全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
电网技术  2006 

电力信息系统现有安全设计方法分析比较

, PP. 36-42

Keywords: 计算机和网络安全,电力信息系统,安全体系设计,风险管理方法,安全需求分析,可生存系统

Full-Text   Cite this paper   Add to My Lib

Abstract:

电力信息系统是典型的分布式互连系统,需要采用系统化的方法进行安全设计。文章分析了风险管理方法、遵循安全设计指南方法、形式化验证方法、“发现修改”方法、预防性安全设计方法等现有安全设计方法的特点和不足,总结了信息系统安全工程过程、安全需求分析方法、可生存系统分析设计等方面研究的可借鉴之处。文章采用的分析不同安全设计方法的角度可用于安全设计方法的分类和比较,有利于对安全设计过程的进一步深入研究。

References

[1]  韩祯祥,曹一家.电力系统的安全性及防治措施[J].电网技术,2004,28(9):1-6.
[2]  Han Zhenxiang,Cao Yijia.Power system security and its prevention [J].Power System Technology,2004,28(9):1-6.
[3]    辛耀中.新世纪电网调度自动化技术发展趋势[J].电网技术,2001,25(12):1-10.
[4]  Xin Yaozhong.Development trend of power system dispatching automation in 21st century[J].Power System Technology,2001,25(12):1-10.
[5]    胡炎,董名垂,韩英铎.电力工业信息安全的思考[J].电力系统自动化,2002,26(7):1-4.
[6]  Hu Yan,Dong Mingchui,Han Yingduo.Consideration of information security for electric power industry[J].Automation of Electric Power Systems,2002,26(7):1-4.
[7]  戚宇林,刘文颖,杨以涵,等.电力信息的网络化传输是电力系统安全的重要保证[J].电网技术,2004,28(9):58-61.
[8]  Qi Yulin,Liu Wenying,Yang Yihan,et al.Ensuring power security by networking transmission of electric power information[J].Power System Technology,2004,28(9):58-61.
[9]  陈郑平,王先培,王泉德,等.弹性文件系统在电力信息系统中的应用[J].电网技术,2005,29(13):80-84.
[10]  Chen Zhengping,Wang Xianpei,Wang Quande,et al.Application of resilient file system in power information system[J].Power System Technology,2005,29(13):80-84.
[11]    周士跃,王劲松,金小达.地区供电网调度实时数据网络安全分析及对策[J].电网技术,2003,27(10):52-55.
[12]  Zhou Shiyue,Wang Jinsong,Jin Xiaoda.Security analysis and countermeasures of real-time dispatching data network for regional power supply network[J].Power System Technology,2003,27(10):52-55.
[13]    陈思勤.华能上海石洞口第二电厂实时系统安全分析及防护对策[J].电网技术,2004,28(11):72-75.
[14]  Chen Siqin.Security analysis of real-time systems in Huaneng Shanghai Shidongkou No.2 power plant and their protection measures[J].Power System Technology,2004,28(11):72-75.
[15]  周亮,刘开培,李俊娥.一种安全的电力系统计算机网络构建方案[J].电网技术,2004,28(23):71-75.
[16]  Zhou Liang,Liu Kaipei,Li Jun’e.A comprehensive project to construct secure computer network for power system[J].Power System Technology,2004,28(23):71-75.
[17]  Zeleznik M P.Security design in distributed computing applications [D].Salt Lake City,USA:the University of Utah,1993.
[18]  NIST SP 800-30,Risk management guide for information technology systems[S].
[19]  Kailay M P,Jarratt P.RAMeX: a prototype expert system for computer security risk analysis and management[J].Computers & Security,1995,14(5):449-463.
[20]  戴宗坤,罗万伯.信息系统安全[M].北京:电子工业出版社,2002.
[21]  Macleod D,Whyte D.Layered network security design considerations:when layers collide[R].CMU,PA,USA:Information Survivability Workshops,2002.
[22]  Wright M.Third generation risk management practices[J].Computer Fraud & Security,1999,1999(2):9-12.
[23]  Baskerville R.Information systems security design methods: implications for information systems development[J].ACM Computing Surveys,1993,25(4):375-414.
[24]  段海新,吴建平.计算机网络安全体系的一种框架结构及其应用[J].计算机工程与应用,2002,36(5):24-27.
[25]  Duan Haixin,Wu Jianping.A framework and it’s application for security architecture of computer networks[J].Computer Engineering and Applications,2002,36(5):24-27.
[26]  NIST FIPS PUB 197,Advanced encryption standard[S].
[27]  国家973信息与网络安全体系研究课题组.信息保障技术框架(IATF)3.0[M].北京:北京中软电子出版社,2002.
[28]  DoD.Technical architecture framework for information management: Vol 1-8[EB/OL].http://citeseer.ist.psu.edu/489302.html,1996.
[29]  ISO/IEC TR 13335-5,Guidelines for the management of IT security- part5:safeguards for external connections[S].
[30]  SSE-CMM Project.Systems security engineering—capability maturity model:model description document version 2.0[EB/OL].http:// www.sse-cmm.org,1999.
[31]  ISO/IEC 15408-2,Information technology-security techniques- evaluation criteria for IT security–part 2:security functions requirements [S].
[32]  NIST.Federal information technology security assessment framework [EB/OL].http://www.cio.gov/archive/federal_it_security_assessment_framework.html,2000.
[33]  NIST SP 800-26,Security self-assessment guide for information technology systems[S].
[34]  国家经贸委[2002]第30号令.电网和电厂计算机监控系统及调度数据网络安全防护的规定[Z].北京:国家经贸委,2002.
[35]  国家电监会第5号令.电力二次系统安全防护规定[Z].北京:国家电监会,2004.
[36]  Bell D E,Padula L J La.Secure computer systems: a mathematical model[R].USA:The MITRE Corporation,1973.
[37]  Biba K J.Integrity considerations for secure computer systems[R].
[38]  USA:The MITRE Corporation,1977.
[39]  Denning D E.A lattice model of secure information flow[J].Commun. ACM,1976,19(5):236-242.
[40]  Goguen J,Meseguer J.Security policies and security models [C].Proceedings of the 1989 IEEE Symposium on Security and Privacy,Oakland,California,USA,1982:11-22.
[41]  Brewer D,Nash M.The Chinese wall security policy[C].Proceedings of the 1989 IEEE Symposium on Security and Privacy,Oakland,California,USA,1989:206-214.
[42]  Sandhu R S.Role-based access control models[J].IEEE Computer,1996,29(2):38-47.
[43]  Denning D E.The limits of formal security models[EB/OL].http:// www.cs.georgetown.edu/~denning/infosec /award.html,1999.
[44]  关义章,戴宗坤.信息系统安全工程学[M].北京:电子工业出版社,2002.
[45]  Schumacher M,Roedig U.Security engineering with patterns [C].Proceedings of the 8th Conference on Pattern Languages of Programs,Monticello,Illinois,USA,2001:208-210.
[46]  SSE-CMM Project.Systems security engineering-capability maturity model:appraisal method version 2.0[EB/OL].http://www.sse- cmm.org,1999.
[47]  Hopkinson J P.System security engineering—capability maturity model organization profiles[EB/OL].http://philby.ucsd.edu/~cse291_ IDVA/papers/hopkinson.system_security_engineering_capabilit_maturity_model.pdf,1996.
[48]  Hopkinson J P.The relationship between the SSE-CMM and IT security guidance documentation[EB/OL].http://www.sse-cmm.org /lib/Papers/sse-guides.pdf,2001.
[49]  Gerber M,Solms R von.From risk analysis to security requirements [J].Computers & Security,2001,20(7):577-584.
[50]  Bell D E,Lapadula L.Secure computer systems: unified exposition and multics interpretation[R].USA:The MITRE Corporation,1976.
[51]  Varadharajan V.Petri net based modeling of information flow security requirements[C].Proceedings of IEEE Computer Security Foundations Workshop III,Los Alamitos,California,USA,1990:51-61.
[52]  Creps R E.A methodology for defining application-specific security requirements for C3 systems[C].Proceedings of IEEE Military Communications Conference,Boston,USA,1989,3:900-904.
[53]  Moore A P.Security requirements engineering through iterative intrusion—aware design[EB/OL].http://www.cert.org/archive/pdf /req_position.pdf,2001.
[54]  Moore A P,Ellison R J,Linger R C.Attack modeling for information security and survivability[R].Pittsburgh,PA,USA:CMU/SEI,2001.
[55]  Henning R R.Use of the ZACHMAN architecture for security engineering[C].Proceedings of the 19th National Information Systems Security Conference,Baltimore,MD,USA,1996:398-409.
[56]  McDermott J,Fox C.Using abuse case models for security requirements analysis[C].Proceedings of the 15th Annual Computer Security Applications Conference,Phoenix,Arizona,1999:55-64.
[57]  Sindre G,Opdahl A L.Eliciting security requirements by misuse cases[C].Proceedings of TOOLS Pacific 2000,Sydney,Australia,2000:120-131.
[58]  IEC TC 57 ad-hoc WG06.Data and communication security [R].USA:IEC TC 57,1999.
[59]  Ellison R J,Fisher D A,Linger R C,et al.Survivable network systems: an emerging discipline[R].Pittsburgh,PA,USA:CMU/SEI,1999.
[60]  Bakken D,Bose A,Dyreson C,et al.Impediments to survivability of the electric power grid and some collaborative EE-CS research issues to solve them[R].CMU,PA,USA:Information Survivability Workshops,2001.
[61]  Bakken D,Bose A,Bhowmik S.Survivability and status dissemination in combined electric power and computer communications networks [R].CMU,PA,USA:Information Survivability Workshops,2000.
[62]  Bologna S,Lambiase F,Ratto E.Large scale electric power distribution and telecommunication systems survivability[R].CMU,PA,USA:Information Survivability Workshops,2001.
[63]  Hale J,Bose A.Information survivability in the electric utility industry[R].CMU,PA,USA:Information Survivability Workshops,1998.
[64]  Byon I.Survivability of the U.S. electric power industry[D].Pittsburgh,PA,USA:Carnegie Mellon University Information Networking Institute,2000.
[65]  Linger R C,Moore A P.Foundations for survivable system development:service traces, intrusion traces,and evaluation models[R].Pittsburgh,PA,USA:CMU/SEI,2001.
[66]  Belani R V,Das S M,Fisher D.One-to-one modeling and simulation of unbounded systems:experiences and lessons[C].Proceedings of IEEE/ACM Winter Simulation Conference,San Diego,CA,USA,2002,1:720-724.
[67]  胡炎,谢小荣,韩英铎,等.电力信息系统安全体系设计方法综述[J].电网技术,2005,29(1):35-39.
[68]  Hu Yan,Xie Xiaorong,Han Yingduo,et al.A survey to design method of security architecture for power information systems [J].Power System Technology,2005,29(1):35-39.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133