分享
IEC_TS_62351-2-2008.pdf
下载文档

ID:236253

大小:1.11MB

页数:56页

格式:PDF

时间:2023-03-14

收藏 分享赚钱
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,汇文网负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
网站客服:3074922707
IEC_TS_62351 2008
IEC/TS 62351-2Edition 1.0 2008-08TECHNICAL SPECIFICATION Power systems management and associated information exchange Data and communications security Part 2:Glossary of terms IEC/TS 62351-2:2008(E)LICENSED TO MECON Limited.-RANCHI/BANGALOREFOR INTERNAL USE AT THIS LOCATION ONLY,SUPPLIED BY BOOK SUPPLY BUREAU.THIS PUBLICATION IS COPYRIGHT PROTECTED Copyright 2008 IEC,Geneva,Switzerland All rights reserved.Unless otherwise specified,no part of this publication may be reproduced or utilized in any form or by any means,electronic or mechanical,including photocopying and microfilm,without permission in writing from either IEC or IECs member National Committee in the country of the requester.If you have any questions about IEC copyright or have an enquiry about obtaining additional rights to this publication,please contact the address below or your local IEC member National Committee for further information.Droits de reproduction rservs.Sauf indication contraire,aucune partie de cette publication ne peut tre reproduite ni utilise sous quelque forme que ce soit et par aucun procd,lectronique ou mcanique,y compris la photocopie et les microfilms,sans laccord crit de la CEI ou du Comit national de la CEI du pays du demandeur.Si vous avez des questions sur le copyright de la CEI ou si vous dsirez obtenir des droits supplmentaires sur cette publication,utilisez les coordonnes ci-aprs ou contactez le Comit national de la CEI de votre pays de rsidence.IEC Central Office 3,rue de Varemb CH-1211 Geneva 20 Switzerland Email:inmailiec.ch Web:www.iec.ch About IEC publications The technical content of IEC publications is kept under constant review by the IEC.Please make sure that you have the latest edition,a corrigenda or an amendment might have been published.?Catalogue of IEC publications:www.iec.ch/searchpub The IEC on-line Catalogue enables you to search by a variety of criteria(reference number,text,technical committee,).It also gives information on projects,withdrawn and replaced publications.?IEC Just Published:www.iec.ch/online_news/justpub Stay up to date on all new IEC publications.Just Published details twice a month all new publications released.Available on-line and also by email.?Electropedia:www.electropedia.org The worlds leading online dictionary of electronic and electrical terms containing more than 20 000 terms and definitions in English and French,with equivalent terms in additional languages.Also known as the International Electrotechnical Vocabulary online.?Customer Service Centre:www.iec.ch/webstore/custserv If you wish to give us your feedback on this publication or need further assistance,please visit the Customer Service Centre FAQ or contact us:Email:csciec.ch Tel.:+41 22 919 02 11 Fax:+41 22 919 03 00 LICENSED TO MECON Limited.-RANCHI/BANGALOREFOR INTERNAL USE AT THIS LOCATION ONLY,SUPPLIED BY BOOK SUPPLY BUREAU.IEC/TS 62351-2Edition 1.0 2008-08TECHNICAL SPECIFICATION Power systems management and associated information exchange Data and communications security Part 2:Glossary of terms INTERNATIONAL ELECTROTECHNICAL COMMISSION XAICS 33.200 PRICE CODEISBN 2-8318-9956-7 Registered trademark of the International Electrotechnical Commission LICENSED TO MECON Limited.-RANCHI/BANGALOREFOR INTERNAL USE AT THIS LOCATION ONLY,SUPPLIED BY BOOK SUPPLY BUREAU.2 TS 62351-2 IEC:2008(E)CONTENTS FOREWORD.9 1 Scope and object.11 2 Terms and definitions.11 2.1 Glossary references and permissions.11 2.2 Glossary of security and related communication terms.13 2.2.1 Abstract Communication Service Interface(ACSI).13 2.2.2 Access.13 2.2.3 Access Authority.13 2.2.4 Access Control.13 2.2.5 Access Control List(ACL).13 2.2.6 Accountability.13 2.2.7 Adequate Security.13 2.2.8 Advanced Encryption Standard(AES).14 2.2.9 Alarm.14 2.2.10 Application Layer.14 2.2.11 Association.14 2.2.12 Assurance.14 2.2.13 Asymmetric Cipher.14 2.2.14 Asymmetric Cryptography.14 2.2.15 Asymmetric Key Pair.14 2.2.16 Attack.14 2.2.17 Audit.15 2.2.18 Audit Log.15 2.2.19 Audit Record Field.15 2.2.20 Audit Trail.15 2.2.21 Authentic Signature.15 2.2.22 Authentication.15 2.2.23 Authorization.15 2.2.24 Authorization Process.15 2.2.25 Authorized User.16 2.2.26 Availability.16 2.2.27 Back Door.16 2.2.28 Bandwidth.16 2.2.29 Biometric.16 2.2.30 Block Cipher.16 2.2.31 Boundary Protection.16 2.2.32 Buffer Overflow.16 2.2.33 Bump-in-the-Stack.17 2.2.34 Bump-in-the-Wire.17 2.2.35 Call Back.17 2.2.36 Certificate.17 2.2.37 Certificate Management.17 2.2.38 Certificate Revocation List(CRL).17 2.2.39 Certification.17 2.2.40 Certification Authority(CA).18 LICENSED TO MECON Limited.-RANCHI/BANGALOREFOR INTERNAL USE AT THIS LOCATION ONLY,SUPPLIED BY BOOK SUPPLY BUREAU.TS 62351-2 IEC:2008(E)3 2.2.41 Chain of Custody.18 2.2.42 Challenge Handshake Authentication Protocol(CHAP).18 2.2.43 Challenge-Response,Challenge-Response Protocol.18 2.2.44 Checksum.18 2.2.45 Cipher.18 2.2.46 Ciphertext.19 2.2.47 Cleartext.19 2.2.48 Client.19 2.2.49 Compromise.19 2.2.50 Computer Emergen

此文档下载收益归作者所有

下载文档
你可能关注的文档
收起
展开