{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T21:06:11Z","timestamp":1762376771314,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030551896"},{"type":"electronic","value":"9783030551902"}],"license":[{"start":{"date-parts":[[2020,8,25]],"date-time":"2020-08-25T00:00:00Z","timestamp":1598313600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,25]],"date-time":"2020-08-25T00:00:00Z","timestamp":1598313600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-55190-2_11","type":"book-chapter","created":{"date-parts":[[2020,8,6]],"date-time":"2020-08-06T21:03:05Z","timestamp":1596747785000},"page":"139-152","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Measures to Ensure the Reliability of the Functioning of Information Systems in Respect to State and Critically Important Information Systems"],"prefix":"10.1007","author":[{"given":"Askar","family":"Boranbayev","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Seilkhan","family":"Boranbayev","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Askar","family":"Nurbekov","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,8,25]]},"reference":[{"key":"11_CR1","unstructured":"The law of the Republic of Kazakhstan dated November 24, 2015, \u2116 418-V\u2009\u00abAbout Informatization\u00bb"},{"key":"11_CR2","unstructured":"The Order of the Acting Minister of Investments and Development of the Republic of Kazakhstan dated January 28. 2016, \u2116 108 \u00abOn approval of the Methodology for the certification examination of the information system, the information and communication platform of \u201celectronic government\u201d, the Internet resource of a state body for compliance with information security requirements\u00bb"},{"key":"11_CR3","unstructured":"Yazdani, M., Alidoosti, A., Zavadskas, E.K.: Risk analysis of critical infrastructures using fuzzy COPRAS. Econ. Res. 24(4), 27\u201340 (2011)"},{"key":"11_CR4","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1016\/j.ijcip.2008.08.004","volume":"1","author":"D Assaf","year":"2008","unstructured":"Assaf, D.: Models of critical information infrastructure protection. Int. J. Crit. Infrastruct. Protect. 1, 6\u201314 (2008)","journal-title":"Int. J. Crit. Infrastruct. Protect."},{"key":"11_CR5","unstructured":"Nickolov, E.: Critical information infrastructure protection: analysis, evaluation and expectations. Inf. Secur. Int. J. 17, 105\u2013119 (2005)"},{"issue":"2","key":"11_CR6","doi-asserted-by":"publisher","first-page":"139","DOI":"10.3846\/1648715X.2011.586531","volume":"15","author":"EG Too","year":"2011","unstructured":"Too, E.G.: Capability for infrastructure asset capacity management. Int. J. Strat. Prop. Manag. 15(2), 139\u2013151 (2011)","journal-title":"Int. J. Strat. Prop. Manag."},{"issue":"3","key":"11_CR7","first-page":"219","volume":"14","author":"L Rudock","year":"2010","unstructured":"Rudock, L., Amaratunga, D.: Post-Tsunami reconstruction in Sri Lanka: assessing the economic impact. Int. J. Strat. Prop. Manag. 14(3), 219\u2013232 (2010)","journal-title":"Int. J. Strat. Prop. Manag."},{"issue":"3","key":"11_CR8","doi-asserted-by":"publisher","first-page":"365","DOI":"10.3846\/tede.2010.23","volume":"16","author":"X Miao","year":"2010","unstructured":"Miao, X., Yub, B., Xic, B., Tangd, Y.-H.: Modeling of bilevel games and incentives for sustainable critical infrastructure system. Technol. Econ. Dev. Econ. 16(3), 365\u2013379 (2010)","journal-title":"Technol. Econ. Dev. Econ."},{"issue":"5","key":"11_CR9","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1080\/09613210802028428","volume":"36","author":"S Darby","year":"2008","unstructured":"Darby, S.: Energy feedback in buildings - improving the infrastructure for demand reduction. Build. Res. Inf. 36(5), 499\u2013508 (2008)","journal-title":"Build. Res. Inf."},{"issue":"4","key":"11_CR10","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1080\/15732470500103708","volume":"1","author":"RG Little","year":"2005","unstructured":"Little, R.G.: Tending the infrastructure commons: ensuring the sustainability of our vital public systems. Struct. Infrastruct. Eng. 1(4), 263\u2013270 (2005)","journal-title":"Struct. Infrastruct. Eng."},{"issue":"10","key":"11_CR11","doi-asserted-by":"publisher","first-page":"6100","DOI":"10.1016\/j.enpol.2011.07.010","volume":"39","author":"JM Yusta","year":"2011","unstructured":"Yusta, J.M., Correa, G.J., Lacal-Ar\u00e1ntegui, R.: Methodologies and applications for critical infrastructure protection: state-of-the-art. Energy Policy 39(10), 6100\u20136119 (2011)","journal-title":"Energy Policy"},{"issue":"4","key":"11_CR12","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1016\/j.jocs.2010.08.001","volume":"1","author":"A Tofani","year":"2010","unstructured":"Tofani, A., Castorini, E., Palazzari, P., Usov, A., Beyel, C., Rome, E., Servillo, P.: An ontological approach to simulate critical infrastructures. J. Comput. Sci. 1(4), 221\u2013228 (2010)","journal-title":"J. Comput. Sci."},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Boranbayev, A., Boranbayev, S., Nurusheva, A., Yersakhanov, K.: The modern state and the further development prospects of information security in the Republic of Kazakhstan. In: Advances in Intelligent Systems and Computing, vol. 738, pp. 33\u201338 (2018)","DOI":"10.1007\/978-3-319-77028-4_6"},{"key":"11_CR14","unstructured":"Decree of the Government of the Republic of Kazakhstan dated September 8, 2016 No. 529 \u201cOn approval of the Rules and criteria for classifying information and communication infrastructure objects as critical information and communication infrastructure objects\u201d"},{"key":"11_CR15","unstructured":"Decree of the Government of the Republic of Lithuania \u201cOn Approving the Methodology for Identifying Critical Information Infrastructure\u201d dated July 20, 2016 No. 742"},{"key":"11_CR16","unstructured":"Official website of the Committee on Statistics of the Ministry of National Economy of the Republic of Kazakhstan. \n                http:\/\/stat.gov.kz\/faces\/wcnav_externalId\/homeNumbersInformationSociety?_afrLoop=8713314598324629#%40%3F_afrLoop%3D8713314598324629%26_adf.ctrl-state%3D1a9qhbqz2k_148"},{"key":"11_CR17","unstructured":"Boranbayev, A., Boranbayev, S., Nurusheva, A., Yersakhanov, K.: Development of a software system to ensure the reliability and fault tolerance in information systems. J. Eng. Appl. Sci. 13(23), 10080\u201310085 (2018)"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Boranbayev, A., Boranbayev, S., Yersakhanov, K., Nurusheva, A., Taberkhan, R.: Methods of ensuring the reliability and fault tolerance of information systems. In: Advances in Intelligent Systems and Computing, vol. 738, pp. 729\u2013730 (2018)","DOI":"10.1007\/978-3-319-77028-4_93"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Akhmetova, Z., Boranbayev, S., Zhuzbayev, S.: The visual representation of numerical solution for a non-stationary deformation in a solid body. In: Advances in Intelligent Systems and Computing, vol. 448, pp. 473\u2013482 (2016)","DOI":"10.1007\/978-3-319-32467-8_42"},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Akhmetova, Z., Zhuzbaev, S., Boranbayev, S.: The method and software for the solution of dynamic waves propagation problem in elastic medium. Acta Physica Polonica A 130(1), 352\u2013354 (2016)","DOI":"10.12693\/APhysPolA.130.352"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Hritonenko, N., Yatsenko, Y., Boranbayev, S.: Environmentally sustainable industrial modernization and resource consumption: is the Hotelling\u2019s rule too steep? Appl. Math. Model. 39(15), 4365\u20134377 (2015)","DOI":"10.1016\/j.apm.2014.12.056"},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"Boranbayev, S., Altayev, S., Boranbayev, A.: Applying the method of diverse redundancy in cloud based systems for increasing reliability. In: The 12th International Conference on Information Technology: New Generations, ITNG 2015, Las Vegas, Nevada, USA, 13\u201315 April 2015, pp. 796\u2013799 (2015)","DOI":"10.1109\/ITNG.2015.145"},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"Turskis, Z., Goranin, N., Nurusheva, A., Boranbayev, S.: A fuzzy WASPAS-based approach to determine critical information infrastructures of EU sustainable development. Sustainability (Switzerland), 11(2), 424 (2019)","DOI":"10.3390\/su11020424"},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"Turskis, Z., Goranin, N., Nurusheva, A., Boranbayev, S.: Information security risk assessment in critical infrastructure: a hybrid MCDM approach. Informatica (Netherlands) 30(1), 187\u2013211 (2019)","DOI":"10.15388\/Informatica.2019.203"},{"key":"11_CR25","unstructured":"Boranbayev, A.S., Boranbayev, S.N., Nurusheva, A.M., Yersakhanov, K.B., Seitkulov, Y.N.: Development of web application for detection and mitigation of risks of information and automated systems. Eurasian J. Math. Comput. Appl. 7(1), 4\u201322 (2019)"},{"key":"11_CR26","unstructured":"Boranbayev, A.S., Boranbayev, S.N., Nurusheva, A.M., Seitkulov, Y.N., Sissenov, N.M.: A method to determine the level of the information system fault-tolerance. Eurasian J. Math. Comput. Appl. 7(3), 13\u201332 (2019)"},{"key":"11_CR27","doi-asserted-by":"crossref","unstructured":"Boranbayev, A., Boranbayev, S., Nurbekov, A., Taberkhan, R.: The development of a software system for solving the problem of data classification and data processing. In: 16th International Conference on Information Technology - New Generations, ITNG 2019, vol. 800, pp. 621\u2013623 (2019)","DOI":"10.1007\/978-3-030-14070-0_90"},{"key":"11_CR28","doi-asserted-by":"crossref","unstructured":"Boranbayev, A., Boranbayev, S., Nurusheva, A., Seitkulov, Y., Nurbekov, A.: Multi criteria method for determining the failure resistance of information system components. In: Advances in Intelligent Systems and Computing, vol. 1070, pp. 324\u2013337 (2020)","DOI":"10.1007\/978-3-030-32523-7_22"},{"key":"11_CR29","doi-asserted-by":"crossref","unstructured":"Boranbayev, A., Boranbayev, S., Nurusheva, A., Yersakhanov, K., Seitkulov, Y.: A software system for risk management of information systems. In: Proceedings of the 2018 IEEE 12th International Conference on Application of Information and Communication Technologies, AICT 2018, Almaty, Kazakhstan, 17\u201319 October 2018, pp. 284\u2013289 (2018)","DOI":"10.1109\/ICAICT.2018.8747045"},{"key":"11_CR30","doi-asserted-by":"crossref","unstructured":"Boranbayev, S., Altayev, S., Boranbayev, A., Nurbekov, A.: Mathematical model for optimal designing of reliable information systems. In: Proceedings of the 2014 IEEE 8th International Conference on Application of Information and Communication Technologies-AICT 2014, Astana, Kazakhstan, 15\u201317 October 2014, pp. 123\u2013127 (2014)","DOI":"10.1109\/ICAICT.2014.7035926"},{"key":"11_CR31","doi-asserted-by":"crossref","unstructured":"Boranbayev, S., Altayev, S., Boranbayev, A., Seitkulov, Y.: Application of diversity method for reliability of cloud computing. In: Proceedings of the 2014 IEEE 8th International Conference on Application of Information and Communication Technologies-AICT 2014, Astana, Kazakhstan, 15\u201317 October 2014, pp. 244\u2013248 (2014)","DOI":"10.1109\/ICAICT.2014.7035955"},{"key":"11_CR32","unstructured":"Boranbayev, S.: Mathematical model for the development and performance of sustainable economic programs. Int. J. Ecol. Dev. 6(1), 15\u201320 (2007)"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Systems and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-55190-2_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,31]],"date-time":"2020-08-31T12:54:07Z","timestamp":1598878447000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-55190-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,25]]},"ISBN":["9783030551896","9783030551902"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-55190-2_11","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,8,25]]},"assertion":[{"value":"25 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IntelliSys","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Proceedings of SAI Intelligent Systems Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"London","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"intellisys2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/saiconference.com\/IntelliSys","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}