Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
An extensive systematic review on the model-driven development of secure systems
Abstract Context: Model-Driven Security (MDS) is as a specialised Model-Driven
Engineering research area for supporting the development of secure systems. Over a …
Engineering research area for supporting the development of secure systems. Over a …
Designing secure data warehouses by using MDA and QVT
The Data Warehouse (DW) design is based on multidimensional (MD) modeling which
structures information into facts and dimensions. Due to the confidentiality of the data that it …
structures information into facts and dimensions. Due to the confidentiality of the data that it …
A practical application of our MDD approach for modeling secure XML data warehouses
Data warehouses are systems that provide useful information to support the decision making
process, thus improving organizations' business processes. These systems integrate …
process, thus improving organizations' business processes. These systems integrate …
Conceptual design and implementation of spatial data warehouses integrating regular grids of points
S Bimonte, M Zaamoune, P Beaune - International Journal of …, 2017 - Taylor & Francis
Spatial online analytical processing (OLAP) and spatial data warehouse (SDW) systems are
geo-business intelligence technologies that enable the analysis of huge volumes of …
geo-business intelligence technologies that enable the analysis of huge volumes of …
Towards a modernization process for Secure Data Warehouses
Data Warehouses (DW) manage crucial enterprise information used for the decision making
process which has to be protected from unauthorized accesses. However, security …
process which has to be protected from unauthorized accesses. However, security …
Evaluation of approaches for designing secure data warehouse
Data Warehouse (DW) systems maintain sensitive and crucial information integrated from
various heterogeneous sources of the organization, that needs to be protected from …
various heterogeneous sources of the organization, that needs to be protected from …
Applying an MDA-based approach to consider security rules in the development of secure DWs
Data Warehouses (DWs) manage crucial information for enterprises which must be
protected from unauthorized accesses. The question of which security issues are present in …
protected from unauthorized accesses. The question of which security issues are present in …
[PDF][PDF] Transforming conceptual model into logical model for temporal data warehouse security: a case study
Extraction–transformation–loading (ETL) processes are responsible for the extraction of data
from several sources, their cleansing, customization and insertion into a data warehouse …
from several sources, their cleansing, customization and insertion into a data warehouse …
[PDF][PDF] OLAP authentication and authorization via query re-writing
T Eavis, A Altamimi - DBKDA 2012, 2012 - core.ac.uk
Online Analytical Processing (OLAP) has become an increasingly important and prevalent
component of Decision Support Systems. OLAP is associated with a data model known as a …
component of Decision Support Systems. OLAP is associated with a data model known as a …
Modernizing secure OLAP applications with a model-driven approach
C Blanco, E Fernández-Medina… - The Computer …, 2015 - ieeexplore.ieee.org
The majority of the organizations store their historical business information in data
warehouses which are queried to make strategic decisions by using online analytical …
warehouses which are queried to make strategic decisions by using online analytical …