메뉴 건너뛰기




Volumn 20, Issue 2, 2014, Pages 79-106

Showing the benefits of applying a model driven architecture for developing secure OLAP applications

Author keywords

Case study; Confidentiality; Data warehouses; MDA; Model driven; OLAP; Security; SSAS; Transformations

Indexed keywords


EID: 84897040963     PISSN: 0948695X     EISSN: 09486968     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (5)

References (62)
  • 1
    • 33646695493 scopus 로고    scopus 로고
    • YAM2: A multidimensional conceptual model extending UML
    • Abelló, A., J. Samos and F. Saltor. "YAM2: a multidimensional conceptual model extending UML." Information Systems 31(6): 668-677, 2006.
    • (2006) Information Systems , vol.31 , Issue.6 , pp. 668-677
    • Abelló, A.1    Samos, J.2    Saltor, F.3
  • 5
    • 15544379188 scopus 로고    scopus 로고
    • In Search of a Basic Principle for Model Driven Engineering
    • Bézivin, J. "In Search of a Basic Principle for Model Driven Engineering." Upgrade 5(2): 21-24, 2004.
    • (2004) Upgrade , vol.5 , Issue.2 , pp. 21-24
    • Bézivin, J.1
  • 9
    • 84897049944 scopus 로고    scopus 로고
    • Methodological Approaches and Techniques for Model Driven Development of Software Product Lines
    • Braganca, A. (2007). Methodological Approaches and Techniques for Model Driven Development of Software Product Lines.
    • (2007)
    • Braganca, A.1
  • 15
  • 21
    • 84897078968 scopus 로고    scopus 로고
    • ISO/IEC. ISO/IEC 17799-27002 Code of Practice for Information Security Managament
    • ISO/IEC. ISO/IEC 17799-27002 Code of Practice for Information Security Managament. 2005.
    • (2005)
  • 24
    • 79960340272 scopus 로고    scopus 로고
    • Technical Reports in Computer Science. Technische Universitat Dortmund
    • Jurjens, J. and H. Schmidt. UMLsec4UML2 - Adopting UMLsec to Support UML2. http://hdl.handle.net/2003/27602, Technical Reports in Computer Science. Technische Universitat Dortmund. 2011.
    • (2011) UMLsec4UML2 - Adopting UMLsec to Support UML2
    • Jurjens, J.1    Schmidt, H.2
  • 28
    • 33144471694 scopus 로고    scopus 로고
    • A cubic-wise balance approach for privacy perservation in data cubes
    • Liu, Y., S. Sung and H. Xiong. "A cubic-wise balance approach for privacy perservation in data cubes." Information Sciences 176(9): 1215-1240, 2006.
    • (2006) Information Sciences , vol.176 , Issue.9 , pp. 1215-1240
    • Liu, Y.1    Sung, S.2    Xiong, H.3
  • 29
    • 79955143136 scopus 로고    scopus 로고
    • SecureUML: A UML-based modeling language for model-driven security
    • UML 2002. The Unified Modeling Language. Model Engineering, Languages Concepts, and Tools, Dresden, Germany, Springer
    • Lodderstedt, T., D. Basin and J. Doser. SecureUML: A UML-based modeling language for model-driven security. UML 2002. The Unified Modeling Language. Model Engineering, Languages Concepts, and Tools. 5th International Conference, Dresden, Germany, Springer. 2002.
    • (2002) 5th International Conference
    • Lodderstedt, T.1    Basin, D.2    Doser, J.3
  • 31
    • 33749260690 scopus 로고    scopus 로고
    • A UML profile for multidimensional modeling in data warehouses
    • Luján-Mora, S., J. Trujillo and I. Y. Song. "A UML profile for multidimensional modeling in data warehouses." Data & Knowledge Engineering 59(3): 725-769, 2006.
    • (2006) Data & Knowledge Engineering , vol.59 , Issue.3 , pp. 725-769
    • Luján-Mora, S.1    Trujillo, J.2    Song, I.Y.3
  • 32
    • 38149102817 scopus 로고    scopus 로고
    • The WebSA Approach: Applying Model Driven Engineering to Web Applications
    • Meliá, S. and J. Gomez. "The WebSA Approach: Applying Model Driven Engineering to Web Applications." Journal of Web Engineering 5(2): 121-149, 2006.
    • (2006) Journal of Web Engineering , vol.5 , Issue.2 , pp. 121-149
    • Meliá, S.1    Gomez, J.2
  • 33
    • 0141502298 scopus 로고    scopus 로고
    • Model-driven development - Guest editor's introduction
    • Mellor, Clark and Futugami. "Model-driven development - Guest editor's introduction." IEEE Software 20(5): 14-18, 2003.
    • (2003) IEEE Software , vol.20 , Issue.5 , pp. 14-18
    • Mellor, C.1
  • 34
    • 70349931810 scopus 로고    scopus 로고
    • Generating formal specifications for security-critical applications - A model-driven approach
    • Moebius, N., K. Stenzel and W. Reif. Generating formal specifications for security-critical applications - A model-driven approach: 68-74. 2009.
    • (2009) , pp. 68-74
    • Moebius, N.1    Stenzel, K.2    Reif, W.3
  • 37
    • 84897066141 scopus 로고    scopus 로고
    • MG. CWM. Common Warehouse Metamodel. Version v1.1
    • OMG. CWM. Common Warehouse Metamodel. Version v1.1, http://www.omg.org/spec/CWM/1.1. 2003.
    • (2003)
  • 38
    • 84897059825 scopus 로고    scopus 로고
    • OMG. MDA. Model Driven Architecture Guide Version 1.0.1
    • OMG. MDA. Model Driven Architecture Guide Version 1.0.1. 2003.
    • (2003)
  • 43
    • 84897069720 scopus 로고    scopus 로고
    • Heterogeneous Inf. Exchange and Organizational Hubs. H. Bestougeff, Dubois, J.E., Thuraisingham, B. Dordrecht, The Netherlands, Kluwer Academic Publisher
    • Saltor, F., M. Oliva, A. Abelló and J. Samos. Building Secure Data Warehouse Schemas from Federated Information Systems. Heterogeneous Inf. Exchange and Organizational Hubs. H. Bestougeff, Dubois, J.E., Thuraisingham, B. Dordrecht, The Netherlands, Kluwer Academic Publisher: 123-134. 2002.
    • (2002) Building Secure Data Warehouse Schemas From Federated Information Systems , pp. 123-134
    • Saltor, F.1    Oliva, M.2    Abelló, A.3    Samos, J.4
  • 48
    • 84897080809 scopus 로고    scopus 로고
    • SSE-CMM. Systems Security Engineering - Capability Maturity Model
    • SSE-CMM. Systems Security Engineering - Capability Maturity Model. http://www.sse-cmm.org. 2003.
    • (2003)
  • 51
    • 0028730609 scopus 로고
    • Security Issues for Federated Database Systems
    • Thuraisingham, B. "Security Issues for Federated Database Systems." Computer and Security 13(6): 509-525, 1994.
    • (1994) Computer and Security , vol.13 , Issue.6 , pp. 509-525
    • Thuraisingham, B.1
  • 56
    • 51349106453 scopus 로고    scopus 로고
    • Twenty-five years of Mokum: For 25 years of data and knowledge engineering: Correctness by design in relation to MDE and correct protocols in cyberspace
    • van de Riet, R. P. "Twenty-five years of Mokum: For 25 years of data and knowledge engineering: Correctness by design in relation to MDE and correct protocols in cyberspace." Data & Knowledge Engineering 67(2): 293-329, 2008.
    • (2008) Data & Knowledge Engineering , vol.67 , Issue.2 , pp. 293-329
    • van de Riet, R.P.1
  • 57


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.