期刊文献+

电力工业信息安全的思考 被引量:78

CONSIDERATION OF INFORMATION SECURITY FOR ELECTRIC POWER INDUSTRY
在线阅读 下载PDF
导出
摘要 随着信息技术和网络技术在电力工业中应用的普及 ,开放、互连和标准化成为电力工业中信息系统发展的必然趋势 ,大大增加了电力系统对信息系统的依赖性 ,于是信息系统的安全问题也越来越引起人们的关注。文中首先介绍了电力工业信息系统的建设和发展 ,明确了电力工业信息系统的概念和特点 ,并从现有的计算机系统、信息网络、业务系统及人们的安全意识等几个方面分析了电力工业信息安全风险和研究现状 。 With wide application of information and network technologies to electric power industry,inform ation system s have inevitably become open,interconnected and standardized.This greatly increases the dependency of electric power systems on information system s. Thus,m ore and m ore concerns are focused on information security issues in electric power industry. The paper firstly introduces the developm ents of inform ation system s for electric power industry,and then discusses the concepts and features.From viewpoints of the present computer system,information network,operation system and people's security consciousness,the paper analyzes the status of security risk and research of inform ation security for electric power industry and presents main research topics for the future.
出处 《电力系统自动化》 EI CSCD 北大核心 2002年第7期1-4,12,共5页 Automation of Electric Power Systems
关键词 信息安全 电力工业 电力市场 电力系统 中国 技术支持系统 inform ation security electric power industry electricity market
  • 相关文献

参考文献7

二级参考文献13

  • 1肖康.建立和完善企业IP网络安全体系(之二)[J].计算机网络世界,2000,10(10):52-57. 被引量:8
  • 2Shaw T. Using Internet Technologies for Secure Substation Access and Control. In: Power Engineering Society Summer Meeting. 2000. 363~368
  • 3Boudaoud K, Labiod H, Boutaba R, et al. Network Security Management with Intelligent Agents. In: Network Operations and Management Symposium. 2000
  • 4Jiang Tao, Liu Jiren, Qin Yang. The Research on Dynamic Self-adaptive Network Security Model Based on Mobile Agent. In: 36th International Conference on Technology of Object-oriented Languages and Systems. 2000
  • 5Lin Zeng, Wang Haiqing, Lee M K O. Multiple Intelligent Agent Supported Internet Security System: Issues, Current Solutions and a Proposed Approach. In: IEEE International Conference on Intelligent Processing Systems. 1997
  • 6Ganley M J. Digital Signatures. Information Security Technical Report, 1997,2(4):12~22
  • 7余建斌(Yu Jianbin).黑客的攻击手段及用户对策(Hacker's Attacking Art and User's Countermeasure). 北京:人民邮电出版社(Beijing:People's Posts & Telecommunications Publishing House),1998
  • 8Wu C K, Wang X M. Determination of the True Value of the Euler Totient Function in the RSA Cryptosystem from a Set of Possibilities. Electronics Letters, 1993, 29(1): 84~85
  • 9Schneier B.应用密码学:协议、算法与C源程序(Applied Cryptography: Protocals, Algorithms and Source Code in C).吴世忠,祝世雄,张文政,等译(Wu Shizhong,Zhu Shixiong, Zhang Wenzheng, et al Trans).北京:机械工业出版社(Beijing: China Machine Press),2000
  • 10Leung K R P H, Hui L C K. Handling Signature Purposes in Workflow Systems. Journal of Systems and Software, 2001, 55(3): 245~259

共引文献968

同被引文献511

引证文献78

二级引证文献976

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部