[1] | 韩祯祥,曹一家.电力系统的安全性及防治措施[J].电网技术,2004,28(9):1-6.
|
[2] | Han Zhenxiang,Cao Yijia.Power system security and its prevention [J].Power System Technology,2004,28(9):1-6.
|
[3] | 辛耀中.新世纪电网调度自动化技术发展趋势[J].电网技术,2001,25(12):1-10.
|
[4] | Xin Yaozhong.Development trend of power system dispatching automation in 21st century[J].Power System Technology,2001,25(12):1-10.
|
[5] | 胡炎,董名垂,韩英铎.电力工业信息安全的思考[J].电力系统自动化,2002,26(7):1-4.
|
[6] | Hu Yan,Dong Mingchui,Han Yingduo.Consideration of information security for electric power industry[J].Automation of Electric Power Systems,2002,26(7):1-4.
|
[7] | 戚宇林,刘文颖,杨以涵,等.电力信息的网络化传输是电力系统安全的重要保证[J].电网技术,2004,28(9):58-61.
|
[8] | Qi Yulin,Liu Wenying,Yang Yihan,et al.Ensuring power security by networking transmission of electric power information[J].Power System Technology,2004,28(9):58-61.
|
[9] | 陈郑平,王先培,王泉德,等.弹性文件系统在电力信息系统中的应用[J].电网技术,2005,29(13):80-84.
|
[10] | Chen Zhengping,Wang Xianpei,Wang Quande,et al.Application of resilient file system in power information system[J].Power System Technology,2005,29(13):80-84.
|
[11] | 周士跃,王劲松,金小达.地区供电网调度实时数据网络安全分析及对策[J].电网技术,2003,27(10):52-55.
|
[12] | Zhou Shiyue,Wang Jinsong,Jin Xiaoda.Security analysis and countermeasures of real-time dispatching data network for regional power supply network[J].Power System Technology,2003,27(10):52-55.
|
[13] | 陈思勤.华能上海石洞口第二电厂实时系统安全分析及防护对策[J].电网技术,2004,28(11):72-75.
|
[14] | Chen Siqin.Security analysis of real-time systems in Huaneng Shanghai Shidongkou No.2 power plant and their protection measures[J].Power System Technology,2004,28(11):72-75.
|
[15] | 周亮,刘开培,李俊娥.一种安全的电力系统计算机网络构建方案[J].电网技术,2004,28(23):71-75.
|
[16] | Zhou Liang,Liu Kaipei,Li Jun’e.A comprehensive project to construct secure computer network for power system[J].Power System Technology,2004,28(23):71-75.
|
[17] | Zeleznik M P.Security design in distributed computing applications [D].Salt Lake City,USA:the University of Utah,1993.
|
[18] | NIST SP 800-30,Risk management guide for information technology systems[S].
|
[19] | Kailay M P,Jarratt P.RAMeX: a prototype expert system for computer security risk analysis and management[J].Computers & Security,1995,14(5):449-463.
|
[20] | 戴宗坤,罗万伯.信息系统安全[M].北京:电子工业出版社,2002.
|
[21] | Macleod D,Whyte D.Layered network security design considerations:when layers collide[R].CMU,PA,USA:Information Survivability Workshops,2002.
|
[22] | Wright M.Third generation risk management practices[J].Computer Fraud & Security,1999,1999(2):9-12.
|
[23] | Baskerville R.Information systems security design methods: implications for information systems development[J].ACM Computing Surveys,1993,25(4):375-414.
|
[24] | 段海新,吴建平.计算机网络安全体系的一种框架结构及其应用[J].计算机工程与应用,2002,36(5):24-27.
|
[25] | Duan Haixin,Wu Jianping.A framework and it’s application for security architecture of computer networks[J].Computer Engineering and Applications,2002,36(5):24-27.
|
[26] | NIST FIPS PUB 197,Advanced encryption standard[S].
|
[27] | 国家973信息与网络安全体系研究课题组.信息保障技术框架(IATF)3.0[M].北京:北京中软电子出版社,2002.
|
[28] | DoD.Technical architecture framework for information management: Vol 1-8[EB/OL].http://citeseer.ist.psu.edu/489302.html,1996.
|
[29] | ISO/IEC TR 13335-5,Guidelines for the management of IT security- part5:safeguards for external connections[S].
|
[30] | SSE-CMM Project.Systems security engineering—capability maturity model:model description document version 2.0[EB/OL].http:// www.sse-cmm.org,1999.
|
[31] | ISO/IEC 15408-2,Information technology-security techniques- evaluation criteria for IT security–part 2:security functions requirements [S].
|
[32] | NIST.Federal information technology security assessment framework [EB/OL].http://www.cio.gov/archive/federal_it_security_assessment_framework.html,2000.
|
[33] | NIST SP 800-26,Security self-assessment guide for information technology systems[S].
|
[34] | 国家经贸委[2002]第30号令.电网和电厂计算机监控系统及调度数据网络安全防护的规定[Z].北京:国家经贸委,2002.
|
[35] | 国家电监会第5号令.电力二次系统安全防护规定[Z].北京:国家电监会,2004.
|
[36] | Bell D E,Padula L J La.Secure computer systems: a mathematical model[R].USA:The MITRE Corporation,1973.
|
[37] | Biba K J.Integrity considerations for secure computer systems[R].
|
[38] | USA:The MITRE Corporation,1977.
|
[39] | Denning D E.A lattice model of secure information flow[J].Commun. ACM,1976,19(5):236-242.
|
[40] | Goguen J,Meseguer J.Security policies and security models [C].Proceedings of the 1989 IEEE Symposium on Security and Privacy,Oakland,California,USA,1982:11-22.
|
[41] | Brewer D,Nash M.The Chinese wall security policy[C].Proceedings of the 1989 IEEE Symposium on Security and Privacy,Oakland,California,USA,1989:206-214.
|
[42] | Sandhu R S.Role-based access control models[J].IEEE Computer,1996,29(2):38-47.
|
[43] | Denning D E.The limits of formal security models[EB/OL].http:// www.cs.georgetown.edu/~denning/infosec /award.html,1999.
|
[44] | 关义章,戴宗坤.信息系统安全工程学[M].北京:电子工业出版社,2002.
|
[45] | Schumacher M,Roedig U.Security engineering with patterns [C].Proceedings of the 8th Conference on Pattern Languages of Programs,Monticello,Illinois,USA,2001:208-210.
|
[46] | SSE-CMM Project.Systems security engineering-capability maturity model:appraisal method version 2.0[EB/OL].http://www.sse- cmm.org,1999.
|
[47] | Hopkinson J P.System security engineering—capability maturity model organization profiles[EB/OL].http://philby.ucsd.edu/~cse291_ IDVA/papers/hopkinson.system_security_engineering_capabilit_maturity_model.pdf,1996.
|
[48] | Hopkinson J P.The relationship between the SSE-CMM and IT security guidance documentation[EB/OL].http://www.sse-cmm.org /lib/Papers/sse-guides.pdf,2001.
|
[49] | Gerber M,Solms R von.From risk analysis to security requirements [J].Computers & Security,2001,20(7):577-584.
|
[50] | Bell D E,Lapadula L.Secure computer systems: unified exposition and multics interpretation[R].USA:The MITRE Corporation,1976.
|
[51] | Varadharajan V.Petri net based modeling of information flow security requirements[C].Proceedings of IEEE Computer Security Foundations Workshop III,Los Alamitos,California,USA,1990:51-61.
|
[52] | Creps R E.A methodology for defining application-specific security requirements for C3 systems[C].Proceedings of IEEE Military Communications Conference,Boston,USA,1989,3:900-904.
|
[53] | Moore A P.Security requirements engineering through iterative intrusion—aware design[EB/OL].http://www.cert.org/archive/pdf /req_position.pdf,2001.
|
[54] | Moore A P,Ellison R J,Linger R C.Attack modeling for information security and survivability[R].Pittsburgh,PA,USA:CMU/SEI,2001.
|
[55] | Henning R R.Use of the ZACHMAN architecture for security engineering[C].Proceedings of the 19th National Information Systems Security Conference,Baltimore,MD,USA,1996:398-409.
|
[56] | McDermott J,Fox C.Using abuse case models for security requirements analysis[C].Proceedings of the 15th Annual Computer Security Applications Conference,Phoenix,Arizona,1999:55-64.
|
[57] | Sindre G,Opdahl A L.Eliciting security requirements by misuse cases[C].Proceedings of TOOLS Pacific 2000,Sydney,Australia,2000:120-131.
|
[58] | IEC TC 57 ad-hoc WG06.Data and communication security [R].USA:IEC TC 57,1999.
|
[59] | Ellison R J,Fisher D A,Linger R C,et al.Survivable network systems: an emerging discipline[R].Pittsburgh,PA,USA:CMU/SEI,1999.
|
[60] | Bakken D,Bose A,Dyreson C,et al.Impediments to survivability of the electric power grid and some collaborative EE-CS research issues to solve them[R].CMU,PA,USA:Information Survivability Workshops,2001.
|
[61] | Bakken D,Bose A,Bhowmik S.Survivability and status dissemination in combined electric power and computer communications networks [R].CMU,PA,USA:Information Survivability Workshops,2000.
|
[62] | Bologna S,Lambiase F,Ratto E.Large scale electric power distribution and telecommunication systems survivability[R].CMU,PA,USA:Information Survivability Workshops,2001.
|
[63] | Hale J,Bose A.Information survivability in the electric utility industry[R].CMU,PA,USA:Information Survivability Workshops,1998.
|
[64] | Byon I.Survivability of the U.S. electric power industry[D].Pittsburgh,PA,USA:Carnegie Mellon University Information Networking Institute,2000.
|
[65] | Linger R C,Moore A P.Foundations for survivable system development:service traces, intrusion traces,and evaluation models[R].Pittsburgh,PA,USA:CMU/SEI,2001.
|
[66] | Belani R V,Das S M,Fisher D.One-to-one modeling and simulation of unbounded systems:experiences and lessons[C].Proceedings of IEEE/ACM Winter Simulation Conference,San Diego,CA,USA,2002,1:720-724.
|
[67] | 胡炎,谢小荣,韩英铎,等.电力信息系统安全体系设计方法综述[J].电网技术,2005,29(1):35-39.
|
[68] | Hu Yan,Xie Xiaorong,Han Yingduo,et al.A survey to design method of security architecture for power information systems [J].Power System Technology,2005,29(1):35-39.
|