K. Kato, I. Dabbaghchi, J. Allemong, J. Robinson, J. Singh, R.A. Smith
{"title":"实时数据交换用于在线安全评估","authors":"K. Kato, I. Dabbaghchi, J. Allemong, J. Robinson, J. Singh, R.A. Smith","doi":"10.1109/PICA.1991.160649","DOIUrl":null,"url":null,"abstract":"The current status and near-term future goals of real-time data exchange for online security assessment in several regions of the US are described from the viewpoint of the end-user application, namely, security assessment. An overview of the issues concerning data exchange for external network modeling is presented. Several data exchange systems are discussed. The following information is provided: description, justification of data exchange, uses for the data, types and quantities of the data exchanged, frequency of data exchange, impact of data exchange on the system modeling detail, feasibility of implementing online security assessment without data exchange, exchange of supporting static data, effort to establish and maintain data exchange, and problems/solutions.<<ETX>>","PeriodicalId":287152,"journal":{"name":"[Proceedings] Conference Papers 1991 Power Industry Computer Application Conference","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1991-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":"{\"title\":\"Real-time data exchange for on-line security assessment\",\"authors\":\"K. Kato, I. Dabbaghchi, J. Allemong, J. Robinson, J. Singh, R.A. Smith\",\"doi\":\"10.1109/PICA.1991.160649\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The current status and near-term future goals of real-time data exchange for online security assessment in several regions of the US are described from the viewpoint of the end-user application, namely, security assessment. An overview of the issues concerning data exchange for external network modeling is presented. Several data exchange systems are discussed. The following information is provided: description, justification of data exchange, uses for the data, types and quantities of the data exchanged, frequency of data exchange, impact of data exchange on the system modeling detail, feasibility of implementing online security assessment without data exchange, exchange of supporting static data, effort to establish and maintain data exchange, and problems/solutions.<<ETX>>\",\"PeriodicalId\":287152,\"journal\":{\"name\":\"[Proceedings] Conference Papers 1991 Power Industry Computer Application Conference\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1991-05-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"15\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"[Proceedings] Conference Papers 1991 Power Industry Computer Application Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PICA.1991.160649\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"[Proceedings] Conference Papers 1991 Power Industry Computer Application Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PICA.1991.160649","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Real-time data exchange for on-line security assessment
The current status and near-term future goals of real-time data exchange for online security assessment in several regions of the US are described from the viewpoint of the end-user application, namely, security assessment. An overview of the issues concerning data exchange for external network modeling is presented. Several data exchange systems are discussed. The following information is provided: description, justification of data exchange, uses for the data, types and quantities of the data exchanged, frequency of data exchange, impact of data exchange on the system modeling detail, feasibility of implementing online security assessment without data exchange, exchange of supporting static data, effort to establish and maintain data exchange, and problems/solutions.<>