{"title":"电力系统人员数据安全基础","authors":"R. Klump","doi":"10.1109/EIT.2010.5612165","DOIUrl":null,"url":null,"abstract":"This presentation will describe the ways in which data is kept secret, verified to have come from a particular origin, and protected from unwanted modification while in transit. Such technology, which belongs to a field called Encryption and Authentication Systems, is very important to understand if you are an engineer or manager considering how to protect measurement and control data on the emerging smart electrical grid. This talk will explain symmetric and asymmetric cryptosystems and then explain how they are and may be applied to electric power applications.","PeriodicalId":305049,"journal":{"name":"2010 IEEE International Conference on Electro/Information Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Data security fundamentals for power systems personnel\",\"authors\":\"R. Klump\",\"doi\":\"10.1109/EIT.2010.5612165\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This presentation will describe the ways in which data is kept secret, verified to have come from a particular origin, and protected from unwanted modification while in transit. Such technology, which belongs to a field called Encryption and Authentication Systems, is very important to understand if you are an engineer or manager considering how to protect measurement and control data on the emerging smart electrical grid. This talk will explain symmetric and asymmetric cryptosystems and then explain how they are and may be applied to electric power applications.\",\"PeriodicalId\":305049,\"journal\":{\"name\":\"2010 IEEE International Conference on Electro/Information Technology\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-05-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 IEEE International Conference on Electro/Information Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EIT.2010.5612165\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 IEEE International Conference on Electro/Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EIT.2010.5612165","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Data security fundamentals for power systems personnel
This presentation will describe the ways in which data is kept secret, verified to have come from a particular origin, and protected from unwanted modification while in transit. Such technology, which belongs to a field called Encryption and Authentication Systems, is very important to understand if you are an engineer or manager considering how to protect measurement and control data on the emerging smart electrical grid. This talk will explain symmetric and asymmetric cryptosystems and then explain how they are and may be applied to electric power applications.