Research on Information Security Protection of Active Distribution Network Based on Trusted Computing
نویسندگان
چکیده
Abstract In the continuous innovation and development of smart power grid in China, active distribution network as an important part, corresponding information security protection work has received attention whole society. On basis understanding current operation system, this paper analyzes discusses practical application cases by clarifying safety safe credible schemes network.
منابع مشابه
Research on ATN - based Trusted Cloud Computing Security Model ⋆
In cloud computing environment, the trust relationship between resources is hard to define. By analyzing the layered framework for cloud service, we find a regulation for building the trust within the two strange entities. Along with this regulation, we propose a 3-layer trust framework for evaluating trust relationship in cloud computing. Combined with trust computing and automated negotiation...
متن کاملActive Protection of Trusted Security Services
Secure electronic communication relies on the application of cryptography. Recently, there has been an explosion in the growth of Public Key Infrastructure technology, where centralized or partially centralized services provide addresses and keys for participants desiring to establish secure channels with one another. We consider the traffic to and from these servers to be the foundation of the...
متن کاملResearch on Data Leak Protection Technology Based on Trusted Platform
In order to guard against the leakage of important data in the system, a new model of data protection is proposed in the paper, which is also targeted at the shortcomings in the existing data protection technology in the field of data leakage prevention. By taking advantage of TPM data protection technique as well as the combination of symmetric encryption and asymmetric encryption, a new data ...
متن کاملCopyright Protection Protocols for Multimedia Distribution Based on Trusted Hardware
The advent of the Web, electronic commerce and the creation of electronic distribution channels for multimedia content have brought new challenges regarding the protection of intellectual property. As it has become increasingly difficult to protect the distribution medium against copying, techniques for asserting the copyright on information have gained in importance. A particularly promising m...
متن کاملResearch Workshop on Challenges for Trusted Computing
This article identifies and discusses some of the key challenges that need to be addressed if the vision of Trusted Computing is to become reality. Topics addressed include issues with setting up and maintaining the PKI required to support the full set of Trusted Computing functionality, the practical use and verification of attestation evidence, and backwards compatibility, usability and compl...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of physics
سال: 2021
ISSN: ['0022-3700', '1747-3721', '0368-3508', '1747-3713']
DOI: https://doi.org/10.1088/1742-6596/2136/1/012013