Author of the publication

Automatic Generation of Secure Multidimensional Code for Data Warehouses: An MDA Approach.

, , , , and . OTM Conferences (2), volume 5332 of Lecture Notes in Computer Science, page 1052-1068. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Onto-CARMEN: Ontology-driven approach for Cyber-Physical System Security Requirements meta-modelling and reasoning., , , , and . Internet Things, (December 2023)Infinite Continuous Feature Model for Psychiatric Comorbidity Analysis., , , , and . Neural Comput., 28 (2): 354-381 (2016)An MDA approach for developing secure OLAP applications: Metamodels and transformations., , , and . Comput. Sci. Inf. Syst., 12 (2): 541-565 (2015)Improving expected tail loss estimates with neural networks., , and . Intell. Syst. Account. Finance Manag., 13 (2): 81-94 (2005)Hacia la Implementación Automática de Almacenes de Datos Seguros en Herramientas OLAP., , , , and . JISBD, page 205-216. (2008)Applying an MDA-Based Approach to Consider Security Rules in the Development of Secure DWs., , , , and . ARES, page 528-533. IEEE Computer Society, (2009)Obtaining Secure Code in SQL Server Analysis Services by using MDA and QVT., , , , and . WOSIS, page 38-48. INSTICC Press, (2008)An ontology-based secure design framework for graph-based databases., , , , , and . Comput. Stand. Interfaces, (March 2024)Mortadelo: A Model-Driven Framework for NoSQL Database Design., , , , and . MEDI, volume 11163 of Lecture Notes in Computer Science, page 41-57. Springer, (2018)Automatic Generation of Secure Multidimensional Code for Data Warehouses: An MDA Approach., , , , and . OTM Conferences (2), volume 5332 of Lecture Notes in Computer Science, page 1052-1068. Springer, (2008)