Research on Information Security Protection of Active Distribution Network Based on Trusted Computing

نویسندگان

چکیده

Abstract In the continuous innovation and development of smart power grid in China, active distribution network as an important part, corresponding information security protection work has received attention whole society. On basis understanding current operation system, this paper analyzes discusses practical application cases by clarifying safety safe credible schemes network.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Research on ATN - based Trusted Cloud Computing Security Model ⋆

In cloud computing environment, the trust relationship between resources is hard to define. By analyzing the layered framework for cloud service, we find a regulation for building the trust within the two strange entities. Along with this regulation, we propose a 3-layer trust framework for evaluating trust relationship in cloud computing. Combined with trust computing and automated negotiation...

متن کامل

Active Protection of Trusted Security Services

Secure electronic communication relies on the application of cryptography. Recently, there has been an explosion in the growth of Public Key Infrastructure technology, where centralized or partially centralized services provide addresses and keys for participants desiring to establish secure channels with one another. We consider the traffic to and from these servers to be the foundation of the...

متن کامل

Research on Data Leak Protection Technology Based on Trusted Platform

In order to guard against the leakage of important data in the system, a new model of data protection is proposed in the paper, which is also targeted at the shortcomings in the existing data protection technology in the field of data leakage prevention. By taking advantage of TPM data protection technique as well as the combination of symmetric encryption and asymmetric encryption, a new data ...

متن کامل

Copyright Protection Protocols for Multimedia Distribution Based on Trusted Hardware

The advent of the Web, electronic commerce and the creation of electronic distribution channels for multimedia content have brought new challenges regarding the protection of intellectual property. As it has become increasingly difficult to protect the distribution medium against copying, techniques for asserting the copyright on information have gained in importance. A particularly promising m...

متن کامل

Research Workshop on Challenges for Trusted Computing

This article identifies and discusses some of the key challenges that need to be addressed if the vision of Trusted Computing is to become reality. Topics addressed include issues with setting up and maintaining the PKI required to support the full set of Trusted Computing functionality, the practical use and verification of attestation evidence, and backwards compatibility, usability and compl...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of physics

سال: 2021

ISSN: ['0022-3700', '1747-3721', '0368-3508', '1747-3713']

DOI: https://doi.org/10.1088/1742-6596/2136/1/012013