期刊文献+

数字新基建下电力智能终端设备安全管控机制研究 被引量:6

Research on the security control mechanism of power intelligent terminals during new digital infrastructure construction
下载PDF
导出
摘要 为了实现数字新基建下电力智能终端设备之间能够安全的进行数据传输和信息交互,进一步推动电力行业的稳步发展。通过讨论电力智能终端设备的场景关系和面临的安全威胁,重点分析智能终端设备的全生命周期管理模式和数据全生命周期管理模式,得到电力智能终端设备“实时发现—动态管控—主动监管”的安全管控机制,用以实现设备之间数据和信息的安全使用,并为电力行业能够安全、高效、快速的发展提供重要参考。 In order to realize safe data transmission and information interaction between power intelligent terminals during new digital infrastructure construction,sustainable development has to be kept in power industry.In the discussion on the different application scenarios of power intelligent terminals and their security threats,the focuses are laid on analyzing the full life cycle management and control mode for terminal equipment and data.The security management and control mechanism including"real-time detection,dynamic management and control-active supervision"can realize the secured data and information communication between equipment of power intelligent terminals,which provides an important reference for the safe,efficient and rapid development of power industry.
作者 张鹏 刘超 赵毓鹏 袁琳琳 鞠伟 强仁 夏永欣 ZHANG Peng;LIU Chao;ZHAO Yupeng;YUAN Linlin;JU Wei;QIANG Ren;XIA Yongxin(Beijing Engineering Research Center of Energy Electric Power Information Security(North China Electric Power University),Beijing 102206,China;State Grid Corporation of China,Beijing 100031,China;State Grid Information and Communication Industry Group Company Limited,Beijing 102209,China)
出处 《华电技术》 CAS 2021年第2期66-71,共6页 HUADIAN TECHNOLOGY
基金 国家电网有限公司科技项目(SGZB0000AZWT2000585)。
关键词 数字新基建 智能电力 终端设备 全生命周期 安全管控机制 智能终端 智能电网 digital new infrastructure construction intelligentization power terminal equipment full life cycle security management and control mechanism intelligent terminal intelligent grid
  • 相关文献

参考文献13

二级参考文献112

  • 1伍军,段斌,黄生龙.基于可信计算方法的变电站自动化远程通信设计[J].电力系统自动化,2005,29(24):60-64. 被引量:6
  • 2王英涛,张道农,谢晓冬,何江,于跃海,王兆家.电力系统实时动态监测系统传输规约[J].电网技术,2007,31(13):81-85. 被引量:16
  • 3赵平,汪海航,谭成翔.基于防火墙日志的网络隔离安全审计系统设计与实现[J].计算机应用研究,2007,24(7):114-116. 被引量:7
  • 4高庆雍.数据库加密技术[J].邮电设计技术,2007(7):58-60. 被引量:7
  • 5Extensible markup language XML [ EB/OL]. [2011-11-12 ]. http://www, w3. org/XM L/.
  • 6W3C. Web services transaction specifications[EB/OL]. [2011- 11-12 ]. http://www, ibm. com/developerworks/library/ specification/ws-tx.
  • 7Wang Yong, Ruan Da, Gu Dawu, et al. Analysis of smart grid security standards [C] //Piseataway, NJ: IEEE, 2011.. 697-701.
  • 8Hsu Yu Lung, Lee Cheng Haw, Kreng V B. The Application of fuzzy Delphi method and fuzzy AHP in lubricant regenerative technology selection [J]. Expert Systems with Applications, 2010, 17 (1): 419-425.
  • 9郭亚军.综合评价理论、方法及扩展[M].北京:科学出版社,2012:62-75.
  • 10Qi Yuguo, Wen Fushuan, Wang Ke, et al. A fuzzy comprehen- sive evaluation and entropy weighty decision-making based method for power network structure as:ssment [J]. International Journal of Engineering, Science and Technology, 2010, 2 (5) : 92-99.

共引文献564

同被引文献51

引证文献6

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部