{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:04:14Z","timestamp":1773615854023,"version":"3.50.1"},"reference-count":13,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.3103\/s0146411619080182","type":"journal-article","created":{"date-parts":[[2020,3,4]],"date-time":"2020-03-04T09:03:07Z","timestamp":1583312587000},"page":"883-888","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Forming the Composition of Functions and Instructions of Microprocessor Devices for Access Control Systems"],"prefix":"10.3103","volume":"53","author":[{"given":"Sh. G.","family":"Magomedov","sequence":"first","affiliation":[]},{"given":"V. P.","family":"Los\u2019","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2020,3,4]]},"reference":[{"key":"7193_CR1","unstructured":"Magomedov, Sh.G. and Shamkhalov, F.I., Features of the use of microprocessor devices in access control systems, Prom. ASU Kontrollery, 2018, no. 3, pp. 16\u201319."},{"key":"7193_CR2","doi-asserted-by":"publisher","unstructured":"Magomedov, Sh.G., Classification of access boundaries and related influence factors in the access control system, Vestn. Astrakh. Gos. Tekh. Univ., Ser.: Upr. Vychisl. Tekh. Inf., 2018, no. 1, pp. 62\u201370. https:\/\/doi.org\/10.24143\/2072-9502-2018-1-62-70","DOI":"10.24143\/2072-9502-2018-1-62-70"},{"key":"7193_CR3","unstructured":"https:\/\/ru.wikipedia.org\/wiki\/\u041c\u0430\u0442\u0435\u043c\u0430\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439_\u0441\u043e\u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440."},{"key":"7193_CR4","first-page":"22","volume":"6","author":"I.P. Osinin","year":"2017","unstructured":"Osinin, I.P., Modular-logarithmic coprocessor for mass arithmetic calculations, Vestn. Yuzhno-Ural. Gos. Univ.,Ser.: Vychisl. Mat. Inf., 2017, vol. 6, no. 2, pp. 22\u201336.","journal-title":"Ser.: Vychisl. Mat. Inf."},{"key":"7193_CR5","unstructured":"The Basic System of Microprocessor Instructions. https:\/\/prog-cpp.ru\/asm-command\/#mov."},{"key":"7193_CR6","unstructured":"Magomedov, Sh.G., Morozova, T.Yu., and Akimov, D.A., Ensuring the security of data transmission in computer networks based on the use of systems of residual classes, Probl. Inf. Bezop., Komp\u2019yut. Sist., 2016, no. 3, pp.\u00a043\u201347."},{"key":"7193_CR7","unstructured":"Chervyakov, N.I., Modulyarnye parallel\u2019nye vychislitel\u2019nye struktury neiroprotsessornykh sistem (Modular Parallel Computing Structures of Neuroprocessor Systems), Moscow: Fizmatlit, 2003."},{"key":"7193_CR8","doi-asserted-by":"publisher","DOI":"10.1142\/p523","volume-title":"Residue Number System: Theory and Implementation","author":"A. Omondi","year":"2007","unstructured":"Omondi, A., Residue Number System: Theory and Implementation, London: Imperial College Press, 2007."},{"key":"7193_CR9","unstructured":"Kogel'man, L.G. and Artozei, E.A., A model of information security system. An access control system, Sovrem. Inf. Tekhnol., 2016, no. 23, pp. 94\u201398."},{"key":"7193_CR10","unstructured":"Kazantsev, I.S., Methods for identification and authentication of the operator in modern systems for monitoring and controlling access to information, Sovrem. Tendentsii Razvit. Nauki Tekhnol., 2016, no. 5-3, pp. 63\u201366."},{"key":"7193_CR11","doi-asserted-by":"publisher","DOI":"10.1142\/p523","volume-title":"Residue Number System. Theory and Implementation","author":"A. Omondi","year":"2007","unstructured":"Omondi, A. and Premkumar, B., Advances in Computer Science and Engineering: Texts, vol. 2: Residue Number System. Theory and Implementation, London: Imperial College Press, 2007."},{"key":"7193_CR12","unstructured":"Pankov, V., The effectiveness of incentive mechanism, and the potential level of satisfaction of the needs of the employee, Russ. J. Technol., 2015, no. 4, pp. 288\u2013291."},{"key":"7193_CR13","unstructured":"Zegzhda, P.D., Anisimov, V.G., Suprun, A.F., Anisimov, E.G., and Saurenko, T.N., Models and a decision support method for ensuring information security of information control systems, Probl. Inf. Bezop., Komp\u2019yut. Sist., 2018, no. 1, pp. 43\u201347."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619080182.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411619080182","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619080182.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:05:36Z","timestamp":1773612336000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411619080182"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":13,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["7193"],"URL":"https:\/\/doi.org\/10.3103\/s0146411619080182","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12]]},"assertion":[{"value":"1 November 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 November 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 December 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}