Inproceedings,

Evaluation of Approaches for Modeling of Security in Data Warehouses.

, and .
ACC (2), volume 191 of Communications in Computer and Information Science, page 9-18. Springer, (2011)

Meta data

Tags

Users

  • @dblp

Comments and Reviews