메뉴 건너뛰기




Volumn 5691 LNCS, Issue , 2009, Pages 24-35

Towards a modernization process for secure data warehouses

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATIC TRANSFORMATIONS; DECISION MAKING PROCESS; DESIGN RECOVERY; DEVELOPMENT PROCESS; LAST STAGE; MODEL DRIVEN ARCHITECTURES; OLAP SYSTEM; REVERSE ENGINEERING PROCESS; SECURE DATA; SECURITY CONSTRAINT; SECURITY ISSUES; SECURITY MODEL; SECURITY REQUIREMENTS;

EID: 70349321266     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-03730-6_3     Document Type: Conference Paper
Times cited : (10)

References (26)
  • 1
    • 0031651325 scopus 로고    scopus 로고
    • Reverse engineering of data
    • Aiken, P.H.: Reverse engineering of data. IBM Syst. J. 37(2), 246-269 (1998)
    • (1998) IBM Syst. J , vol.37 , Issue.2 , pp. 246-269
    • Aiken, P.H.1
  • 2
    • 33745471209 scopus 로고    scopus 로고
    • Model Driven Security: From UML Models to Access Control Infrastructures
    • Basin, D., Doser, J., et al.: Model Driven Security: from UML Models to Access Control Infrastructures. ACM Transactions on Software Engineering and Methodology 15(1), 39-91 (2006)
    • (2006) ACM Transactions on Software Engineering and Methodology , vol.15 , Issue.1 , pp. 39-91
    • Basin, D.1    Doser, J.2
  • 3
    • 0034770178 scopus 로고    scopus 로고
    • A Retrospective on Industrial Database Reverse Engineering Projects-Part 1
    • Suttgart, Germany. IEEE Computer Society Press, Los Alamitos
    • Blaha, M.: A Retrospective on Industrial Database Reverse Engineering Projects-Part 1. In: Proceedings of the 8th Working Conference on Reverse Engineering (WCRE 2001), Suttgart, Germany. IEEE Computer Society Press, Los Alamitos (2001)
    • (2001) Proceedings of the 8th Working Conference on Reverse Engineering (WCRE
    • Blaha, M.1
  • 5
    • 70349325296 scopus 로고    scopus 로고
    • New Frontiers of Reverse Engineering
    • Los Alamitos
    • Canfora, G., Penta, M.D.: New Frontiers of Reverse Engineering. IEEE Computer Society, Los Alamitos (2007)
    • (2007) IEEE Computer Society
    • Canfora, G.1    Penta, M.D.2
  • 6
    • 2442466828 scopus 로고    scopus 로고
    • Automatic high-quality reengineering of database programs by abstraction, transformation and reimplementation
    • Cohen, Y., Feldman, Y.A.: Automatic high-quality reengineering of database programs by abstraction, transformation and reimplementation. ACM Trans. Softw. Eng. Methodol. 12(3), 285-316 (2003)
    • (2003) ACM Trans. Softw. Eng. Methodol , vol.12 , Issue.3 , pp. 285-316
    • Cohen, Y.1    Feldman, Y.A.2
  • 8
    • 0025245266 scopus 로고
    • Reverse Engineering and Design Recovery: A Taxonomy
    • Chikofsky, E.J., Cross, J.H.: Reverse Engineering and Design Recovery: A Taxonomy. IEEE Softw. 7(1), 13-17 (1990)
    • (1990) IEEE Softw , vol.7 , Issue.1 , pp. 13-17
    • Chikofsky, E.J.1    Cross, J.H.2
  • 10
    • 33749603462 scopus 로고    scopus 로고
    • Access Control and Audit Model for the Multidimensional Modeling of Data Warehouses
    • Fernández-Medina, E., Trujillo, J., et al.: Access Control and Audit Model for the Multidimensional Modeling of Data Warehouses. Decision Support Systems 42, 1270-1289 (2006)
    • (2006) Decision Support Systems , vol.42 , pp. 1270-1289
    • Fernández-Medina, E.1    Trujillo, J.2
  • 11
    • 34247643088 scopus 로고    scopus 로고
    • Developing secure data warehouses with a UML extension
    • Fernández-Medina, E., Trujillo, J., et al.: Developing secure data warehouses with a UML extension. Information Systems 32(6), 826-856 (2007)
    • (2007) Information Systems , vol.32 , Issue.6 , pp. 826-856
    • Fernández-Medina, E.1    Trujillo, J.2
  • 12
    • 70349319131 scopus 로고    scopus 로고
    • Database reverse engineering: From requirements to CARE tools. Applied Categorical Structures
    • Hainaut, J.-L., Englebert, V., et al.: Database reverse engineering: From requirements to CARE tools. Applied Categorical Structures. SpringerLink. 3 (2004)
    • (2004) SpringerLink , vol.3
    • Hainaut, J.-L.1    Englebert, V.2
  • 14
    • 70349312160 scopus 로고    scopus 로고
    • Khusidman, V., Ulrich, W.: Architecture-Driven Modernization: Transforming the Enterprise. DRAFT V.5, OMG: 7 (2007), http://www.omg.org/docs/ admtf/07-12-01.pdf
    • Khusidman, V., Ulrich, W.: Architecture-Driven Modernization: Transforming the Enterprise. DRAFT V.5, OMG: 7 (2007), http://www.omg.org/docs/ admtf/07-12-01.pdf
  • 15
    • 79955143136 scopus 로고    scopus 로고
    • Lodderstedt, T., Basin, D., Doser, J.: SecureUML: A UML-based modeling language for model-driven security. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, 2460, p. 426. Springer, Heidelberg (2002)
    • Lodderstedt, T., Basin, D., Doser, J.: SecureUML: A UML-based modeling language for model-driven security. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, p. 426. Springer, Heidelberg (2002)
  • 18
    • 70349322170 scopus 로고    scopus 로고
    • OMG. MOF QVT final adopted specification
    • OMG. MOF QVT final adopted specification
  • 19
    • 79957865996 scopus 로고    scopus 로고
    • OMG
    • OMG, ADM Glossary of Definitions and Terms, OMG: 34 (2006), http://adm.omg.org/ADM-Glossary-Spreadsheet-pdf.pdf
    • (2006) Glossary of Definitions and Terms , pp. 34
  • 20
    • 84956859694 scopus 로고    scopus 로고
    • Priebe, T., Pernul, G.: A pragmatic approach to conceptual modeling of OLAP security. In: Kunii, H.S., Jajodia, S., Sølvberg, A. (eds.) ER 2001. LNCS, 2224, p. 311. Springer, Heidelberg (2001)
    • Priebe, T., Pernul, G.: A pragmatic approach to conceptual modeling of OLAP security. In: Kunii, H.S., Jajodia, S., Sølvberg, A. (eds.) ER 2001. LNCS, vol. 2224, p. 311. Springer, Heidelberg (2001)
  • 22
    • 44949248387 scopus 로고    scopus 로고
    • Building a secure star schema in data warehouses by an extension of the relational package from CWM
    • Soler, E., Trujillo, J., et al.: Building a secure star schema in data warehouses by an extension of the relational package from CWM. Computer Standard and Interfaces 30(6), 341-350 (2008)
    • (2008) Computer Standard and Interfaces , vol.30 , Issue.6 , pp. 341-350
    • Soler, E.1    Trujillo, J.2
  • 24
    • 70349309096 scopus 로고    scopus 로고
    • An Engineering Process for Developing Secure Data Warehouses
    • in Press
    • Trujillo, J., Soler, E., et al.: An Engineering Process for Developing Secure Data Warehouses. Information and Software Technology (in Press) (2008)
    • (2008) Information and Software Technology
    • Trujillo, J.1    Soler, E.2
  • 25
    • 70349314090 scopus 로고    scopus 로고
    • A UML 2.0 Profile to define Security Requirements for DataWarehouses. Computer Standard and Interfaces
    • in Press
    • Trujillo, J., Soler, E., et al.: A UML 2.0 Profile to define Security Requirements for DataWarehouses. Computer Standard and Interfaces (in Press) (2008)
    • (2008)
    • Trujillo, J.1    Soler, E.2
  • 26
    • 0030781944 scopus 로고    scopus 로고
    • Towards modelling and reasoning support for early-phase requirements engineering
    • Washington, DC
    • Yu, E.: Towards modelling and reasoning support for early-phase requirements engineering. In: 3rd IEEE International Symposium on Requirements Engineering (RE 1997), Washington, DC (1997)
    • (1997) 3rd IEEE International Symposium on Requirements Engineering (RE
    • Yu, E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.