R. Accorsi and G. Müller, Preventive inference control in data-centric business models. s.l. : Security and Privacy Workshops (SPW), pp.28-33, 2013.

H. Al-aqrabi, Business intelligence security on the clouds: challenges, solutions and future directions. s.l. : Service Oriented System Engineering (SOSE) IEEE 7th International Symposium on, pp.137-144, 2013.

H. Al-aqrabi, Business intelligence security on the clouds: challenges, solutions and future directions. . s.l. : Service Oriented System Engineering (SOSE), IEEE 7th International Symposium on, pp.137-144, 2015.

D. Arora and U. Kumar, Protecting Sensitive Warehouse Data through UML based Modeling. s.l, Proceedings of the International Conference on Informatics and Analytics, p.31, 2016.

M. Bensaidi, A. Aboulkalam, and A. Marzouk, Politique de contrôle d'accès au cloudcomputing: Recommandation à base de confiance. s.l. : Network Security and Systems (JNS2), National Days of, pp.90-96, 2012.

C. Blanco, Towards the secure modelling of olap users behaviour, 2010.

C. Blanco, An architecture for automatically developing secure OLAP applications from models, Information and Software Technology, vol.59, pp.1-16, 2015.

T. Eavis and A. Althamimi, Olap authentication and authorization via queryre-writing. s.l, The Fourth International Conference on Advances in Databases, Knowledge, and Data Applications, pp.130-139, 2012.

A. El-ouazzani, . N. Harbi, and . H. Badir, Confidentialité des entrepôts de données dans le Cloud Computing: Etat de l'art et Perspectives.. 9ème édition de la conférence sur les Avancées des Systèmes Décisionnels. ASD, 2015.

A. El-ouazzani, S. Rhazlane, . N. Harbi, and . H. Badir, Dynamic management of data warehouse security levels based on user profiles. s.l. : Information Science and Technology (CiSt), 4th IEEE International Colloquium on, pp.59-64, 2016.
URL : https://hal.archives-ouvertes.fr/hal-02055928

A. El-ouazzani, . N. Harbi, and . H. Badir, DYNAMIC CLASSIFICATION OF SENSITIVITY LEVELS OF DATA WAREHOUSE BASED ON USER PROFILES. s.l. : International Journal of Database Management Systems (IJDMS) on, vol.8, issue.6, 2016.

A. El-ouazzani, . N. Harbi, .. H. Badir, . La, . Des-inferences-par et al., , 2017.

A. El-ouazzani, N. Harbi, and H. Badir, User Profile Management to protect sensitive data in Warehouses, INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, vol.9, issue.1, 2018.
URL : https://hal.archives-ouvertes.fr/hal-02059196

E. Fernandez-medina, Access control and audit model for the multidimensional modeling of dws. . s.l. : Decision Support Systems, vol.32, pp.826-856, 1991.

M. Kechar and S. N. , An Access Control System Architecture for XML Data Warehouse Using XACML. s.l, Proceedings of the International Conference on Intelligent Information Processing, p.15, 2015.

. Moussa and H. Badir, Data Warehouse Systems in the Cloud: Rise to the Benchmarking Challenge. s.l, IJ Comput. Appl, vol.20, issue.4, pp.245-254, 2013.

U. M. Naushahi, Profile-Based Access Control in Cloud Computing Environments with applications in Health Care Systems, 2016.

T. Priebe and G. Pernul, A pragmatic approach to conceptual modeling of olap security. . s.l, Proceedings of the 20th International Conference on Conceptual Modeling (ER'01) 2224, pp.311-324, 2001.

I. Ray and I. Ray, Trust-based access control for secure cloud computing, High PerformanceCloud Auditing and Applications, pp.189-213, 2014.

A. Rodriguez, Secure business process model specification through a uml 2.0 activity diagram profile, 2011.

A. S. Rosenthal and . Sciore, View security as the basis for data warehouse security. . s.l. : In DMDW, 2000.

F. Saltor, Building secure data warehouse schemasfrom federated information systems, 2002.
DOI : 10.1007/978-94-017-1769-4_8

E. Soler, V. Stefanov, and N. J. Mazon, Towards Comprehensive Requirement Analysis for Data Warehouses: Considering Security Requirements, pp.104-111, 2008.
DOI : 10.1109/ares.2008.86

URL : http://rua.ua.es/dspace/bitstream/10045/21180/1/ares08-soler-stefanov.pdf

L. Sweeney, k-anonymity: A model for protecting privacy, 2002.

G. Thangaraju and X. A. Rani, Multi User Profile Orient Access Control based Integrity Management for Security Management in Data Warehouse, s.l. : Indian Journal of Science and Technology, issue.22, p.9, 2016.

S. Triki, Sécurisation des entrepôts de données: de la conception à l'exploitation. Lumiere II Lyon : Rapport de thèse, 2013.

J. Trujillo, A UML 2.0 profile to define security requirements for Data Warehouses. . s.l. : Computer Standards & Interfaces, vol.31, pp.969-983, 2009.

R. Villarroel, E. Fernandez-medina, and M. Piattini, uml 2.0/ocl extension for designing secure data warehouses, Journal of Research and Practice in Information Technology, vol.38, pp.31-43, 2006.