{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:11:03Z","timestamp":1773655863285,"version":"3.50.1"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030322571","type":"print"},{"value":"9783030322588","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T00:00:00Z","timestamp":1569974400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-32258-8_5","type":"book-chapter","created":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T05:31:35Z","timestamp":1569907895000},"page":"41-47","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Conceptual Data Modeling Using Aggregates to Ensure Large-Scale Distributed Data Management Systems Security"],"prefix":"10.1007","author":[{"given":"Maria A.","family":"Poltavtseva","sequence":"first","affiliation":[]},{"given":"Maxim O.","family":"Kalinin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,2]]},"reference":[{"issue":"1","key":"5_CR1","doi-asserted-by":"publisher","first-page":"5","DOI":"10.2174\/1872212112666180731114714","volume":"13","author":"Khaleel Ahmad","year":"2019","unstructured":"Ahmad, K., Alam, S., Udzir, N.I.: Security of NoSQL database against intruders. Recent Pat. Eng. (2018). \n                    https:\/\/doi.org\/10.2174\/1872212112666180731114714","journal-title":"Recent Patents on Engineering"},{"key":"5_CR2","unstructured":"Alshboul, Y., Wang, Y., Nepali, R.K.: Big data lifecycle : threats and security model. In: Twenty-First Americas Conference on Information Systems (AMCIS), pp. 1\u20137 (2015)"},{"key":"5_CR3","doi-asserted-by":"publisher","unstructured":"Bagozi, A., Bianchini, D., De Antonellis, V., Marini, A., Ragazzi, D.: Big data conceptual modelling in cyber-physical systems. Int. J. Concept. Model. (2018). \n                    https:\/\/doi.org\/10.18417\/emisa.si.hcm.24\n                    \n                  . Special Issue on Conceptual Modelling in Honour of Heinrich C. Mayr","DOI":"10.18417\/emisa.si.hcm.24"},{"key":"5_CR4","unstructured":"Far S.B., Rad, A.I.: Security Analysis of Big Data on Internet of Things (2018). \n                    https:\/\/arxiv.org\/abs\/1808.09491\n                    \n                  . Accessed 28 Aug 2018"},{"key":"5_CR5","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/978-1-4615-5643-5_8","volume-title":"Logics for Databases and Information Systems","author":"Diego Calvanese","year":"1998","unstructured":"Calvanese, D., Lenzerini, M., Nardi, D.: Description logics for conceptual data modeling. In: Logics for Databases and Information Systems, The Springer International Series in Engineering and Computer Science (1998). \n                    https:\/\/doi.org\/10.1007\/978-1-4615-5643-5_8"},{"key":"5_CR6","doi-asserted-by":"publisher","unstructured":"Chebotko, A., Kashlev, A., Lu, S.: A big data modeling methodology for apache cassandra. In: 2015 IEEE International Congress on Big Data, New York (2015). \n                    https:\/\/doi.org\/10.1109\/BigDataCongress.2015.41","DOI":"10.1109\/BigDataCongress.2015.41"},{"key":"5_CR7","unstructured":"D\u2019Acquisto, G., Domingo-Ferrer, J., Kikiras, P., Torra, V., Montjoye, Y.D., Bourka, A.: Privacy by design in big data: an overview of privacy enhancing technologies in the era of big data analytics. CoRR, abs\/1512.06000 (2015)"},{"issue":"3","key":"5_CR8","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1016\/j.datak.2005.07.007","volume":"58","author":"Islay Davies","year":"2006","unstructured":"Davies, I., Green, P., Rosemann, M., Indulska, M., Gallo, S.: How do practitioners use conceptual modeling in practice? Data Knowl. Eng. 58(3) (2006). \n                    https:\/\/doi.org\/10.1016\/j.datak.2005.07.007","journal-title":"Data & Knowledge Engineering"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Embley, D.W., Thalheim, B.: Handbook of Conceptual Modeling: Theory, Practice, and Research Challenges, 1st edn. Springer Publishing Company (2011)","DOI":"10.1007\/978-3-642-15865-0"},{"key":"5_CR10","unstructured":"Ferraiolo, D.F., Kuhn, R.D., Chandramouli, R.: Role-based Access Control, 2nd edn. Artech House (2007)"},{"key":"5_CR11","volume-title":"Access to Information in Computer Systems","author":"NA Gaidamakin","year":"2003","unstructured":"Gaidamakin, N.A.: Access to Information in Computer Systems. Ural Publishing House, Yekaterinburg (2003). UN-TA"},{"key":"5_CR12","doi-asserted-by":"publisher","unstructured":"Gaydamakin, N.A.: Multilevel thematic-hierarchical access control (MLTHS-system). Prikladnaya Diskretnaya Matematika 39 (2018). \n                    https:\/\/doi.org\/10.17223\/20710410\/39\/4","DOI":"10.17223\/20710410\/39\/4"},{"key":"5_CR13","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1016\/j.future.2015.07.019","volume":"63","author":"David Gil","year":"2016","unstructured":"Gil, D., Song, I.-Y.: Modeling and management of big data: challenges and opportunities. Future Gen. Comput. Syst. (2015). \n                    https:\/\/doi.org\/10.1016\/j.future.2015.07.019","journal-title":"Future Generation Computer Systems"},{"key":"5_CR14","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/978-3-540-39733-5_8","volume-title":"Journal on Data Semantics I","author":"Mustafa Jarrar","year":"2003","unstructured":"Jarrar, M., Demey, J., Meersman, R.: On using conceptual data modeling for ontology engineering. J. Data Semant. I (2003). \n                    https:\/\/doi.org\/10.1007\/978-3-540-39733-5_8"},{"key":"5_CR15","doi-asserted-by":"publisher","unstructured":"Jiaheng, L., Holubov\u00e1, I.: Multi-model data management: what\u2019s new and what\u2019s next? In: EDBT (2017). \n                    https:\/\/doi.org\/10.5441\/002\/edbt.2017.80","DOI":"10.5441\/002\/edbt.2017.80"},{"key":"5_CR16","doi-asserted-by":"publisher","unstructured":"Kim, S., Kim, N., Chung, T.: Attribute relationship evaluation methodology for big data security. In: 2013 International Conference on IT Convergence and Security (ICITCS), Macao (2013). \n                    https:\/\/doi.org\/10.1109\/ICITCS.2013.6717808","DOI":"10.1109\/ICITCS.2013.6717808"},{"key":"5_CR17","unstructured":"Kleppmann, M.: Designing Data-Intensive Applications. O\u2019Reilly (2018)"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Kotenko, I., Fedorchenko, A., Doynikova, E., Chechulin, A.: An ontology-based hybrid storage of security information. Inf. Technol. Control (4) (2018)","DOI":"10.5755\/j01.itc.47.4.20007"},{"key":"5_CR19","doi-asserted-by":"publisher","unstructured":"Kotenko, I., Polubelova, O., Saenko, I.: The ontological approach for SIEM data repository implementation. In: 2012 IEEE International Conference on Green Computing and Communications, Besancon (2012). \n                    https:\/\/doi.org\/10.1109\/GreenCom.2012.125","DOI":"10.1109\/GreenCom.2012.125"},{"issue":"6","key":"5_CR20","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1134\/S0361768814060152","volume":"40","author":"S. D. Kuznetsov","year":"2014","unstructured":"Kuznetsov, S.D., Poskonin, A.V.: NoSQL data management systems. Program. Comput. Softw. (2014). \n                    https:\/\/doi.org\/10.1134\/S0361768814060152\n                    \n                  . M.: Springer-Verlag GmbH","journal-title":"Programming and Computer Software"},{"key":"5_CR21","volume-title":"Conceptual Modeling, Databases, and Case: An Integrated View of Information Systems Development","author":"P Loucopoulos","year":"1992","unstructured":"Loucopoulos, P., Zicari, R.: Conceptual Modeling, Databases, and Case: An Integrated View of Information Systems Development. John Wiley & Sons Inc, New York (1992)"},{"key":"5_CR22","doi-asserted-by":"publisher","first-page":"1821","DOI":"10.1109\/ACCESS.2016.2558446","volume":"4","author":"Abid Mehmood","year":"2016","unstructured":"Mehmood, A., Natgunanathan, I., Xiang, Y., Hua, G., Guo, S.: Protection of big data privacy. IEEE Access (2016). \n                    https:\/\/doi.org\/10.1109\/ACCESS.2016.2558446","journal-title":"IEEE Access"},{"issue":"3","key":"5_CR23","doi-asserted-by":"publisher","first-page":"44","DOI":"10.3390\/fi8030044","volume":"8","author":"Julio Moreno","year":"2016","unstructured":"Moreno, J., Serrano, M.A., Fern\u00e1ndez-Medina, E.: Main issues in big data security. Future Internet (2016). \n                    https:\/\/doi.org\/10.3390\/fi8030044","journal-title":"Future Internet"},{"key":"5_CR24","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/978-3-030-01391-2_36","volume-title":"Lecture Notes in Computer Science","author":"Ana Le\u00f3n Palacio","year":"2018","unstructured":"Palacio, L.A., Gimenez, G.A., Rodenas, C.J.C., Roman, R.J.F.: Genomic data management in big data environments: the colorectal cancer case. In: Advances in Conceptual Modeling, ER 2018 (2018) \n                    https:\/\/doi.org\/10.1007\/978-3-030-01391-2_36"},{"key":"5_CR25","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1016\/B978-0-444-89879-1.50018-X","volume-title":"Interoperable Database Systems (Ds-5)","author":"G. Pernul","year":"1993","unstructured":"Pernul, G.: Canonical security modeling for federated databases. In: IFIP Transactions A: Computer Science and Technology, Interoperable Database Systems (1993). \n                    https:\/\/doi.org\/10.1016\/B978-0-444-89879-1.50018-X"},{"key":"5_CR26","unstructured":"Poltavtseva, M.A.: Consistent approach to secure big data processing and storage systems development. Problems Inf. Secur. Comput. Syst. (2) (2019, in press)"},{"key":"5_CR27","unstructured":"Poltavtseva, M.A., Kalinin, M.O.: Threat model of big data processing and storage Systems. Problems Inf. Secur. Comput. Syst. (2) (2019, in press)"},{"key":"5_CR28","doi-asserted-by":"publisher","unstructured":"Pras, A., Schoenwaelder, J.: On the Difference between Information Models and Data Models, RFC 3444 (2003). \n                    https:\/\/doi.org\/10.17487\/RFC3444","DOI":"10.17487\/RFC3444"},{"key":"5_CR29","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/j.datak.2017.01.001","volume":"108","author":"Veda C. Storey","year":"2017","unstructured":"Storey, V.C., Song, I.-Y.: Big data technologies and management: what conceptual modeling can do. Data Knowl. Eng. (2017). \n                    https:\/\/doi.org\/10.1016\/j.datak.2017.01.001","journal-title":"Data & Knowledge Engineering"},{"key":"5_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.datak.2015.07.002","volume":"98","author":"Veda C. Storey","year":"2015","unstructured":"Storey, V.C., Trujillo, J.C., Liddle, S.W.: Research on conceptual modeling: themes, topics, and introduction to the special issue. Data Knowl. Eng. (2015). \n                    https:\/\/doi.org\/10.1016\/j.datak.2015.07.002","journal-title":"Data & Knowledge Engineering"},{"key":"5_CR31","doi-asserted-by":"crossref","unstructured":"Thuraisingham, B.: Database and Applications Security: Integrating Information Security and Data Management. Taylor & Francis Group (2005)","DOI":"10.1201\/9780203486061"},{"key":"5_CR32","volume-title":"Algebraic Methods in Database Theory and Knowledge Representation","author":"EM Veniaminov","year":"2003","unstructured":"Veniaminov, E.M.: Algebraic Methods in Database Theory and Knowledge Representation. Scientific World, Moscow (2003)"},{"key":"5_CR33","doi-asserted-by":"crossref","unstructured":"Zegzhda, P.D., Zegzhda, D.P.: Secure systems design technology. In: Lecture Notes in Computer Science, vol. 2052 (2001)","DOI":"10.1007\/3-540-45116-1_9"}],"container-title":["Studies in Computational Intelligence","Intelligent Distributed Computing XIII"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-32258-8_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T05:32:20Z","timestamp":1569907940000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-32258-8_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,2]]},"ISBN":["9783030322571","9783030322588"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-32258-8_5","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"value":"1860-949X","type":"print"},{"value":"1860-9503","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,10,2]]},"assertion":[{"value":"2 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IDC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Intelligent and Distributed Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Petersburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Russia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"idc2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/idc2019.ru\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}