Author of the publication

Applying an MDA-Based Approach to Consider Security Rules in the Development of Secure DWs.

, , , , and . ARES, page 528-533. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure business process model specification through a UML 2.0 activity diagram profile., , , and . Decis. Support Syst., 51 (3): 446-465 (2011)New Trends in Data Warehousing and OLAP., and . Decis. Support Syst., 45 (1): 1-3 (2008)Model-Driven Metadata for OLAP Cubes from the Conceptual Modelling of Data Warehouses, , and . DaWaK, volume 5182 of Lecture Notes in Computer Science, page 13-22. Springer, (2008)A Taxonomic Class Modeling Methodology for Object-Oriented Analysis, , , and . Information Modeling Methods and Methodologies, Idea Group Publishing, (2004)The improvement of analytics in massive open online courses by applying data mining techniques., , , , and . Expert Syst. J. Knowl. Eng., 33 (4): 374-382 (2016)Big Data trends: Modelling, Management and Visualization., , and . Expert Syst. J. Knowl. Eng., 33 (4): 362-363 (2016)An MDA Approach and QVT Transformations for the Integrated Development of Goal-Oriented Data Warehouses and Data Marts., , and . J. Database Manag., 22 (1): 43-68 (2011)A Set of Quality Indicators and Their Corresponding Metrics for Conceptual Models of Data Warehouses., , , , and . DaWaK, volume 3589 of Lecture Notes in Computer Science, page 95-104. Springer, (2005)Extending the UML for Designing Association Rule Mining Models for Data Warehouses., and . DaWaK, volume 3589 of Lecture Notes in Computer Science, page 11-21. Springer, (2005)Preface to FP-UML 2008., and . ER Workshops, volume 5232 of Lecture Notes in Computer Science, page 99-100. Springer, (2008)