1. Book: Paulraj Ponniah, Data Warehousing fundamentals, Wiley, 2005.
2. Journal paper : Arnon Rosenthal and Edward Sciore, View Security as the Basis for Data Warehouse Security, Proceedings of the International Workshop on Design and Management of Data Warehouse (DMDW’2000), Sweden, June, 2000.
3. Internet resource: Hari Mailvaganam, Design Methodologies of Kimball and Inmon plus a Third Way, http://www.dwreview.com/Articles/KimballInmon.html, 21 July 2009.
4. Systems Security Engineering Capability Maturity Model SSE-CMM - Model Description Document v3.0. Carnegie Mellon University, 2003. http://www.ssecmm.org/model/model.asp.
5. F. Emekci, O. Sahin, D. Agrawal, and A. E. Abbadi.Privacy preserving decision tree learning over multiple parties. Data & Knowledge Engineering, 63:348–361,2007.
6. E. Fernandez-Medina, J. Trujillo, R. Villarroel, and M. Piattini. Access control and audit model for the multidimensional modeling of data warehouses. Decision Support Systems, 42:1270–1289, 2006.
7. E. Fernandez-Medina, J. Trujillo, R. Villarroel, and M. Piattini. Developing secure data warehouses with a uml extension. Information systems, 32:826–859, 2007.
8. Y. Liu, S. Y. Sung, and H. Xiong. A cubic-wise balance approach for privacy preservation in data cubes. Information Sciences, 176:1215–1240, 2006.
9. Oracle Security and the data warehouse.Oracle While Paper, 2005. http://www.oracle.com/technology/ products/bi/db/10g/pdf/twp_bi_dw_security_10gr1_0405.pd f.
10. A. Rosenthal and E. Sciore. View security as the bases for data warehouse security. In Proceedings of the International Workshop on Design and Management of Data Warehouses (DMSW 2000), pages 8:1–8:8, 2000.