{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:03:08Z","timestamp":1773615788365,"version":"3.50.1"},"reference-count":22,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.3103\/s0146411623080254","type":"journal-article","created":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T15:02:20Z","timestamp":1709218940000},"page":"1063-1070","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Framework for Modeling Security Policies of Big Data Processing Systems"],"prefix":"10.3103","volume":"57","author":[{"given":"M. A.","family":"Poltavtseva","sequence":"first","affiliation":[]},{"given":"D. V.","family":"Ivanov","sequence":"additional","affiliation":[]},{"given":"E. V.","family":"Zavadskii","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2024,2,29]]},"reference":[{"key":"7669_CR1","doi-asserted-by":"crossref","unstructured":"Turkanovi\u0107, M., Dru\u017eovec, T.W., and H\u00f6lbl, M., Inference attacks and control on database structures, TEM J., 2015, vol. 4, no. 1, pp. 3\u201315.","DOI":"10.18421\/TEM41-01"},{"key":"7669_CR2","doi-asserted-by":"publisher","unstructured":"Poltavtseva, M.A., Evolution of data management systems and their security, 2019 Int. Conf. on Engineering Technologies and Computer Science (EnT), Moscow, 2019, IEEE, 2019, pp. 25\u201329. https:\/\/doi.org\/10.1109\/ent.2019.00010","DOI":"10.1109\/ent.2019.00010"},{"key":"7669_CR3","volume-title":"Logic, Algebra and Databases","author":"P. Gray","year":"1989","unstructured":"Gray, P., Logic, Algebra and Databases, John Wiley & Sons, 1989."},{"key":"7669_CR4","volume-title":"Data Models","author":"D.C. Tsichritzis","year":"1982","unstructured":"Tsichritzis, D.C. and Lochovsky, F.H., Data Models, Prentice Hall, 1982."},{"key":"7669_CR5","doi-asserted-by":"publisher","unstructured":"Colombo, P. and Ferrari, E., Access control technologies for big data management systems: Literature review and future trends, Cybersecurity, 2019, vol. 2, no. 1. https:\/\/doi.org\/10.1186\/s42400-018-0020-9","DOI":"10.1186\/s42400-018-0020-9"},{"key":"7669_CR6","unstructured":"Poltavtseva, M.A., Zegzhda, D.P., and Kalinin, M.O., Role of universal model of heterogeneous data in security of big data management systems, Metody Tekh. Sredstva Obespecheniya Bezop. Inf., 2023, no. 32, pp. 43\u201344."},{"key":"7669_CR7","doi-asserted-by":"publisher","first-page":"1017","DOI":"10.3103\/s0146411618080175","volume":"52","author":"A.S. Konoplev","year":"2018","unstructured":"Konoplev, A.S., Busygin, A.G., and Zegzhda, D.P., A blockchain decentralized public key infrastructure model, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1017\u20131021. https:\/\/doi.org\/10.3103\/s0146411618080175","journal-title":"Autom. Control Comput. Sci."},{"key":"7669_CR8","doi-asserted-by":"publisher","first-page":"965","DOI":"10.3103\/s0146411618080072","volume":"52","author":"R.A. Demidov","year":"2018","unstructured":"Demidov, R.A., Pechenkin, A.I., Zegzhda, P.D., and Kalinin, M.O., Application model of modern artificial neural network methods for the analysis of information systems security, Autom. Control Comput. Sci., 2018, vol.\u00a052, no. 8, pp. 965\u2013970. https:\/\/doi.org\/10.3103\/s0146411618080072","journal-title":"Autom. Control Comput. Sci."},{"key":"7669_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14706-7_27","volume-title":"Clarifying integrity control at the trusted information environment, Computer Network Security. MMM-ACNS 2010","author":"D.P. Zegzhda","year":"2010","unstructured":"Zegzhda, D.P., Zegzhda, P.D., and Kalinin, M.O., Clarifying integrity control at the trusted information environment, Computer Network Security. MMM-ACNS 2010, Kotenko, I. and Skormin, V., Eds., Lecture Notes in Computer Science, vol. 6258, Berlin: Springer, 2010, pp. 337\u2013344. https:\/\/doi.org\/10.1007\/978-3-642-14706-7_27"},{"key":"7669_CR10","doi-asserted-by":"publisher","first-page":"4682","DOI":"10.1109\/jiot.2020.2969326","volume":"7","author":"J. Qiu","year":"2020","unstructured":"Qiu, J., Tian, Z., Du, C., Zuo, Q., Su, S., and Fang, B., A survey on access control in the age of internet of things, IEEE Internet Things J., 2020, vol. 7, no. 6, pp. 4682\u20134696. https:\/\/doi.org\/10.1109\/jiot.2020.2969326","journal-title":"IEEE Internet Things J."},{"key":"7669_CR11","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1109\/mc.2018.3971347","volume":"51","author":"V.C. Hu","year":"2018","unstructured":"Hu, V.C., Kuhn, D.R., and Ferraiolo, D.F., Access control for emerging distributed systems, Computer, 2018, vol. 51, no. 10, pp. 100\u2013103. https:\/\/doi.org\/10.1109\/mc.2018.3971347","journal-title":"Computer"},{"key":"7669_CR12","doi-asserted-by":"publisher","unstructured":"Colombo, P. and Ferrari, E., Access control in the era of big data: State of the art and research directions, Proc. 23nd ACM on Symp. on Access Control Models and Technologies, Indianopolis, Ind., 2018, New York: Association for Computing Machinery, 2018, pp. 185\u2013192. https:\/\/doi.org\/10.1145\/3205977.3205998","DOI":"10.1145\/3205977.3205998"},{"key":"7669_CR13","first-page":"272","volume":"11","author":"I. Aedo","year":"2006","unstructured":"Aedo, I., D\u00edaz, P., and Sanz, D., An RBAC model-based approach to specify the access policies of web-based emergency information systems, Int. J. Intell. Control Syst., 2006, vol. 11, no. 4, pp. 272\u2013283.","journal-title":"Int. J. Intell. Control Syst."},{"key":"7669_CR14","doi-asserted-by":"publisher","unstructured":"Pandey, S. and Maurya, S., Big data security management through task role based access control mechanism, 2nd Int. Conf. for Innovation in Technology (INOCON), Bangalore, India, 2023, IEEE, 2023, pp. 1\u20136. https:\/\/doi.org\/10.1109\/inocon57975.2023.10101117","DOI":"10.1109\/inocon57975.2023.10101117"},{"key":"7669_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61176-1_4","volume-title":"Object-tagged RBAC model for the Hadoop ecosystem, Data and Applications Security and Privacy XXXI","author":"M. Gupta","year":"2017","unstructured":"Gupta, M., Patwa, F., and Sandhu, R., Object-tagged RBAC model for the Hadoop ecosystem, Data and Applications Security and Privacy XXXI, Livraga, G. and Zhu, S., Eds., Lecture Notes in Computer Science, vol. 10359, Cham: Springer, 2017, pp. 63\u201381. https:\/\/doi.org\/10.1007\/978-3-319-61176-1_4"},{"key":"7669_CR16","doi-asserted-by":"publisher","first-page":"1550","DOI":"10.1016\/j.protcy.2016.05.130","volume":"24","author":"A. Gupta","year":"2016","unstructured":"Gupta, A., Pandhi, K., Bindu, P.V., and Thilagam, P.S., Role and access based data segregator for security of big data, Procedia Technol., 2016, vol. 24, pp. 1550\u20131557. https:\/\/doi.org\/10.1016\/j.protcy.2016.05.130","journal-title":"Procedia Technol."},{"key":"7669_CR17","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1016\/j.cose.2012.11.010","volume":"35","author":"M.R. Asghar","year":"2013","unstructured":"Asghar, M.R., Ion, M., Russello, G., and Crispo, B., ESPOONERBAC: Enforcing security policies in outsourced environments, Comput. Secur., 2013, vol. 35, pp. 2\u201324. https:\/\/doi.org\/10.1016\/j.cose.2012.11.010","journal-title":"Comput. Secur."},{"key":"7669_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3007204","volume":"49","author":"D. Servos","year":"2017","unstructured":"Servos, D. and Osborn, S.L., Current research and open problems in attribute-based access control, ACM Comput. Surv., 2017, vol. 49, no. 4, pp. 1\u201345. https:\/\/doi.org\/10.1145\/3007204","journal-title":"ACM Comput. Surv."},{"key":"7669_CR19","doi-asserted-by":"publisher","unstructured":"Zeng, W., Yang, Yu., and Luo, B., Content-based access control: Use data content to assist access control for large-scale content-centric databases, 2014 IEEE Int. Conf. on Big Data (Big Data), Washingron, D.C., 2014, IEEE, 2014, pp. 701\u2013710. https:\/\/doi.org\/10.1109\/bigdata.2014.7004294","DOI":"10.1109\/bigdata.2014.7004294"},{"key":"7669_CR20","doi-asserted-by":"publisher","unstructured":"El Haourani, L., Elkalam, A.A., and Ouahman, A.A., Knowledge based access control a model for security and privacy in the big data, Proc. 3rd Int. Conf. on Smart City Applications, Tetouan, Morocco, 2018, New York: Association for Computing Machinery, 2018, p. 16. https:\/\/doi.org\/10.1145\/3286606.3286793","DOI":"10.1145\/3286606.3286793"},{"key":"7669_CR21","doi-asserted-by":"publisher","first-page":"2890","DOI":"10.1109\/jiot.2019.2963794","volume":"7","author":"A. Thakare","year":"2020","unstructured":"Thakare, A., Lee, E., Kumar, A., Nikam, V.B., and Kim, Yo.-G., PARBAC: Priority-attribute-based RBAC model for azure IoT cloud, IEEE Internet Things J., 2020, vol. 7, no. 4, pp. 2890\u20132900. https:\/\/doi.org\/10.1109\/jiot.2019.2963794","journal-title":"IEEE Internet Things J."},{"key":"7669_CR22","doi-asserted-by":"publisher","first-page":"829","DOI":"10.3103\/S0146411620080271","volume":"54","author":"A.A. Poltavtsev","year":"2020","unstructured":"Poltavtsev, A.A., Khabarov, A.R., and Selyankin, A.O., Inference attacks and information security in databases, Autom. Control Comput. Sci., 2020, vol. 54, no. 8, pp. 829\u2013833. https:\/\/doi.org\/10.3103\/S0146411620080271","journal-title":"Autom. Control Comput. Sci."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411623080254.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411623080254","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411623080254.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:04:36Z","timestamp":1773612276000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411623080254"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12]]},"references-count":22,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["7669"],"URL":"https:\/\/doi.org\/10.3103\/s0146411623080254","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12]]},"assertion":[{"value":"17 July 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 July 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 August 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 February 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}