From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Including Security Rules Support in an MDA Approach for Secure DWs., , , , и . ARES, стр. 516-521. IEEE Computer Society, (2009)Towards a Modernization Process for Secure Data Warehouses., , , , и . DaWaK, том 5691 из Lecture Notes in Computer Science, стр. 24-35. Springer, (2009)Automatic Generation of Secure Multidimensional Code for Data Warehouses by using QVT Transformations: an MDA Approach., , , , и . MODSEC@MoDELS, том 413 из CEUR Workshop Proceedings, CEUR-WS.org, (2008)Applying QVT in Order to Implement Secure Data Warehouses in SQL Server Analysis Services., , , , и . J. Res. Pract. Inf. Technol., 41 (2): 135-154 (2009)Hacia la Implementación Automática de Almacenes de Datos Seguros en Herramientas OLAP., , , , и . JISBD, стр. 205-216. (2008)Obtaining Secure Code in SQL Server Analysis Services by using MDA and QVT., , , , и . WOSIS, стр. 38-48. INSTICC Press, (2008)Applying an MDA-Based Approach to Consider Security Rules in the Development of Secure DWs., , , , и . ARES, стр. 528-533. IEEE Computer Society, (2009)Mortadelo: A Model-Driven Framework for NoSQL Database Design., , , , и . MEDI, том 11163 из Lecture Notes in Computer Science, стр. 41-57. Springer, (2018)How the Conceptual Modelling Improves the Security on Document Databases., , , , , и . ER, том 11157 из Lecture Notes in Computer Science, стр. 497-504. Springer, (2018)Automatic Generation of Secure Multidimensional Code for Data Warehouses: An MDA Approach., , , , и . OTM Conferences (2), том 5332 из Lecture Notes in Computer Science, стр. 1052-1068. Springer, (2008)