刘东,闫红漫,丁振华,等.SCADA主站系统集成测试技术研究[J].电网技术,2005,29(2):63-67.Liu Dong,Yan Hongman,Ding Zhenhua,et al.Research on integration testing technology for main station in SCADA system[J].Power System Technology,2005,29(2):63-67(in Chinese).
[2]
蔡声霞,王守相,王成山,等.智能电网的经济学视角思考[J].电力系统自动化,2009,33(20):13-16.Cai Shengxia,Wang Shouxiang,Wang Chengshan,et al.Considerations of smart grid in the perspective of economics[J].Automation of Electric Power Systems,2009,33(20):13-16 (in Chinese).
[3]
黄军高,王首顶,凌强,等.时间序列数据库在地区电网调控一体化系统中的应用[J].电力系统自动化,2011,35(23):107-111.Huang Jungao,Wang Shouding,Ling Qiang, et al.Application of time sequence database in an integrated system for dispatch and control of regional power system[J].Automation of Electric Power Systems,2011,35(23):107-111(in Chinese).
[4]
赵亮,钱玉春.适应集约化管理的地方电网调度集控一体化建设思路[J].电力系统自动化,2010,34(14):96-99.Zhao Liang,Qian Yuchun.Integrative construction of regional grid dispatch and control center for intensive management[J].Automation of Electric Power Systems,2010,34(14):96-99(in Chinese).
[5]
张强,张伯明,李鹏.智能电网调度控制架构和概念发展述评[J].电力自动化设备,2010,30(12):1-6.Zhang Qiang,Zhang Boming,Li Peng.Review of structure and concept evolution of dispatch and control system for smart grid[J].Electric Power Automation Equipment,2010,30(12):1-6 (in Chinese).
[6]
颜娜,段斌,邓清勇,等.风电场SCADA系统边界安全模型设计[J].电网技术,2009,33(7):24-29.Yan Na,Duan Bin,Deng Qingyong,et al.Design of border security model of SCADA system for wind power farm[J].Power System Technology,2009,33(7):24-29(in Chinese).
[7]
黄炜,张杰明,綦孝文,等.调度集控一体化系统责任区管理和告警解决方案[J].电网技术,2007,31(2):264-267.Huang Wei,Zhang Jieming,Qi Xiaowen,et al.Solution to alarming and management of duty region in integrated system of dispatching and centralized control[J].Power System Technology,2007,31(2):264-267 (in Chinese).
[8]
刘莉莉,段斌,李晶,等.基于IEC61850的风电场SCADA系统安全访问控制模型设计[J].电网技术,2008,32(1):76-81.Liu Lili,Duan Bin,Li Jing,et al.Design of IEC 61850 based secure access control model of SCADA system for wind power farm[J].Power System Technology,2008,32(1):76-81(in Chinese).
[9]
马立林,李红.基于RBAC的SaaS系统的权限模型[J].计算机应用与软件,2010,27(4):42-44.Ma Lilin,Li Hong.A permission model of SaaS system based on RBAC[J].Computer Applications and Software,2010,27(4):42-44 (in Chinese).
[10]
冯俊,王箭.一种基于T-RBAC的访问控制改进模型[J].计算机工程,2012,38(16):138-141.Feng Jun,Wang Jian.Improved access control model based on T-RBAC[J].Computer Engineering,2012,38(16):138-141(in Chinese).
[11]
张道银.综合的访问控制策略及其应用研究[J].计算机工程与设计,2009,30(15):3514-3516.Zhang Daoyin.Research on hybrid access control policy and its application[J].Computer Engineering and Design,2009,30(15):3514-3516(in Chinese).
[12]
周锦程,张佳强,冷文浩.可扩展系统中基于RBAC模型的访问控制[J].计算机工程,2009,35(14):145-147.Zhou Jincheng,Zhang Jiaqiang,Leng Wenhao.Access control based on RBAC model in extensible system[J].Computer Engineering,2009,35(14):145-147(in Chinese).
[13]
何鸿君,罗莉,曹四化,等.基于用户意愿的文件访问控制策略[J].国防科技大学学报,2007,29(6):54-58.He Hongjun,Luo Li,Cao Sihua,et al.A file access control policy based on user’s intention[J].Journal of National University of Defense Technology,2007,29(6):54-58(in Chinese).
[14]
费洪晓,陈炯,邓小鸿,等.面向资源所有者访问控制模型的设计与实现[J].计算机应用与软件,2012,29(6):26-28.Fei Hongxiao,Chen Jiong,Deng Xiaohong,et al.Design and implementation of resource owners-oriented access control model[J].Computer Applications and Software,2012,29(6):26-28 (in Chinese).
[15]
孟宇龙,印桂生,王慧强.应用WEMLS的安全数据集成模型[J].计算机工程,2010,36(12):1-3.Meng Yulong,Yin Guisheng,Wang Huiqiang.Security data integration model using WEMLS[J].Computer Engineering,2010,36(12):1-3(in Chinese).
[16]
韩若飞,汪厚祥,杜辉,等.一种军用的基于任务-角色的访问控制模型[J].计算机工程,2006,32(23):165-167.Han Ruofei,Wang Houxiang,Du Hui,et al.Task role based access control model of military use[J].Computer Engineering,2006,32(23):165-167(in Chinese).
[17]
Richard Kuhn D,Coyne E J,Weil T R.Adding attributes to role-based access control[J].IEEE Computer,2010,43(6):79-81.
[18]
Qun Ni,Elisa Bertino,Jorge Lobo,et al.Privacy-aware role-based access control[J].ACM Transactions on Information and System Security,2010,13(3):41-50.
[19]
邢汉发,许礼林,雷莹.基于角色和用户组的扩展访问控制模型[J].计算机应用研究,2009,26(3):1098-1100.Xing Hanfa,Xu Lilin,Lei Ying.Extended access control approach based on role and group[J].Application Research of Computers,2009,26(3):1098-1100 (in Chinese).