-
1
-
-
0043275386
-
Consideration of information security for electric power industry
-
HU Yan, DONG Ming-chui, HAN Ying-duo. Consideration of Information Security for Electric Power Industry. Automation of Electric Power Systems, 2002, 26(7): 1-4.
-
(2002)
Automation of Electric Power Systems
, vol.26
, Issue.7
, pp. 1-4
-
-
Hu, Y.1
Dong, M.-C.2
Han, Y.-D.3
-
2
-
-
12344298236
-
A survey to design method of security architecture for power information systems
-
HU Yan, XIE Xiao-rong, HAN Ying-duo et al. A Survey to Design Method of Security Architecture for Power Information Systems. Power System Technology, 2005, 29(1): 35-39.
-
(2005)
Power System Technology
, vol.29
, Issue.1
, pp. 35-39
-
-
Hu, Y.1
Xie, X.-R.2
Han, Y.-D.3
-
3
-
-
2542491170
-
Power system security and its prevention
-
HAN Zhen-xiang, CAO Yi-jia. Power System Security and Its Prevention. Power System Technology, 2004, 28(9): 1-6.
-
(2004)
Power System Technology
, vol.28
, Issue.9
, pp. 1-6
-
-
Han, Z.-X.1
Cao, Y.-J.2
-
4
-
-
20444404194
-
Design and application of power digital certificate service system
-
YU Yong, LIN Wei-min, HE Jun. Design and Application of Power Digital Certificate Service System. Automation of Electric Power Systems, 2005, 29(10): 64-68.
-
(2005)
Automation of Electric Power Systems
, vol.29
, Issue.10
, pp. 64-68
-
-
Yu, Y.1
Lin, W.-M.2
He, J.3
-
5
-
-
33344468765
-
Design and implementation of an information network security management system for power enterprises
-
XIANG Ji-dong, HUANG Tian-shu, SUN Dong. Design and Implementation of an Information Network Security Management System for Power Enterprises. Automation of Electric Power Systems, 2003, 27(15): 71-74.
-
(2003)
Automation of Electric Power Systems
, vol.27
, Issue.15
, pp. 71-74
-
-
Xiang, J.-D.1
Huang, T.-S.2
Sun, D.3
-
6
-
-
0041632403
-
Network information security solution for electricity market operation system
-
SHANG Jin-cheng, HUANG Yong-hao, HUANG Yong-qian et al. Network Information Security Solution for Electricity Market Operation System. Automation of Electric Power Systems, 2003, 27(9): 15-19.
-
(2003)
Automation of Electric Power Systems
, vol.27
, Issue.9
, pp. 15-19
-
-
Shang, J.-C.1
Huang, Y.-H.2
Huang, Y.-Q.3
-
7
-
-
4344645554
-
Information security evaluation in power systems based on fuzzy comprehensive judgment
-
CONG Lin, LI Zhi-min, PAN Ming-hui et al. Information Security Evaluation in Power Systems Based on Fuzzy Comprehensive Judgment. Automation of Electric Power Systems, 2004, 28(12): 65-69.
-
(2004)
Automation of Electric Power Systems
, vol.28
, Issue.12
, pp. 65-69
-
-
Cong, L.1
Li, Z.-M.2
Pan, M.-H.3
-
8
-
-
33749614388
-
Risk analysis and probabilistic survivability assessment (RAPSA): An assessment approach for power substation hardening
-
Washington (DC, USA)
-
TAYLOR C, KRINGS A, ALVES-FOSS J. Risk Analysis and Probabilistic Survivability Assessment (RAPSA): An Assessment Approach for Power Substation Hardening. In: Proceedings of First Workshop on Scientific Aspects of Cyber Terrorism. Washington (DC, USA): 2002. 9p.
-
(2002)
Proceedings of First Workshop on Scientific Aspects of Cyber Terrorism
, pp. 9
-
-
Taylor, C.1
Krings, A.2
Alves-Foss, J.3
-
9
-
-
20444390947
-
A tri-level self-protected intrusion tolerant system for electric power information network system
-
WANG Xian-pei, XU Liang, LI Feng et al. A Tri-level Self-protected Intrusion Tolerant System for Electric Power Information Network System. Automation of Electric Power Systems, 2005, 29(10): 69-72.
-
(2005)
Automation of Electric Power Systems
, vol.29
, Issue.10
, pp. 69-72
-
-
Wang, X.-P.1
Xu, L.2
Li, F.3
-
10
-
-
14744282094
-
Discussion on security message of IEC 60870-5-104 telecontrol protocol
-
LIU Nian, DUAN Bin. Discussion on Security Message of IEC 60870-5-104 Telecontrol Protocol. Automation of Electric Power Systems, 2005, 29(2): 93-96.
-
(2005)
Automation of Electric Power Systems
, vol.29
, Issue.2
, pp. 93-96
-
-
Liu, N.1
Duan, B.2
-
11
-
-
20444395069
-
A security authentication system of substation automation information exchange
-
DUAN Bin, WANG Jian. A Security Authentication System of Substation Automation Information Exchange. Automation of Electric Power Systems, 2005, 29(9): 55-59.
-
(2005)
Automation of Electric Power Systems
, vol.29
, Issue.9
, pp. 55-59
-
-
Duan, B.1
Wang, J.2
-
12
-
-
21444436937
-
Design and implementation of cryptographic computation for substation security communication
-
LIU Li-zheng, DUAN Bin, HUANG Sheng-long. Design and Implementation of Cryptographic Computation for Substation Security Communication. Automation of Electric Power Systems, 2005, 29(11): 65-68.
-
(2005)
Automation of Electric Power Systems
, vol.29
, Issue.11
, pp. 65-68
-
-
Liu, L.-Z.1
Duan, B.2
Huang, S.-L.3
-
13
-
-
0010686220
-
Communication networks and systems in substation
-
IEC 61850
-
IEC 61850, Communication Networks and Systems in Substation. 2004.
-
(2004)
-
-
-
14
-
-
0010480845
-
Information technology - Open systems interconnection, the directory: Public-key and attribute certificate frameworks
-
ITU-T Recommendation X. 509|ISO/IEC 9594-8
-
ITU-T Recommendation X. 509|ISO/IEC 9594-8: Information Technology-Open Systems Interconnection, The Directory: Public-Key and Attribute Certificate Frameworks. 2001.
-
(2001)
-
-
-
16
-
-
33344467564
-
Electronic signature law in China
-
Electronic Signature Law in China. http://www.xinhuanet.com, 2004.
-
(2004)
-
-
-
17
-
-
0002262722
-
Role based access control: Features and motivations
-
New Orleans (LA, USA), Los Alamitos (CA, USA): IEEE Computer Society Press
-
FERRAIOLO D F, CUGINI J A, KUHN D R. Role Based Access Control: Features and Motivations. In: Proceedings of the 11th Annual Computer Security Applications Conference. New Orleans (LA, USA): 1995. Los Alamitos (CA, USA): IEEE Computer Society Press, 1995. 554-563.
-
(1995)
Proceedings of the 11th Annual Computer Security Applications Conference
, pp. 554-563
-
-
Ferraiolo, D.F.1
Cugini, J.A.2
Kuhn, D.R.3
-
18
-
-
33344468637
-
The early study of information security architecture of electric power industry
-
LI Wen-wu, WANG Xian-pei, MENG Bo et al. The Early Study of Information. Security Architecture of Electric Power Industry. Electric Power, 2002, 35(5): 76-79.
-
(2002)
Electric Power
, vol.35
, Issue.5
, pp. 76-79
-
-
Li, W.-W.1
Wang, X.-P.2
Meng, B.3
-
19
-
-
0004094192
-
Lightweight directory access protocol (v3)
-
RDC2251
-
WAHL M. Lightweight Directory Access Protocol (v3). RDC2251. 1997.
-
(1997)
-
-
Wahl, M.1
-
20
-
-
12444297918
-
Design of protection by referring to function leveling in IEC 61850
-
DOU Xiao-bo, WU Zai-jun, HU Min-qiang. Design of Protection by Referring to Function Leveling in IEC 61850. Automation of Electric Power Systems, 2004, 28(23): 65-70.
-
(2004)
Automation of Electric Power Systems
, vol.28
, Issue.23
, pp. 65-70
-
-
Dou, X.-B.1
Wu, Z.-J.2
Hu, M.-Q.3
-
21
-
-
0037174025
-
Substation remote maintenance system based on distributed objects technology
-
GAO Zhuo, LUO Yi, TU Guang-yu. Substation Remote Maintenance System Based on Distributed Objects Technology. Automation of Electric Power Systems, 2002, 26(16): 66-70.
-
(2002)
Automation of Electric Power Systems
, vol.26
, Issue.16
, pp. 66-70
-
-
Gao, Z.1
Luo, Y.2
Tu, G.-Y.3
-
22
-
-
42549086945
-
IEC 61850 communication networks and systems in substations: An overview for users
-
BAIGENT D, ADAMIAK M, MACKIEWICZ R. IEC 61850 Communication Networks and Systems in Substations: An Overview for Users, http://www.sisconet.com, 2004.
-
(2004)
-
-
Baigent, D.1
Adamiak, M.2
Mackiewicz, R.3
-
23
-
-
33344455320
-
Data and communication security, Part 6: Security for IEC 61850 profiles (work in progress)
-
IEC TS 62351-6
-
IEC TS 62351-6. Data and Communication Security, Part 6: Security for IEC 61850 Profiles (Work in Progress). http://www.iec.ch, 2004.
-
(2004)
-
-
|