Skip to main content
Erschienen in: Automatic Control and Computer Sciences 8/2019

01.12.2019

Modeling Big Data Management Systems in Information Security

verfasst von: M. A. Poltavtseva, M. O. Kalinin

Erschienen in: Automatic Control and Computer Sciences | Ausgabe 8/2019

Einloggen, um Zugang zu erhalten

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The article presents a model of a Big Data management system for solving information security (IS) problems for systems of this class. The features of the considered systems are highlighted. The model and architecture of data processing are mathematically described based on the ANSI/SPARC concept and the principles of modeling information systems in IS. The model is analyzed.
Literatur
3.
Zurück zum Zitat Kogalovskii, M.R., Entsiklopediya tekhnologii baz dannykh (Encyclopedia of Database Technologies), Moscow: Finansy Stat., 2002. Kogalovskii, M.R., Entsiklopediya tekhnologii baz dannykh (Encyclopedia of Database Technologies), Moscow: Finansy Stat., 2002.
4.
Zurück zum Zitat Zegzhda, D.P., Vasil’ev, Yu.S., and Poltavtseva, M.A., Approaches to modeling the security of cyberphysical systems, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1000–1009.CrossRef Zegzhda, D.P., Vasil’ev, Yu.S., and Poltavtseva, M.A., Approaches to modeling the security of cyberphysical systems, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1000–1009.CrossRef
6.
Zurück zum Zitat Rouf, Y., Shtern, M., Fokaefs, M., and Litoiu, M., A hierarchical architecture for distributed security control of large scale systems, ICSE-C’17 Proceedings of the 39th International Conference on Software Engineering Companion, Buenos Aires, 2017, pp. 118–120. Rouf, Y., Shtern, M., Fokaefs, M., and Litoiu, M., A hierarchical architecture for distributed security control of large scale systems, ICSE-C’17 Proceedings of the 39th International Conference on Software Engineering Companion, Buenos Aires, 2017, pp. 118–120.
7.
Zurück zum Zitat Jardin, D.A., The ANSI/SPARC DBMS Model, Montreal: North-Holland Pub. Co., 1977. Jardin, D.A., The ANSI/SPARC DBMS Model, Montreal: North-Holland Pub. Co., 1977.
8.
Zurück zum Zitat Gergel’, V.P. and Strongin, R.G., Osnovy parallel’nykh vychislenii dlya mnogoprotsessornykh vychislitel’nykh sistem (Fundamentals of Parallel Computing for Multiprocessor Computing Systems), Nizhny Novgorod: Nizhegorod. Gos. Univ., 2001. Gergel’, V.P. and Strongin, R.G., Osnovy parallel’nykh vychislenii dlya mnogoprotsessornykh vychislitel’nykh sistem (Fundamentals of Parallel Computing for Multiprocessor Computing Systems), Nizhny Novgorod: Nizhegorod. Gos. Univ., 2001.
9.
Zurück zum Zitat Zegzhda, D., Zegzhda, P., Pechenkin, A., and Poltavtseva, M., Modeling of information systems to their security evaluation, SIN’17 Proceedings of the 10th International Conference on Security of Information and Networks, Jaipur, 2017, pp. 295–298. Zegzhda, D., Zegzhda, P., Pechenkin, A., and Poltavtseva, M., Modeling of information systems to their security evaluation, SIN’17 Proceedings of the 10th International Conference on Security of Information and Networks, Jaipur, 2017, pp. 295–298.
10.
Zurück zum Zitat Gaidamakin, N.A., Razgranichenie dostupa k informatsii v komp’yuternykh sistemakh (Differentiation of Information Access in Computer Systems), Yekaterinburg: Ural. Univ., 2003. Gaidamakin, N.A., Razgranichenie dostupa k informatsii v komp’yuternykh sistemakh (Differentiation of Information Access in Computer Systems), Yekaterinburg: Ural. Univ., 2003.
11.
Zurück zum Zitat Zegzhda, D.P., A general scheme of mandatory security models and its application for proving the security of information processing systems, Probl. Inf. Bezop., Komp’yut. Sist., 2000, no. 2, pp. 28–32. Zegzhda, D.P., A general scheme of mandatory security models and its application for proving the security of information processing systems, Probl. Inf. Bezop., Komp’yut. Sist., 2000, no. 2, pp. 28–32.
12.
Zurück zum Zitat Devyanin, P.N., Modeli bezopasnosti komp’yuternykh sistem (Security Models of Computer Systems), Moscow: Izd. Tsentr Akademiya, 2005. Devyanin, P.N., Modeli bezopasnosti komp’yuternykh sistem (Security Models of Computer Systems), Moscow: Izd. Tsentr Akademiya, 2005.
13.
Zurück zum Zitat Zegzhda, D.P. and Pavlenko, E.Yu., Cyber-physical system homeostatic security management, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 805–816.CrossRef Zegzhda, D.P. and Pavlenko, E.Yu., Cyber-physical system homeostatic security management, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 805–816.CrossRef
Metadaten
Titel
Modeling Big Data Management Systems in Information Security
verfasst von
M. A. Poltavtseva
M. O. Kalinin
Publikationsdatum
01.12.2019
Verlag
Pleiades Publishing
Erschienen in
Automatic Control and Computer Sciences / Ausgabe 8/2019
Print ISSN: 0146-4116
Elektronische ISSN: 1558-108X
DOI
https://doi.org/10.3103/S014641161908025X

Weitere Artikel der Ausgabe 8/2019

Automatic Control and Computer Sciences 8/2019 Zur Ausgabe

Neuer Inhalt