Dennis Edwards, S. K. Srivastava, D. Cartes, S. Simmons, Norman Wilde
{"title":"多级安全模型体系结构的实现与验证","authors":"Dennis Edwards, S. K. Srivastava, D. Cartes, S. Simmons, Norman Wilde","doi":"10.1109/ISAP.2007.4441681","DOIUrl":null,"url":null,"abstract":"With the increasing complexity of transmissions grids and distribution networks, data communication security is becoming a paramount issue. This issue becomes more important in applications where software agent technology is being utilized, as software agents provide another possible channel of cyber attack. In this paper an innovative software agents-based multilevel security model architecture is presented. The goal of this architecture is to prevent known attacks, and to reduce or eliminate the consequences of successful attacks. An experimental protocol is presented to validate the developed security model architecture. Test results show the effectiveness of the developed architecture.","PeriodicalId":320068,"journal":{"name":"2007 International Conference on Intelligent Systems Applications to Power Systems","volume":"87 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Implementation and Validation of a Multi-Level Security Model Architecture\",\"authors\":\"Dennis Edwards, S. K. Srivastava, D. Cartes, S. Simmons, Norman Wilde\",\"doi\":\"10.1109/ISAP.2007.4441681\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the increasing complexity of transmissions grids and distribution networks, data communication security is becoming a paramount issue. This issue becomes more important in applications where software agent technology is being utilized, as software agents provide another possible channel of cyber attack. In this paper an innovative software agents-based multilevel security model architecture is presented. The goal of this architecture is to prevent known attacks, and to reduce or eliminate the consequences of successful attacks. An experimental protocol is presented to validate the developed security model architecture. Test results show the effectiveness of the developed architecture.\",\"PeriodicalId\":320068,\"journal\":{\"name\":\"2007 International Conference on Intelligent Systems Applications to Power Systems\",\"volume\":\"87 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2007 International Conference on Intelligent Systems Applications to Power Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISAP.2007.4441681\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 International Conference on Intelligent Systems Applications to Power Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISAP.2007.4441681","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Implementation and Validation of a Multi-Level Security Model Architecture
With the increasing complexity of transmissions grids and distribution networks, data communication security is becoming a paramount issue. This issue becomes more important in applications where software agent technology is being utilized, as software agents provide another possible channel of cyber attack. In this paper an innovative software agents-based multilevel security model architecture is presented. The goal of this architecture is to prevent known attacks, and to reduce or eliminate the consequences of successful attacks. An experimental protocol is presented to validate the developed security model architecture. Test results show the effectiveness of the developed architecture.