A. Albertini, D. Carminati, B. Ferrari, and E. , An extended access control mechanism exploiting data dependencies, International Journal of Information Security, pp.75-89, 2017.

D. Arora, U. Kumar, C. Blanco, . Fern´fern´, E. Medina et al., Protecting sensitive warehouse data through uml based modeling, Proceedings of the International Conference on Informatics and Analytics, 2010.

D. Chen and Y. He, A study on secure data storage strategy in cloud computing, Journal of Convergence Information Technology, 2010.

S. De-capitani-di-vimercati, Assessing query privileges via safe and efficient permission composition, Proceedings of the 15th ACM conference on Computer and communications secur, 2008.

T. Eavis and A. Althamimi, Olap authentication and authorization via queryre-writing, The Fourth International Conference on Advances in Databases, Knowledge, and Data Applications, pp.130-139, 2012.

E. Fernandez-medina, J. Trujillo, R. Villarroel, and M. Piattini, Access control and audit model for the multidimensional modeling of dws. Decision Support Systems, pp.1270-1289, 2006.

A. Ouazzani, S. Rhazlane, N. Harbi, and H. Badir, Dynamic management of data warehouse security levels based on user profiles. Information Science and Technology (CiSt), 4th IEEE International Colloquium, pp.59-64, 2016.
URL : https://hal.archives-ouvertes.fr/hal-02055928

A. Rosenthal and S. Sciore, View security as the basis for data warehouse security, 2000.

F. Saltor, M. Oliva, A. Abello, and J. Samos, Building secure data warehouse schemas from federated information systems, 2002.

M. Sellami, M. S. Hacid, and M. M. Gammoudi, Inference control in data integration systems, OTM Confederated International Conferences"On the Move to Meaningful Internet Systems, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01981669

E. Soler, J. Trujillo, E. Fernandez-medina, and M. Piattini, Building a secure star schema in data warehouses by an extension of the relational package from cwm, Computer Standards and Interfaces, vol.30, pp.341-350, 2008.

L. Sweeney, k-anonymity: A model for protecting privacy, 2002.

S. Triki, H. Ben-abdallah, O. Boussaid, H. , and N. , Sécurisation des entrepots de données: de la conception a l'exploitation, 2013.

J. Trujillo, E. Soler, C. Blanco, and E. Fernandez-medina, Designing secure data warehouse by using mda and qvt, Journal of Universal Computer Science, vol.8, pp.1607-1641, 2009.

, International Journal of Next-Generation Computing, vol.9, issue.2, 2018.

E. L. Amina and . Ouazzani,

. Mrs and . Amina, El ouazzani is a PhD student from National School of Applied Sciences, Tangier Morocco. His research interests are in cloud computing and the confidentiality confidentiality of data warehouses

. Mr, Salah Ouederrou is a PhD student under the supervision of Prof. Hassan BADIR. His research is centred on security and privacy in Internet of Things domain

. Dr, His research interests are in Multidimensional modeling of complex data, Security of decision-making information systems: Data warehouse access control based on profile management, Data integrity in decision-making information systems, Data mining and security, Confidentiality and availability of data in Cloud Computing

. Dr and . Hassan, Tetouan Morocco , he received Ph.D. degree in Database complex Design from Claude Bernard University Lyon1 in 2004. He studies in the fields of Computer Science, specifically Business Intelligence, Database, optimization, Cloud Computing and Big data, Head of Computer Science and Complex Systems Master -Co-Investigator of Human Heredity and Health African Bioinformatics Network -Head and founding member of the Moroccan Innovation and New trends of Informatio System Society