Preventive inference control in data-centric business models. s.l. : Security and Privacy Workshops (SPW), pp.28-33, 2013. ,
Business intelligence security on the clouds: challenges, solutions and future directions. s.l. : Service Oriented System Engineering (SOSE) IEEE 7th International Symposium on, pp.137-144, 2013. ,
Business intelligence security on the clouds: challenges, solutions and future directions. . s.l. : Service Oriented System Engineering (SOSE), IEEE 7th International Symposium on, pp.137-144, 2015. ,
Protecting Sensitive Warehouse Data through UML based Modeling. s.l, Proceedings of the International Conference on Informatics and Analytics, p.31, 2016. ,
Politique de contrôle d'accès au cloudcomputing: Recommandation à base de confiance. s.l. : Network Security and Systems (JNS2), National Days of, pp.90-96, 2012. ,
Towards the secure modelling of olap users behaviour, 2010. ,
An architecture for automatically developing secure OLAP applications from models, Information and Software Technology, vol.59, pp.1-16, 2015. ,
Olap authentication and authorization via queryre-writing. s.l, The Fourth International Conference on Advances in Databases, Knowledge, and Data Applications, pp.130-139, 2012. ,
, Confidentialité des entrepôts de données dans le Cloud Computing: Etat de l'art et Perspectives.. 9ème édition de la conférence sur les Avancées des Systèmes Décisionnels. ASD, 2015.
Dynamic management of data warehouse security levels based on user profiles. s.l. : Information Science and Technology (CiSt), 4th IEEE International Colloquium on, pp.59-64, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-02055928
, DYNAMIC CLASSIFICATION OF SENSITIVITY LEVELS OF DATA WAREHOUSE BASED ON USER PROFILES. s.l. : International Journal of Database Management Systems (IJDMS) on, vol.8, issue.6, 2016.
, , 2017.
User Profile Management to protect sensitive data in Warehouses, INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, vol.9, issue.1, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-02059196
Access control and audit model for the multidimensional modeling of dws. . s.l. : Decision Support Systems, vol.32, pp.826-856, 1991. ,
An Access Control System Architecture for XML Data Warehouse Using XACML. s.l, Proceedings of the International Conference on Intelligent Information Processing, p.15, 2015. ,
Data Warehouse Systems in the Cloud: Rise to the Benchmarking Challenge. s.l, IJ Comput. Appl, vol.20, issue.4, pp.245-254, 2013. ,
Profile-Based Access Control in Cloud Computing Environments with applications in Health Care Systems, 2016. ,
A pragmatic approach to conceptual modeling of olap security. . s.l, Proceedings of the 20th International Conference on Conceptual Modeling (ER'01) 2224, pp.311-324, 2001. ,
Trust-based access control for secure cloud computing, High PerformanceCloud Auditing and Applications, pp.189-213, 2014. ,
Secure business process model specification through a uml 2.0 activity diagram profile, 2011. ,
View security as the basis for data warehouse security. . s.l. : In DMDW, 2000. ,
Building secure data warehouse schemasfrom federated information systems, 2002. ,
DOI : 10.1007/978-94-017-1769-4_8
Towards Comprehensive Requirement Analysis for Data Warehouses: Considering Security Requirements, pp.104-111, 2008. ,
DOI : 10.1109/ares.2008.86
URL : http://rua.ua.es/dspace/bitstream/10045/21180/1/ares08-soler-stefanov.pdf
k-anonymity: A model for protecting privacy, 2002. ,
Multi User Profile Orient Access Control based Integrity Management for Security Management in Data Warehouse, s.l. : Indian Journal of Science and Technology, issue.22, p.9, 2016. ,
Sécurisation des entrepôts de données: de la conception à l'exploitation. Lumiere II Lyon : Rapport de thèse, 2013. ,
A UML 2.0 profile to define security requirements for Data Warehouses. . s.l. : Computer Standards & Interfaces, vol.31, pp.969-983, 2009. ,
uml 2.0/ocl extension for designing secure data warehouses, Journal of Research and Practice in Information Technology, vol.38, pp.31-43, 2006. ,