopus 로고
    • OMG, Software & Systems Process Engineering Meta-Model
    • OMG, Software & Systems Process Engineering Meta-Model Specification, ver. 1.1, 2005. .
    • (2005) Specification, ver. 1.1
  • 33
    • 62349137133 scopus 로고    scopus 로고
    • OMG, UML Infrastructure Specification, v2.0, 2006. .
    • OMG, UML Infrastructure Specification, v2.0, 2006. .
  • 35
    • 62349123230 scopus 로고    scopus 로고
    • OMG, MOF Model to Text Transformation Language, OMG Adopted Specification v1.0, 2008. http://www.omg.org/spec/MOFM2T/1.0/PDF.
    • OMG, MOF Model to Text Transformation Language, OMG Adopted Specification v1.0, 2008. http://www.omg.org/spec/MOFM2T/1.0/PDF.
  • 38
    • 33845192335 scopus 로고    scopus 로고
    • Informational scenarios for Data Warehouse requirements elicitation
    • Proceedings of the 23rd International Conference on Conceptual Modeling ER'04, Shanghai, China
    • N. Prakash, Y. Singh, A. Gosain, 2004. Informational scenarios for Data Warehouse requirements elicitation, in: Proceedings of the 23rd International Conference on Conceptual Modeling (ER'04), LNCS, vol. 3288, Shanghai, China, 2006, pp. 205-216.
    • (2004) LNCS , vol.3288 , pp. 205-216
    • Prakash, N.1    Singh, Y.2    Gosain, A.3
  • 43
    • 44949153202 scopus 로고    scopus 로고
    • Building secure data warehouse schemas from federated information systems
    • Bestougeff H., Dubois J.E., and Thuraisingham B. (Eds), Kluwer Academic Publisher., Dordrecht, The Netherlands ISBN: 1-4020-0649-7
    • Saltor F., Oliva M., Abelló A., and Samos J. Building secure data warehouse schemas from federated information systems. In: Bestougeff H., Dubois J.E., and Thuraisingham B. (Eds). Heterogeneous Information Exchange and Organizational Hubs (2002), Kluwer Academic Publisher., Dordrecht, The Netherlands 123-134 ISBN: 1-4020-0649-7
    • (2002) Heterogeneous Information Exchange and Organizational Hubs , pp. 123-134
    • Saltor, F.1    Oliva, M.2    Abelló, A.3    Samos, J.4
  • 44
    • 84964853055 scopus 로고    scopus 로고
    • Access control: Policies, models, and mechanisms
    • International School on Foundations of Security Analysis and Design FOSAD'00, Bertinoro, Italy
    • P. Samarati, S. De Capitani di Vimercati, Access control: policies, models, and mechanisms, in: International School on Foundations of Security Analysis and Design (FOSAD'00), LNCS, vol. 2171, Bertinoro, Italy, 2000, pp. 137-196.
    • (2000) LNCS , vol.2171 , pp. 137-196
    • Samarati, P.1    De Capitani di Vimercati, S.2
  • 45
    • 0002670359 scopus 로고    scopus 로고
    • Attack Trees: Modeling Security Threats
    • Schneier B. Attack Trees: Modeling Security Threats. Dr. Dobb's Journal 24 (1999) 21-29
    • (1999) Dr. Dobb's Journal , vol.24 , pp. 21-29
    • Schneier, B.1
  • 46
    • 0036506787 scopus 로고    scopus 로고
    • Security and management policy specification
    • Sloman M., and Lupu E. Security and management policy specification. IEEE Network 16 (2002) 10-19
    • (2002) IEEE Network , vol.16 , pp. 10-19
    • Sloman, M.1    Lupu, E.2
  • 48
    • 44949248387 scopus 로고    scopus 로고
    • Building a secure star schema in Data Warehouses by an extension of the relational package from CWM
    • Soler E., Trujillo J., Fernandez-Medina E., and Piattini M. Building a secure star schema in Data Warehouses by an extension of the relational package from CWM. Computer Standards & Interfaces 30 (2008) 341-350
    • (2008) Computer Standards & Interfaces , vol.30 , pp. 341-350
    • Soler, E.1    Trujillo, J.2    Fernandez-Medina, E.3    Piattini, M.4
  • 52
    • 84969556051 scopus 로고    scopus 로고
    • R. Winter, B. Strauch, A method for demand-driven information requirements analysis in Data Warehousing projects, in: Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS'03)-Track 8, Big Island, HI, USA, IEEE Computer Society, 2003, pp. 231.1.
    • R. Winter, B. Strauch, A method for demand-driven information requirements analysis in Data Warehousing projects, in: Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS'03)-Track 8, Big Island, HI, USA, IEEE Computer Society, 2003, pp. 231.1.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.