全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
电网技术  2014 

基于角色的电力SCADA系统多区域权限访问控制模型设计

DOI: 10.13335/j.1000-3673.pst.2014.04.046, PP. 1122-1126

Keywords: 权限管理,SCADA系统,基于角色的访问控制,多区域访问控制

Full-Text   Cite this paper   Add to My Lib

Abstract:

针对电网调控一体化条件下权限访问控制过于复杂的问题,分析了传统的自主访问控制方法、强制访问控制方法和基于角色的访问控制方法的不足,基于目前的SCADA系统,提出一种多区域权限管理模型。该模型以角色访问控制模型为基础,引入责任区的概念,把权限拆分为区域权限与公共服务权限,使得权限能够基于责任区进行分流,并根据调度人员生产和管理的要需,划分不同的调度职责范围,在不同责任区内分配不同权限,满足现代SCADA系统根据区域进行权限差异化管理的需求,有效避免了跨管辖范围误操作。项目实践验证了该模型的有效性和可靠性。

References

[1]  刘东,闫红漫,丁振华,等.SCADA主站系统集成测试技术研究[J].电网技术,2005,29(2):63-67.Liu Dong,Yan Hongman,Ding Zhenhua,et al.Research on integration testing technology for main station in SCADA system[J].Power System Technology,2005,29(2):63-67(in Chinese).
[2]  蔡声霞,王守相,王成山,等.智能电网的经济学视角思考[J].电力系统自动化,2009,33(20):13-16.Cai Shengxia,Wang Shouxiang,Wang Chengshan,et al.Considerations of smart grid in the perspective of economics[J].Automation of Electric Power Systems,2009,33(20):13-16 (in Chinese).
[3]  黄军高,王首顶,凌强,等.时间序列数据库在地区电网调控一体化系统中的应用[J].电力系统自动化,2011,35(23):107-111.Huang Jungao,Wang Shouding,Ling Qiang, et al.Application of time sequence database in an integrated system for dispatch and control of regional power system[J].Automation of Electric Power Systems,2011,35(23):107-111(in Chinese).
[4]  赵亮,钱玉春.适应集约化管理的地方电网调度集控一体化建设思路[J].电力系统自动化,2010,34(14):96-99.Zhao Liang,Qian Yuchun.Integrative construction of regional grid dispatch and control center for intensive management[J].Automation of Electric Power Systems,2010,34(14):96-99(in Chinese).
[5]  张强,张伯明,李鹏.智能电网调度控制架构和概念发展述评[J].电力自动化设备,2010,30(12):1-6.Zhang Qiang,Zhang Boming,Li Peng.Review of structure and concept evolution of dispatch and control system for smart grid[J].Electric Power Automation Equipment,2010,30(12):1-6 (in Chinese).
[6]  颜娜,段斌,邓清勇,等.风电场SCADA系统边界安全模型设计[J].电网技术,2009,33(7):24-29.Yan Na,Duan Bin,Deng Qingyong,et al.Design of border security model of SCADA system for wind power farm[J].Power System Technology,2009,33(7):24-29(in Chinese).
[7]  黄炜,张杰明,綦孝文,等.调度集控一体化系统责任区管理和告警解决方案[J].电网技术,2007,31(2):264-267.Huang Wei,Zhang Jieming,Qi Xiaowen,et al.Solution to alarming and management of duty region in integrated system of dispatching and centralized control[J].Power System Technology,2007,31(2):264-267 (in Chinese).
[8]  刘莉莉,段斌,李晶,等.基于IEC61850的风电场SCADA系统安全访问控制模型设计[J].电网技术,2008,32(1):76-81.Liu Lili,Duan Bin,Li Jing,et al.Design of IEC 61850 based secure access control model of SCADA system for wind power farm[J].Power System Technology,2008,32(1):76-81(in Chinese).
[9]  马立林,李红.基于RBAC的SaaS系统的权限模型[J].计算机应用与软件,2010,27(4):42-44.Ma Lilin,Li Hong.A permission model of SaaS system based on RBAC[J].Computer Applications and Software,2010,27(4):42-44 (in Chinese).
[10]  冯俊,王箭.一种基于T-RBAC的访问控制改进模型[J].计算机工程,2012,38(16):138-141.Feng Jun,Wang Jian.Improved access control model based on T-RBAC[J].Computer Engineering,2012,38(16):138-141(in Chinese).
[11]  张道银.综合的访问控制策略及其应用研究[J].计算机工程与设计,2009,30(15):3514-3516.Zhang Daoyin.Research on hybrid access control policy and its application[J].Computer Engineering and Design,2009,30(15):3514-3516(in Chinese).
[12]  周锦程,张佳强,冷文浩.可扩展系统中基于RBAC模型的访问控制[J].计算机工程,2009,35(14):145-147.Zhou Jincheng,Zhang Jiaqiang,Leng Wenhao.Access control based on RBAC model in extensible system[J].Computer Engineering,2009,35(14):145-147(in Chinese).
[13]  何鸿君,罗莉,曹四化,等.基于用户意愿的文件访问控制策略[J].国防科技大学学报,2007,29(6):54-58.He Hongjun,Luo Li,Cao Sihua,et al.A file access control policy based on user’s intention[J].Journal of National University of Defense Technology,2007,29(6):54-58(in Chinese).
[14]  费洪晓,陈炯,邓小鸿,等.面向资源所有者访问控制模型的设计与实现[J].计算机应用与软件,2012,29(6):26-28.Fei Hongxiao,Chen Jiong,Deng Xiaohong,et al.Design and implementation of resource owners-oriented access control model[J].Computer Applications and Software,2012,29(6):26-28 (in Chinese).
[15]  孟宇龙,印桂生,王慧强.应用WEMLS的安全数据集成模型[J].计算机工程,2010,36(12):1-3.Meng Yulong,Yin Guisheng,Wang Huiqiang.Security data integration model using WEMLS[J].Computer Engineering,2010,36(12):1-3(in Chinese).
[16]  韩若飞,汪厚祥,杜辉,等.一种军用的基于任务-角色的访问控制模型[J].计算机工程,2006,32(23):165-167.Han Ruofei,Wang Houxiang,Du Hui,et al.Task role based access control model of military use[J].Computer Engineering,2006,32(23):165-167(in Chinese).
[17]  Richard Kuhn D,Coyne E J,Weil T R.Adding attributes to role-based access control[J].IEEE Computer,2010,43(6):79-81.
[18]  Qun Ni,Elisa Bertino,Jorge Lobo,et al.Privacy-aware role-based access control[J].ACM Transactions on Information and System Security,2010,13(3):41-50.
[19]  邢汉发,许礼林,雷莹.基于角色和用户组的扩展访问控制模型[J].计算机应用研究,2009,26(3):1098-1100.Xing Hanfa,Xu Lilin,Lei Ying.Extended access control approach based on role and group[J].Application Research of Computers,2009,26(3):1098-1100 (in Chinese).

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133