Skip to main content
Top
Published in: Automatic Control and Computer Sciences 8/2019

01-12-2019

Modeling Big Data Management Systems in Information Security

Authors: M. A. Poltavtseva, M. O. Kalinin

Published in: Automatic Control and Computer Sciences | Issue 8/2019

Login to get access

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The article presents a model of a Big Data management system for solving information security (IS) problems for systems of this class. The features of the considered systems are highlighted. The model and architecture of data processing are mathematically described based on the ANSI/SPARC concept and the principles of modeling information systems in IS. The model is analyzed.
Literature
3.
go back to reference Kogalovskii, M.R., Entsiklopediya tekhnologii baz dannykh (Encyclopedia of Database Technologies), Moscow: Finansy Stat., 2002. Kogalovskii, M.R., Entsiklopediya tekhnologii baz dannykh (Encyclopedia of Database Technologies), Moscow: Finansy Stat., 2002.
4.
go back to reference Zegzhda, D.P., Vasil’ev, Yu.S., and Poltavtseva, M.A., Approaches to modeling the security of cyberphysical systems, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1000–1009.CrossRef Zegzhda, D.P., Vasil’ev, Yu.S., and Poltavtseva, M.A., Approaches to modeling the security of cyberphysical systems, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1000–1009.CrossRef
6.
go back to reference Rouf, Y., Shtern, M., Fokaefs, M., and Litoiu, M., A hierarchical architecture for distributed security control of large scale systems, ICSE-C’17 Proceedings of the 39th International Conference on Software Engineering Companion, Buenos Aires, 2017, pp. 118–120. Rouf, Y., Shtern, M., Fokaefs, M., and Litoiu, M., A hierarchical architecture for distributed security control of large scale systems, ICSE-C’17 Proceedings of the 39th International Conference on Software Engineering Companion, Buenos Aires, 2017, pp. 118–120.
7.
go back to reference Jardin, D.A., The ANSI/SPARC DBMS Model, Montreal: North-Holland Pub. Co., 1977. Jardin, D.A., The ANSI/SPARC DBMS Model, Montreal: North-Holland Pub. Co., 1977.
8.
go back to reference Gergel’, V.P. and Strongin, R.G., Osnovy parallel’nykh vychislenii dlya mnogoprotsessornykh vychislitel’nykh sistem (Fundamentals of Parallel Computing for Multiprocessor Computing Systems), Nizhny Novgorod: Nizhegorod. Gos. Univ., 2001. Gergel’, V.P. and Strongin, R.G., Osnovy parallel’nykh vychislenii dlya mnogoprotsessornykh vychislitel’nykh sistem (Fundamentals of Parallel Computing for Multiprocessor Computing Systems), Nizhny Novgorod: Nizhegorod. Gos. Univ., 2001.
9.
go back to reference Zegzhda, D., Zegzhda, P., Pechenkin, A., and Poltavtseva, M., Modeling of information systems to their security evaluation, SIN’17 Proceedings of the 10th International Conference on Security of Information and Networks, Jaipur, 2017, pp. 295–298. Zegzhda, D., Zegzhda, P., Pechenkin, A., and Poltavtseva, M., Modeling of information systems to their security evaluation, SIN’17 Proceedings of the 10th International Conference on Security of Information and Networks, Jaipur, 2017, pp. 295–298.
10.
go back to reference Gaidamakin, N.A., Razgranichenie dostupa k informatsii v komp’yuternykh sistemakh (Differentiation of Information Access in Computer Systems), Yekaterinburg: Ural. Univ., 2003. Gaidamakin, N.A., Razgranichenie dostupa k informatsii v komp’yuternykh sistemakh (Differentiation of Information Access in Computer Systems), Yekaterinburg: Ural. Univ., 2003.
11.
go back to reference Zegzhda, D.P., A general scheme of mandatory security models and its application for proving the security of information processing systems, Probl. Inf. Bezop., Komp’yut. Sist., 2000, no. 2, pp. 28–32. Zegzhda, D.P., A general scheme of mandatory security models and its application for proving the security of information processing systems, Probl. Inf. Bezop., Komp’yut. Sist., 2000, no. 2, pp. 28–32.
12.
go back to reference Devyanin, P.N., Modeli bezopasnosti komp’yuternykh sistem (Security Models of Computer Systems), Moscow: Izd. Tsentr Akademiya, 2005. Devyanin, P.N., Modeli bezopasnosti komp’yuternykh sistem (Security Models of Computer Systems), Moscow: Izd. Tsentr Akademiya, 2005.
13.
go back to reference Zegzhda, D.P. and Pavlenko, E.Yu., Cyber-physical system homeostatic security management, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 805–816.CrossRef Zegzhda, D.P. and Pavlenko, E.Yu., Cyber-physical system homeostatic security management, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 805–816.CrossRef
Metadata
Title
Modeling Big Data Management Systems in Information Security
Authors
M. A. Poltavtseva
M. O. Kalinin
Publication date
01-12-2019
Publisher
Pleiades Publishing
Published in
Automatic Control and Computer Sciences / Issue 8/2019
Print ISSN: 0146-4116
Electronic ISSN: 1558-108X
DOI
https://doi.org/10.3103/S014641161908025X

Other articles of this Issue 8/2019

Automatic Control and Computer Sciences 8/2019 Go to the issue