【文章內容簡介】
iferating rapidly for a number of reasons discussed in this this boom, relatively little attention has been paid to puter network paper describes problems posed by network security and presents a survey of methods and technologies available today to enhance network methods are discussed, including information security strategy, puter security and its relation to network security, data munications security, and data from promising areas of research close the of references:47Main heading:COMPUTER NETWORKSControlled terms:CRYPTOGRAPHYUncontrolled terms:COMMUNICATIONS SECURITYCOMPUTER NETWORK SECURITYENDTOEND ENCRYPTIONLINK ENCRYPTIONClassification code:723 Computer Software, Data Handling and ApplicationsDOI:(86)900507Database:CompendexCompilation and indexing terms, 169。 2010 Elsevier number:2008321143973Title:Computer network security strategy for coordinated distribution system operationsAuthors:Cheung, Helen1。Hamlyn, Alexander1。Wang, Lin1。Yang, Cungang1。Cheung, Richard1Author affiliation:1Ryerson University, CanadaCorresponding author:Cheung, H.(hcheung@)Source title:LESCOPE39。07Large title:2007 Large Engineering Systems Conference on Power Engineering, LESCOPE39。07Issue date:2007Publication year:2007Pages:279283Article number:4437393Language:EnglishISBN13:9781424415830Document type:Conference article(CA)Conference name:2007 Large Engineering Systems Conference on Power Engineering, LESCOPE39。07Conference date:October 10, 1331, Piscataway, NJ 088551331, United StatesAbstract:Cybersecurity for puter networks has bee a fairly serious concern for electricity utilities due to recent deregulations and distributed generations(DGs)launched in the power paper proposes a new puter network security strategy for coordinated distribution system operations with open access electricity novel utility puter network security management and authentication for action or mand requests in powergrid operations is covers security management for multiple security domains in the recently developed powergrid network security paper illustrates the significance of the proposed strategy and procedure of security checks and authentications for action or mand requests for operations in both host area electric power system(AEPS)and interconnected multiple foreign of references:7Main heading:Network managementControlled terms:Access controlAdministrative data processingA