메뉴 건너뛰기




Volumn 58, Issue 10, 2014, Pages 2351-2367

Modernizing Secure OLAP Applications with a Model-Driven Approach

Author keywords

confidentiality; data warehouses; model driven development; modernization; OLAP; reverse engineering; security

Indexed keywords

DATA WAREHOUSES; MODERNIZATION; REVERSE ENGINEERING; SOFTWARE DESIGN;

EID: 84942645909     PISSN: 00104620     EISSN: 14602067     Source Type: Journal    
DOI: 10.1093/comjnl/bxu070     Document Type: Article
Times cited : (3)

References (68)
  • 1
    • 19944386073 scopus 로고    scopus 로고
    • A pragmatic approach to conceptual modeling of olap security
    • Yokohama, Japan. Springer
    • Priebe, T. and Pernul, G. (2001) A Pragmatic Approach to Conceptual Modeling of OLAP Security. 20th Int. Conf. on Conceptual Modeling (ER 2001),Yokohama, Japan. Springer.
    • (2001) 20th Int. Conf. on Conceptual Modeling (ER 2001)
    • Priebe, T.1    Pernul, G.2
  • 3
  • 5
    • 84937616532 scopus 로고    scopus 로고
    • Software engineering for secure systems: Industrial and research perspectives
    • Mouratidis, H. (2011) Software Engineering for Secure Systems: Industrial and Research Perspectives. IGI Global.
    • (2011) IGI Global
    • Mouratidis, H.1
  • 9
    • 0031651325 scopus 로고    scopus 로고
    • Reverse engineering of data
    • Aiken, P. H. (1998) Reverse engineering of data. IBM Syst. J., 37, 246-269.
    • (1998) IBM Syst. J. , vol.37 , pp. 246-269
    • Aiken, P.H.1
  • 10
    • 0034770178 scopus 로고    scopus 로고
    • Aretrospective on industrial database reverse engineering projects-part 1
    • Suttgart, Germany. IEEE Computer Society
    • Blaha, M. (2001)ARetrospective on Industrial Database Reverse Engineering Projects-Part 1. Proc. 8thWorking Conf. on Reverse Engineering (WCRE01), Suttgart, Germany, pp. 136-147. IEEE Computer Society.
    • (2001) Proc. 8thWorking Conf. on Reverse Engineering (WCRE01) , pp. 136-147
    • Blaha, M.1
  • 11
    • 2442466828 scopus 로고    scopus 로고
    • Automatic high-quality reengineering of database programs by abstraction, transformation and reimplementation
    • Cohen, Y. and Feldman, Y. A. (2003) Automatic high-quality reengineering of database programs by abstraction, transformation and reimplementation. ACM Trans. Softw. Eng. Methodol., 12, 285-316.
    • (2003) ACM Trans. Softw. Eng. Methodol. , vol.12 , pp. 285-316
    • Cohen, Y.1    Feldman, Y.A.2
  • 13
    • 35548980380 scopus 로고    scopus 로고
    • Modeldriven multidimensional modeling of secure data warehouses
    • Fernández-Medina, E., Trujillo, J. and Piattini, M. (2007) Modeldriven multidimensional modeling of secure data warehouses. Eur. J. Inf. Syst., 16, 374-389.
    • (2007) Eur. J. Inf. Syst. , vol.16 , pp. 374-389
    • Fernández-Medina, E.1    Trujillo, J.2    Piattini, M.3
  • 16
    • 33745471209 scopus 로고    scopus 로고
    • Model-driven security: From UML models to access control infrastructures
    • Basin, D., Doser, J. and Lodderstedt, T. (2006) Model-driven security: from UML models to access control infrastructures. ACM Trans. Softw. Eng. Methodol., 15, 39-91.
    • (2006) ACM Trans. Softw. Eng. Methodol. , vol.15 , pp. 39-91
    • Basin, D.1    Doser, J.2    Lodderstedt, T.3
  • 18
    • 34548787238 scopus 로고    scopus 로고
    • Model-based security engineering of distributed information systems using umlsec
    • Minneapolis, MN, USA. IEEE
    • Best, B., Jurjens, J. and Nuseibeh, B. (2007) Model-Based Security Engineering of Distributed Information Systems Using UMLsec. Int. Conf. on Software Engineering, Minneapolis, MN, USA, pp. 581-590. IEEE.
    • (2007) Int. Conf. on Software Engineering , pp. 581-590
    • Best, B.1    Jurjens, J.2    Nuseibeh, B.3
  • 23
    • 58849148475 scopus 로고    scopus 로고
    • How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns
    • Compagna, L., Khoury, P., Krausová, A., Massacci, F. and Zannone, N. (2009) How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns. Artif. Intell. Law, 17, 1-30.
    • (2009) Artif. Intell. Law , vol.17 , pp. 1-30
    • Compagna, L.1    Khoury, P.2    Krausová, A.3    Massacci, F.4    Zannone, N.5
  • 24
    • 51349106453 scopus 로고    scopus 로고
    • Twenty-five years of mokum: For 25 years of data and knowledge engineering: Correctness by design in relation to mde and correct protocols in cyberspace
    • van de Riet, R. (2008) Twenty-five years of mokum: for 25 years of data and knowledge engineering: Correctness by design in relation to mde and correct protocols in cyberspace. Data Knowl. Eng., 67, 293-329.
    • (2008) Data Knowl. Eng. , vol.67 , pp. 293-329
    • Van De Riet, R.1
  • 30
    • 33646695493 scopus 로고    scopus 로고
    • Yam2: A multidimensional conceptual model extending uml
    • Abelló, A., Samos, J. and Saltor, F. (2006) Yam2: A multidimensional conceptual model extending uml. Inf. Syst., 31, 668-677.
    • (2006) Inf. Syst. , vol.31 , pp. 668-677
    • Abelló, A.1    Samos, J.2    Saltor, F.3
  • 34
    • 33144471694 scopus 로고    scopus 로고
    • A cubic-wise balance approach for privacy preservation in data cubes
    • Liu, Y., Sung, S. and Xiong, H. (2006) A cubic-wise balance approach for privacy preservation in data cubes. Inf. Sci., 176, 1215-1240.
    • (2006) Inf. Sci. , vol.176 , pp. 1215-1240
    • Liu, Y.1    Sung, S.2    Xiong, H.3
  • 38
    • 0032208607 scopus 로고    scopus 로고
    • Relational database reverse engineering: Algorithms to extract cardinality constraints
    • Soutou, C. (1998) Relational database reverse engineering: Algorithms to extract cardinality constraints. Data Knowl. Eng., 28, 161-207.
    • (1998) Data Knowl. Eng. , vol.28 , pp. 161-207
    • Soutou, C.1
  • 39
    • 0036836975 scopus 로고    scopus 로고
    • Clustering relations into abstract er schemas for database reverse engineering
    • Sousa, P., Pedro-de Jesus, L., Pereira, G. and Brito e Abreu, F. (2002) Clustering relations into abstract er schemas for database reverse engineering. Sci. Comput. Program, 45, 137-153.
    • (2002) Sci. Comput. Program , vol.45 , pp. 137-153
    • Sousa, P.1    Pedro-De Jesus, L.2    Pereira, G.3    Brito Abreu, E.F.4
  • 43
    • 0036888284 scopus 로고    scopus 로고
    • Generating three-tier applications from relational databases: A formal and practical approach
    • Polo, M., Gómez, J., Piattini, M. and Ruiz, F. (2002) Generating three-tier applications from relational databases: a formal and practical approach. Inf. Softw. Technol., 44, 923-941.
    • (2002) Inf. Softw. Technol. , vol.44 , pp. 923-941
    • Polo, M.1    Gómez, J.2    Piattini, M.3    Ruiz, F.4
  • 44
    • 84897040963 scopus 로고    scopus 로고
    • Showing the benefits of applying a modeldriven architecture for developing secure olap applications
    • Blanco, C., de Guzmán, I. G. R., Fernández-Medina, E. and Trujillo, J. (2014) Showing the benefits of applying a modeldriven architecture for developing secure olap applications. J. UCS, 20, 79-106.
    • (2014) J. UCS , vol.20 , pp. 79-106
    • Blanco, C.1    De Guzmán, I.G.R.2    Fernández-Medina, E.3    Trujillo, J.4
  • 46
    • 0030781944 scopus 로고    scopus 로고
    • Towards modelling and reasoning support for early-phase requirements engineering
    • Washington, DC. IEEE
    • Yu, E. (1997) Towards Modelling and Reasoning Support for Early-Phase Requirements Engineering. 3rd IEEE International Symposium on Requirements Engineering (RE'97),Washington, DC, pp. 226-235. IEEE.
    • (1997) 3rd IEEE International Symposium on Requirements Engineering (RE'97) , pp. 226-235
    • Yu, E.1
  • 47
    • 33749603462 scopus 로고    scopus 로고
    • Access control and audit model for the multidimensional modeling of data warehouses
    • Fernández-Medina, E., Trujillo, J., Villarroel, R. and Piattini, M. (2006) Access control and audit model for the multidimensional modeling of data warehouses. Decis. Support Syst., 42, 1270-1289.
    • (2006) Decis. Support Syst. , vol.42 , pp. 1270-1289
    • Fernández-Medina, E.1    Trujillo, J.2    Villarroel, R.3    Piattini, M.4
  • 51
    • 15544379188 scopus 로고    scopus 로고
    • In search of a basic principle for model-driven engineering
    • Bézivin, J. (2004) In search of a basic principle for model-driven engineering. Upgrade, 5, 21-24.
    • (2004) Upgrade , vol.5 , pp. 21-24
    • Bézivin, J.1
  • 52
    • 0141502298 scopus 로고    scopus 로고
    • Model-driven development- guest editor's introduction
    • Mellor, Clark, and Futugami (2003) Model-driven development- guest editor's introduction. IEEE Softw., 20, 14-18.
    • (2003) IEEE Softw. , vol.20 , pp. 14-18
    • Clark, M.1    Futugami2
  • 54
    • 29144529186 scopus 로고    scopus 로고
    • Applying mda in Traditional Database-Based Application Development
    • Coventry, UK. IEEE
    • Li, B., Liu, S. and Yu, Z. (2005) Applying mda in Traditional Database-Based Application Development. Int. Conf. on Computer Supported Cooperative Work in Design, Coventry, UK, pp. 1038-1041. IEEE.
    • (2005) Int. Conf. on Computer Supported Cooperative Work in Design , pp. 1038-1041
    • Li, B.1    Liu, S.2    Yu, Z.3
  • 55
    • 36048975359 scopus 로고    scopus 로고
    • Evaluation of mda-psm Database Model Quality in the Context of Selected Non-Functional Requirements
    • IEEE, Szklarska Poreba, Poland
    • Dubielewicz, I., Hnatkowska, B., Huzar, Z. and Tuzinkiewicz, L. (2007) Evaluation of mda-psm Database Model Quality in the Context of Selected Non-Functional Requirements. Int. Conf. on Dependability of Computer Systems, Szklarska Poreba, Poland, pp. 19-26. IEEE.
    • (2007) Int. Conf. on Dependability of Computer Systems , pp. 19-26
    • Dubielewicz, I.1    Hnatkowska, B.2    Huzar, Z.3    Tuzinkiewicz, L.4
  • 56
    • 35248878658 scopus 로고    scopus 로고
    • Model transformation for object-relational database development
    • ACM, Seoul, Korea
    • Vara, J., Vela, B., Cavero, J. and Marcos, E. (2007) Model Transformation for Object-Relational Database Development. ACM Symposium on Applied Computing, Seoul, Korea, pp. 1012-1019. ACM.
    • (2007) ACM Symposium on Applied Computing , pp. 1012-1019
    • Vara, J.1    Vela, B.2    Cavero, J.3    Marcos, E.4
  • 57
    • 41149159850 scopus 로고    scopus 로고
    • An mda approach for the development of data warehouses
    • Mazón, J.-N. and Trujillo, J. (2008) An mda approach for the development of data warehouses. Decis. Support Syst., 45, 41-58.
    • (2008) Decis. Support Syst. , vol.45 , pp. 41-58
    • Mazón, J.-N.1    Trujillo, J.2
  • 60
    • 38149102817 scopus 로고    scopus 로고
    • The websa approach: Applying model-driven engineering to web applications
    • Meliá, S. and Gomez, J. (2006) The websa approach: applying model-driven engineering to web applications. J. Web Eng., 5, 121-149.
    • (2006) J. Web Eng. , vol.5 , pp. 121-149
    • Meliá, S.1    Gomez, J.2
  • 62
    • 39749089267 scopus 로고    scopus 로고
    • Transform from models to service description based on mda
    • GuangZhou, China. IEEE
    • Yu, B., Zhang, C. and Zhao, Y. (2006) Transform from Models to Service Description Based on mda. Asia-Pacific Conference on Services Computing, GuangZhou, China, pp. 605-608. IEEE.
    • (2006) Asia-Pacific Conference on Services Computing , pp. 605-608
    • Yu, B.1    Zhang, C.2    Zhao, Y.3
  • 67
    • 33749078294 scopus 로고    scopus 로고
    • A component-based uml profile to model embedded real-time systems designed by the mda approach
    • Hong Kong, China. IEEE
    • Lu, S., Halang, W. A. and Zhang, L. (2005) A Component-Based uml Profile to Model Embedded Real-Time Systems Designed by the mda Approach. Int. Conf. on Embedded and Real-Time Computing Systems and Applications, Hong Kong, China, pp. 563-566. IEEE.
    • (2005) Int. Conf. on Embedded and Real-Time Computing Systems and Applications , pp. 563-566
    • Lu, S.1    Halang, W.A.2    Zhang, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.