References
1. Aiken, P. H. (1998). "Reverse engineering of data." IBM Syst. J. 37(2): 246-269.
2. Basin, D., J. Doser, et al. (2003). Model Driven Security for Process-oriented Systems.
ACM Symposium on Access Control Models and Technologies. Como, Italy, ACM Press:
100-109.
3. Basin, D., J. Doser, et al. (2006). "Model Driven Security: from UML Models to Access
Control Infrastructures." ACM Transactions on Software Engineering and Methodology
15(1): 39-91.
4. Blaha, M. (2001). A Retrospective on Industrial Database Reverse Engineering Projects-
Part 1. Proceedings of the 8th Working Conference on Reverse Engineering (WCRE´01),
Suttgart, Germany, IEEE Computer Society.
5. Blanco, C., I. García Rodríguez de Guzmán, et al. (2010). "Defining and Transforming
Security Rules in an MDA approach for DWs." Int. J. of Business Intelligence and Data
Mining - IJBIDM 5(2).
6. Canfora, G. and M. D. Penta (2007). New Frontiers of Reverse Engineering, IEEE
Computer Society.
7. Cohen, Y. and Y. A. Feldman (2003). "Automatic high-quality reengineering of database
programs by abstraction, transformation and reimplementation." ACM Trans. Softw. Eng.
Methodol. 12(3): 285-316.
8. CWM, O. M. G. (2003). "Common Warehouse Metamodel (CWM)."
9. Fernández-Medina, E., J. Jurjens, et al. (2009). "Model-Driven Development for secure
information systems." Information and Software Technology 51(5): 809-814.
10. Fernández-Medina, E., J. Trujillo, et al. (2007). "Model Driven Multidimensional Modeling
of Secure Data Warehouses." European Journal of Information Systems 16(4): 374-389.
11. Fernández-Medina, E., J. Trujillo, et al. (2006). "Access Control and Audit Model for the
Multidimensional Modeling of Data Warehouses." Decision Support Systems 42: 1270-
1289.
12. Fernández-Medina, E., J. Trujillo, et al. (2007). "Developing Secure Data Warehouses with
a UML extension." Information Systems 32(6): 826-856.
13. Hainaut, J.-L., V. Englebert, et al. (2004). Database reverse engineering: From
requirements to CARE tools. Applied Categorical Structures. SpringerLink. 3.
14. Jurjens, J. (2004). Secure Systems Development with UML, Springer-Verlag.
15. Jurjens, J. and H. Schmidt (2011). UMLsec4UML2 - Adopting UMLsec to Support UML2.
http://hdl.handle.net/2003/27602, Technical Reports in Computer Science. Technische
Universitat Dortmund.
16. MDA, O. M. G. (2003). "Model Driven Architecture Guide."
17. Mouratidis, H. (2011). Software Engineering for Secure Systems: Industrial and Research
Perspectives, IGI Global.
18. Muller, H. A., J. H. Jahnke, et al. (2000). Reverse engineering: a roadmap.
19. Priebe, T. and G. Pernul (2001). A Pragmatic Approach to Conceptual Modeling of OLAP
Security. 20th International Conference on Conceptual Modeling (ER 2001). Yokohama,
Japan, Springer-Verlag.
20. Thuraisingham, B., M. Kantarcioglu, et al. (2007). "Extended RBAC-based design and
implementation for a secure data warehouse." International Journal of Business Intelligence
and Data Mining (IJBIDM) 2(4): 367-382.
21. Trujillo, J., E. Soler, et al. (2009). "A UML 2.0 Profile to define Security Requirements for
DataWarehouses." Computer Standards and Interfaces (CSI) 31(5): 969-983.
22. Weippl, E., O.Mangisengi, et al. (2001). An Authorization Model for Data Warehouses and
OLAP. Workshop on Security in Distributed Data Warehousing. New Orleans, Louisiana, USA.
23. Yu, E.(1997). Towards modelling and reasoning support for early-phase requirements
engineering. 3
rd
IEEE International Symposium on Requirements Engineering (RE'97),
Washington, DC.
85