{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:03:34Z","timestamp":1773655414398,"version":"3.50.1"},"reference-count":13,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.3103\/s014641161908025x","type":"journal-article","created":{"date-parts":[[2020,3,4]],"date-time":"2020-03-04T09:03:07Z","timestamp":1583312587000},"page":"895-902","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Modeling Big Data Management Systems in Information Security"],"prefix":"10.3103","volume":"53","author":[{"given":"M. A.","family":"Poltavtseva","sequence":"first","affiliation":[]},{"given":"M. O.","family":"Kalinin","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2020,3,4]]},"reference":[{"key":"7195_CR1","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1134\/S0361768814060152","volume":"40","author":"S.D. Kuznetsov","year":"2014","unstructured":"Kuznetsov, S.D. and Poskonin, A.V., NoSQL data management systems, Program. Comput. Software, 2014, vol.\u00a040, no. 6, pp. 323\u2013332. https:\/\/doi.org\/10.1134\/S0361768814060152","journal-title":"Program. Comput. Software"},{"key":"7195_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.22364\/bjmc.2018.6.1.01","volume":"6","author":"S.D. Kuznetsov","year":"2018","unstructured":"Kuznetsov, S.D., New storage devices and the future of database management, Balt. J. Mod. Comput., 2018, vol.\u00a06, no. 1, pp. 1\u201312. https:\/\/doi.org\/10.22364\/bjmc.2018.6.1.01","journal-title":"Balt. J. Mod. Comput."},{"key":"7195_CR3","unstructured":"Kogalovskii, M.R., Entsiklopediya tekhnologii baz dannykh (Encyclopedia of Database Technologies), Moscow: Finansy Stat., 2002."},{"key":"7195_CR4","doi-asserted-by":"publisher","first-page":"1000","DOI":"10.3103\/S014641161808031X","volume":"52","author":"D.P. Zegzhda","year":"2018","unstructured":"Zegzhda, D.P., Vasil\u2019ev, Yu.S., and Poltavtseva, M.A., Approaches to modeling the security of cyberphysical systems, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1000\u20131009.","journal-title":"Autom. Control Comput. Sci."},{"key":"7195_CR5","doi-asserted-by":"publisher","first-page":"662","DOI":"10.1080\/1369118X.2012.678878","volume":"15","author":"D. Boyd","year":"2012","unstructured":"Boyd, D. and Crawford, K., Critical questions for Big Data, Inf. Commun. Soc., 2012, vol. 15, no. 5, pp. 662\u2013679. https:\/\/doi.org\/10.1080\/1369118X.2012.678878","journal-title":"Inf. Commun. Soc."},{"key":"7195_CR6","doi-asserted-by":"crossref","unstructured":"Rouf, Y., Shtern, M., Fokaefs, M., and Litoiu, M., A hierarchical architecture for distributed security control of large scale systems, ICSE-C\u201917 Proceedings of the 39th International Conference on Software Engineering Companion, Buenos Aires, 2017, pp. 118\u2013120.","DOI":"10.1109\/ICSE-C.2017.64"},{"key":"7195_CR7","volume-title":"The ANSI\/SPARC DBMS Model","author":"D.A. Jardin","year":"1977","unstructured":"Jardin, D.A., The ANSI\/SPARC DBMS Model, Montreal: North-Holland Pub. Co., 1977."},{"key":"7195_CR8","unstructured":"Gergel\u2019, V.P. and Strongin, R.G., Osnovy parallel\u2019nykh vychislenii dlya mnogoprotsessornykh vychislitel\u2019nykh sistem (Fundamentals of Parallel Computing for Multiprocessor Computing Systems), Nizhny Novgorod: Nizhegorod. Gos. Univ., 2001."},{"key":"7195_CR9","doi-asserted-by":"crossref","unstructured":"Zegzhda, D., Zegzhda, P., Pechenkin, A., and Poltavtseva, M., Modeling of information systems to their security evaluation, SIN\u201917 Proceedings of the 10th International Conference on Security of Information and Networks, Jaipur, 2017, pp. 295\u2013298.","DOI":"10.1145\/3136825.3136857"},{"key":"7195_CR10","unstructured":"Gaidamakin, N.A., Razgranichenie dostupa k informatsii v komp\u2019yuternykh sistemakh (Differentiation of Information Access in Computer Systems), Yekaterinburg: Ural. Univ., 2003."},{"key":"7195_CR11","unstructured":"Zegzhda, D.P., A general scheme of mandatory security models and its application for proving the security of information processing systems, Probl. Inf. Bezop., Komp\u2019yut. Sist., 2000, no. 2, pp. 28\u201332."},{"key":"7195_CR12","unstructured":"Devyanin, P.N., Modeli bezopasnosti komp\u2019yuternykh sistem (Security Models of Computer Systems), Moscow: Izd. Tsentr Akademiya, 2005."},{"key":"7195_CR13","doi-asserted-by":"publisher","first-page":"805","DOI":"10.3103\/S0146411617080260","volume":"51","author":"D.P. Zegzhda","year":"2017","unstructured":"Zegzhda, D.P. and Pavlenko, E.Yu., Cyber-physical system homeostatic security management, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 805\u2013816.","journal-title":"Autom. Control Comput. Sci."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S014641161908025X.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S014641161908025X","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S014641161908025X.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T21:59:44Z","timestamp":1773611984000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S014641161908025X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":13,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["7195"],"URL":"https:\/\/doi.org\/10.3103\/s014641161908025x","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12]]},"assertion":[{"value":"15 January 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 January 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 February 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}