期刊文献+

电力监控系统主机加固的方法 被引量:1

Analysis and Application of Method for Strengthening Power Supply Monitoring System Host
下载PDF
导出
摘要 随着全球网络安全环境恶化,电力监控系统主机网络安全防护要求日益提升。为做好电力监控系统主机加固,文中结合电力监控系统实际分析主机加固工作的要求,提出加固方法,并对加固中的难点——访问控制进行程序化处理设计,以提升主机加固工作效率。 With the deterioration of the global network security environment,the network security protection requirements of power monitoring system hosts are increasing.In order to strengthen the host of the power monitoring system,the author combines the power monitoring system to analyze the requirements of the host hardening work,proposes the reinforcement method,and designs the difficult access control in the reinforcement to improve the efficiency of the host reinforcement work.
作者 李邦源 李波 陈运忠 Li Bang-yuan;Li Bo;Chen Yun-zhong
出处 《电力系统装备》 2018年第10期65-66,共2页 Electric Power System Equipment
关键词 电力监控系统主机 安全加固 批处理 power monitoring system host security hardening batch processing
  • 相关文献

参考文献3

二级参考文献14

  • 1Richard L Burden J Douglas Faires.Numerical Analysis(Seventh Edition),数值分析(第七版影印版)[M].北京:高等教育出版社,2001..
  • 2BSchneier.应用密码学——协议、算法与C源程序[M].北京:机械工业出版社,2000..
  • 3Trusted Computing Group. TCG Specification Architecture Overview[EB/OL]. (2004-04-01). http://www.trustedcomputinggroup. org.
  • 4Microsoft Corporation. BitLocker Drive Encryption Technical Overview[EB/OL]. [2010-02-13]. http://technet.microsoft.coirden-us/ library/cc732774.aspx.
  • 5Kumar N, Kumar V. Vbootkit: Compromising Windows Vista Security[C]//Proc. of Black Hat Europe Conference. Amsterdam, the Netherlands: [s. n.], 2007.
  • 6Kumar N, Kumar V. BitLocker and Windows Vista[EB/OL]. (2008-05-19). http://www.nvlabs.irduploads/projects/nvbit/nvbit bit locker__white_paper.pdf.
  • 7S G Akl, P D Taylor. Cryptographic solution to a problem of access in a hierarchy[ J]. ACM trans. Compute. Syst. 1983,1 (3) :239 - 248.
  • 8S J Mackinnon, P D Taylor. An optimal algorithm for assigning cryptographic keys to access control in a hierarchy [ J ]. IEEE Trans. Compute. 1985,34(9) :797 - 802.
  • 9C C Chang, R J Hwang. Cryptographic key assignment scheme for access control in a hierarchy [ J ]. Information Systems, 1992, 17( 3 ) : 243- 247.
  • 10A Shamir. How to share a secret [ J ]. Communications of the ACM,1979,22( 1 ) :612 - 613.

共引文献11

同被引文献34

引证文献1

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部