1、 IEC/TS 62351-2Edition 1.0 2008-08TECHNICAL SPECIFICATION Power systems management and associated information exchange Data and communications security Part 2:Glossary of terms IEC/TS 62351-2:2008(E)LICENSED TO MECON Limited.-RANCHI/BANGALOREFOR INTERNAL USE AT THIS LOCATION ONLY,SUPPLIED BY BOOK SU
2、PPLY BUREAU.THIS PUBLICATION IS COPYRIGHT PROTECTED Copyright 2008 IEC,Geneva,Switzerland All rights reserved.Unless otherwise specified,no part of this publication may be reproduced or utilized in any form or by any means,electronic or mechanical,including photocopying and microfilm,without permiss
3、ion in writing from either IEC or IECs member National Committee in the country of the requester.If you have any questions about IEC copyright or have an enquiry about obtaining additional rights to this publication,please contact the address below or your local IEC member National Committee for fur
4、ther information.Droits de reproduction rservs.Sauf indication contraire,aucune partie de cette publication ne peut tre reproduite ni utilise sous quelque forme que ce soit et par aucun procd,lectronique ou mcanique,y compris la photocopie et les microfilms,sans laccord crit de la CEI ou du Comit na
5、tional de la CEI du pays du demandeur.Si vous avez des questions sur le copyright de la CEI ou si vous dsirez obtenir des droits supplmentaires sur cette publication,utilisez les coordonnes ci-aprs ou contactez le Comit national de la CEI de votre pays de rsidence.IEC Central Office 3,rue de Varemb
6、CH-1211 Geneva 20 Switzerland Email:inmailiec.ch Web:www.iec.ch About IEC publications The technical content of IEC publications is kept under constant review by the IEC.Please make sure that you have the latest edition,a corrigenda or an amendment might have been published.?Catalogue of IEC publica
7、tions:www.iec.ch/searchpub The IEC on-line Catalogue enables you to search by a variety of criteria(reference number,text,technical committee,).It also gives information on projects,withdrawn and replaced publications.?IEC Just Published:www.iec.ch/online_news/justpub Stay up to date on all new IEC
8、publications.Just Published details twice a month all new publications released.Available on-line and also by email.?Electropedia:www.electropedia.org The worlds leading online dictionary of electronic and electrical terms containing more than 20 000 terms and definitions in English and French,with
9、equivalent terms in additional languages.Also known as the International Electrotechnical Vocabulary online.?Customer Service Centre:www.iec.ch/webstore/custserv If you wish to give us your feedback on this publication or need further assistance,please visit the Customer Service Centre FAQ or contac
10、t us:Email:csciec.ch Tel.:+41 22 919 02 11 Fax:+41 22 919 03 00 LICENSED TO MECON Limited.-RANCHI/BANGALOREFOR INTERNAL USE AT THIS LOCATION ONLY,SUPPLIED BY BOOK SUPPLY BUREAU.IEC/TS 62351-2Edition 1.0 2008-08TECHNICAL SPECIFICATION Power systems management and associated information exchange Data
11、and communications security Part 2:Glossary of terms INTERNATIONAL ELECTROTECHNICAL COMMISSION XAICS 33.200 PRICE CODEISBN 2-8318-9956-7 Registered trademark of the International Electrotechnical Commission LICENSED TO MECON Limited.-RANCHI/BANGALOREFOR INTERNAL USE AT THIS LOCATION ONLY,SUPPLIED BY
12、 BOOK SUPPLY BUREAU.2 TS 62351-2 IEC:2008(E)CONTENTS FOREWORD.9 1 Scope and object.11 2 Terms and definitions.11 2.1 Glossary references and permissions.11 2.2 Glossary of security and related communication terms.13 2.2.1 Abstract Communication Service Interface(ACSI).13 2.2.2 Access.13 2.2.3 Access
13、 Authority.13 2.2.4 Access Control.13 2.2.5 Access Control List(ACL).13 2.2.6 Accountability.13 2.2.7 Adequate Security.13 2.2.8 Advanced Encryption Standard(AES).14 2.2.9 Alarm.14 2.2.10 Application Layer.14 2.2.11 Association.14 2.2.12 Assurance.14 2.2.13 Asymmetric Cipher.14 2.2.14 Asymmetric Cry
14、ptography.14 2.2.15 Asymmetric Key Pair.14 2.2.16 Attack.14 2.2.17 Audit.15 2.2.18 Audit Log.15 2.2.19 Audit Record Field.15 2.2.20 Audit Trail.15 2.2.21 Authentic Signature.15 2.2.22 Authentication.15 2.2.23 Authorization.15 2.2.24 Authorization Process.15 2.2.25 Authorized User.16 2.2.26 Availabil
15、ity.16 2.2.27 Back Door.16 2.2.28 Bandwidth.16 2.2.29 Biometric.16 2.2.30 Block Cipher.16 2.2.31 Boundary Protection.16 2.2.32 Buffer Overflow.16 2.2.33 Bump-in-the-Stack.17 2.2.34 Bump-in-the-Wire.17 2.2.35 Call Back.17 2.2.36 Certificate.17 2.2.37 Certificate Management.17 2.2.38 Certificate Revoc
16、ation List(CRL).17 2.2.39 Certification.17 2.2.40 Certification Authority(CA).18 LICENSED TO MECON Limited.-RANCHI/BANGALOREFOR INTERNAL USE AT THIS LOCATION ONLY,SUPPLIED BY BOOK SUPPLY BUREAU.TS 62351-2 IEC:2008(E)3 2.2.41 Chain of Custody.18 2.2.42 Challenge Handshake Authentication Protocol(CHAP).18 2.2.43 Challenge-Response,Challenge-Response Protocol.18 2.2.44 Checksum.18 2.2.45 Cipher.18 2.2.46 Ciphertext.19 2.2.47 Cleartext.19 2.2.48 Client.19 2.2.49 Compromise.19 2.2.50 Computer Emergen