{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:03:34Z","timestamp":1773615814423,"version":"3.50.1"},"reference-count":28,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.3103\/s0146411624701025","type":"journal-article","created":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T14:22:54Z","timestamp":1741962174000},"page":"1352-1364","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Assessing the Security of Big Data Systems"],"prefix":"10.3103","volume":"58","author":[{"given":"M. A.","family":"Poltavtseva","sequence":"first","affiliation":[]},{"given":"V. V.","family":"Zaitseva","sequence":"additional","affiliation":[]},{"given":"D. V.","family":"Ivanov","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"key":"7801_CR1","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1186\/s42400-018-0020-9","volume":"2","author":"P. Colombo","year":"2019","unstructured":"Colombo, P. and Ferrari, E., Access control technologies for big data management systems: Literature review and future trends, Cybersecurity, 2019, vol. 2, no. 1, p. 3. https:\/\/doi.org\/10.1186\/s42400-018-0020-9","journal-title":"Cybersecurity"},{"key":"7801_CR2","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/j.bdr.2015.08.001","volume":"2","author":"P. Colombo","year":"2015","unstructured":"Colombo, P. and Ferrari, E., Privacy aware access control for big data: A research roadmap, Big Data Res., 2015, vol. 2, no. 4, pp. 145\u2013154. https:\/\/doi.org\/10.1016\/j.bdr.2015.08.001","journal-title":"Big Data Res."},{"key":"7801_CR3","doi-asserted-by":"publisher","first-page":"393","DOI":"10.3966\/160792642020032102008","volume":"21","author":"J. Wang","year":"2020","unstructured":"Wang, J., Yang, Ya., Wang, T., Sherratt, R.S., and Zhang, J., Big data service architecture: A survey, J. Internet Technol., 2020, vol. 21, no. 2, pp. 393\u2013405. https:\/\/doi.org\/10.3966\/160792642020032102008","journal-title":"J. Internet Technol."},{"key":"7801_CR4","unstructured":"Assotsiatsiya uchastnikov rynka bol\u2019shikh dannykh. Kontseptsiya otraslevogo standarta zashchity dannykh: proekt (Association of Big Data Market Participants. Concept of Industry Data Protection Standard: Draft), Moscow, 2023. https:\/\/rubda.ru\/wp-content\/uploads\/2024\/04\/2_Otraslevoi_standart_zashchity_dannykh_042024_ITOG.pdf. Cited July 16, 2024."},{"key":"7801_CR5","unstructured":"Lulchenko, A.N., Expert system for information security effectiveness assessment, Zashchita Informatsii, 2016, no. 4, pp. 20\u201324."},{"key":"7801_CR6","first-page":"92","volume":"16","author":"I. Uvalieva","year":"2021","unstructured":"Uvalieva, I. and Soltan, G., Development of the system for assessment of information and technological support of big data security, Vestnik Kazakhstansko-Britanskogo Tekhnicheskogo Universiteta, 2021, vol. 16, no. 1, pp. 92\u2013100.","journal-title":"Vestnik Kazakhstansko-Britanskogo Tekhnicheskogo Universiteta"},{"key":"7801_CR7","unstructured":"Lyul\u2019chenko, A.N., Technology models and methodology for assessing the state of the information security system in an authority, organization, Cand. Sci. (Eng.) Dissertation, St. Petersburg: ITMO University, 2014."},{"key":"7801_CR8","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1057\/ejis.2016.2","volume":"25","author":"O. M\u00fcller","year":"2016","unstructured":"M\u00fcller, O., Junglas, I., vom Brocke, J., and Debortoli, S., Utilizing big data analytics for information systems research: challenges, promises and guidelines, Eur. J. Inf. Syst., 2016, vol. 25, no. 4, pp. 289\u2013302. https:\/\/doi.org\/10.1057\/ejis.2016.2","journal-title":"Eur. J. Inf. Syst."},{"key":"7801_CR9","unstructured":"Borzenkova, S.Yu. and Kazarina, E.E., Analysis of methods for assessing the level of security of information systems during their operation, Izvestiya Tul\u2019skogo Gosudarstvennogo Universiteta. Tekhnicheskie Nauki, 2020, no. 5, pp. 93\u201397."},{"key":"7801_CR10","unstructured":"Ivanov, S.O., Ilyin, D.V., Ilina, L.A., and Nazarova, O.V., Simulation of data protection tools corresponding to common criteria of International Standard ISO\/IEC 15408, Vestnik Chuvashskogo Universiteta, 2016, no. 3, pp.\u00a0194\u2013200."},{"key":"7801_CR11","doi-asserted-by":"publisher","first-page":"796","DOI":"10.3103\/s0146411616080277","volume":"50","author":"E.B. Aleksandrova","year":"2016","unstructured":"Aleksandrova, E.B. and Shkorkina, E.N., Tripartite outsoursing key-agreement protocol on bilinear pairings, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 796\u2013801. https:\/\/doi.org\/10.3103\/s0146411616080277","journal-title":"Autom. Control Comput. Sci."},{"key":"7801_CR12","unstructured":"Informatsionnye i upravlyayushchie sistemy na transporte i v promyshlennosti: Materialy II vserossiiskoi nauchno-tekhnicheskoi konferentsii (Information and Control Systems in Transport and Industry: Proceedings of the All-Russian Scientific and Technical Conference), Omsk, 2018."},{"key":"7801_CR13","unstructured":"Stelmashonok, E.V. and Stelmashonok, V.L., Imitation modeling prossibilities for research of the information protection system functioning, Peterburgskii Ekonomicheskii Zhurnal, 2017, no. 4, pp. 57\u201368."},{"key":"7801_CR14","unstructured":"Zhukov, M.M., Barkalov, Y.M., and Telkov, A.Y., Methodological approach to simulation modeling in studying the practical efficiency of protection systems against network cyber attacks, Vestnik Voronezhskogo Instituta MVD Rossii, 2022, no. 1, pp. 24\u201339."},{"key":"7801_CR15","doi-asserted-by":"publisher","first-page":"841","DOI":"10.3103\/s0146411620080106","volume":"54","author":"A.D. Dakhnovich","year":"2020","unstructured":"Dakhnovich, A.D., Moskvin, D.A., and Ivanov, D.V., A technique for safely transforming the infrastructure of industrial control systems to the industrial Internet of Things, Autom. Control Comput. Sci., 2020, vol. 54, no. 8, pp. 841\u2013849. https:\/\/doi.org\/10.3103\/s0146411620080106","journal-title":"Autom. Control Comput. Sci."},{"key":"7801_CR16","doi-asserted-by":"publisher","first-page":"548","DOI":"10.26102\/2310-6018\/2019.24.1.036","volume":"7","author":"V.L. Tokarev","year":"2019","unstructured":"Tokarev, V.L. and Sychugov, A.A., Method of auditing the protection of automated systems, Modelirovanie, \n               Optimizatsiya i Informatsionnye Tekhnologii, 2019, vol. 7, no. 1, pp. 548\u2013559. https:\/\/doi.org\/10.26102\/2310-6018\/2019.24.1.036","journal-title":"Optimizatsiya i Informatsionnye Tekhnologii"},{"key":"7801_CR17","first-page":"66","volume":"11","author":"A.S. Lyubukhin","year":"2023","unstructured":"Lyubukhin, A.S., Information security risk analysis methods: Fuzzy logic, International Journal of Open Information Technologies, 2023, vol. 11, no. 2, pp. 66\u201371.","journal-title":"International Journal of Open Information Technologies"},{"key":"7801_CR18","unstructured":"Ermakova, A.Y. and Los, A.B., Risk-based approach to assessing the security of information systems, Matematicheskoe i Komp\u2019yuternoe Modelirovanie v Ekonomike, Strakhovanii i Upravlenii Riskami, 2021, no. 6, pp. 67\u201376."},{"key":"7801_CR19","volume-title":"Assessing the possibility of information security threat on the basis of fuzzy sets","author":"M.M. Bus\u2019ko","year":"2022","unstructured":"Bus\u2019ko, M.M., Assessing the possibility of information security threat on the basis of fuzzy sets, Pinsk, 2022, pp. 3\u20136."},{"key":"7801_CR20","doi-asserted-by":"publisher","first-page":"993","DOI":"10.3103\/s0146411618080308","volume":"52","author":"P.D. Zegzhda","year":"2018","unstructured":"Zegzhda, P.D., Ivanov, D.V., Moskvin, D.A., and Kubrin, G.S., Actual security threats for vehicular and mobile ad hoc networks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 993\u2013999. https:\/\/doi.org\/10.3103\/s0146411618080308","journal-title":"Autom. Control Comput. Sci."},{"key":"7801_CR21","doi-asserted-by":"publisher","unstructured":"Doynikova, E.V., Fedorchenko, A.V., Kotenko, I.V., and Novikova, E.S., Security assessment methodology based on the semantic model of metrics and data, Voprosy Kiberbezopasnosti, 2021, no. 1, pp. 29\u201340. https:\/\/doi.org\/10.21681\/2311-3456-2021-1-29-40","DOI":"10.21681\/2311-3456-2021-1-29-40"},{"key":"7801_CR22","doi-asserted-by":"publisher","first-page":"93","DOI":"10.14529\/ctcr230208","volume":"23","author":"L.A. Artyushina","year":"2023","unstructured":"Artyushina, L.A., A probabilistic approach to assessing the security of the information system in the problem of user identification by keypad handwriting, Vestnik Yuzhno-Ural\u2019skogo Gosudarstvennogo Universiteta, Seriya: Komp\u2019yuternye Tekhnologii, Upravlenie, \n               Radioelektronika, 2023, vol. 23, no. 2, pp. 93\u2013101. https:\/\/doi.org\/10.14529\/ctcr230208","journal-title":"Radioelektronika"},{"key":"7801_CR23","doi-asserted-by":"crossref","unstructured":"Doynikova, E.V., Security metrics and security assessment techniques for the computer networks on the base of the attack graphs, Trudy SPIIRAN, 2013, no. 26, pp. 54\u201368.","DOI":"10.15622\/sp.26.4"},{"key":"7801_CR24","doi-asserted-by":"publisher","unstructured":"Dakhnovich, A., Moskvin, D., and Zegzhda, D., A necessary condition for industrial Internet of Things sustainability, Mobile Internet Security. MobiSec 2021, You, I., Kim, H., Youn, TY., Palmieri, F., and Kotenko, I., Eds., Communications in Computer and Information Science, vol. 1544, Singapore: Springer, 2022, pp. 79\u201389. https:\/\/doi.org\/10.1007\/978-981-16-9576-6_7","DOI":"10.1007\/978-981-16-9576-6_7"},{"key":"7801_CR25","doi-asserted-by":"publisher","first-page":"44","DOI":"10.26583\/bit.2022.1.05","volume":"29","author":"S.N. Goryachev","year":"2022","unstructured":"Goryachev, S.N. and Kobyakov, N.S., Assessment of the state of protection of information systems against malware, Bezopasnost\u2019 \n               Informatsionnykh Tekhnologii, 2022, vol. 29, no. 1, pp. 44\u201356. https:\/\/doi.org\/10.26583\/bit.2022.1.05","journal-title":"Informatsionnykh Tekhnologii"},{"key":"7801_CR26","doi-asserted-by":"publisher","first-page":"937","DOI":"10.3103\/s0146411619080327","volume":"53","author":"E.A. Zaitseva","year":"2019","unstructured":"Zaitseva, E.A., Zegzhda, D.P., and Poltavtseva, M.A., Use of graph representation and case analysis to assess the security of computer systems, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 937\u2013947. https:\/\/doi.org\/10.3103\/s0146411619080327","journal-title":"Autom. Control Comput. Sci."},{"key":"7801_CR27","doi-asserted-by":"publisher","first-page":"2287","DOI":"10.3390\/electronics11152287","volume":"11","author":"K. Liu","year":"2022","unstructured":"Liu, K., Wang, F., Ding, Zh., Liang, Sh., Yu, Zh., and Zhou, Yu., Recent progress of using knowledge graph for cybersecurity, Electronics, 2022, vol. 11, no. 15, p. 2287. https:\/\/doi.org\/10.3390\/electronics11152287","journal-title":"Electronics"},{"key":"7801_CR28","doi-asserted-by":"publisher","unstructured":"Hu, V., Grance, T., Ferraiolo, D., and Kuhn, D., An access control scheme for big data processing, Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, IEEE, 2014, pp. 1\u20137. https:\/\/doi.org\/10.4108\/icst.collaboratecom.2014.257649","DOI":"10.4108\/icst.collaboratecom.2014.257649"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624701025.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411624701025","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624701025.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:05:02Z","timestamp":1773612302000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411624701025"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":28,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["7801"],"URL":"https:\/\/doi.org\/10.3103\/s0146411624701025","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]},"assertion":[{"value":"19 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 July 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 July 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}