收藏 分享(赏)

IEC_TS_62351-2-2008.pdf

上传人:益****师 文档编号:236253 上传时间:2023-03-14 格式:PDF 页数:56 大小:1.11MB
下载 相关 举报
IEC_TS_62351-2-2008.pdf_第1页
第1页 / 共56页
IEC_TS_62351-2-2008.pdf_第2页
第2页 / 共56页
IEC_TS_62351-2-2008.pdf_第3页
第3页 / 共56页
IEC_TS_62351-2-2008.pdf_第4页
第4页 / 共56页
IEC_TS_62351-2-2008.pdf_第5页
第5页 / 共56页
IEC_TS_62351-2-2008.pdf_第6页
第6页 / 共56页
亲,该文档总共56页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述

1、 IEC/TS 62351-2Edition 1.0 2008-08TECHNICAL SPECIFICATION Power systems management and associated information exchange Data and communications security Part 2:Glossary of terms IEC/TS 62351-2:2008(E)LICENSED TO MECON Limited.-RANCHI/BANGALOREFOR INTERNAL USE AT THIS LOCATION ONLY,SUPPLIED BY BOOK SU

2、PPLY BUREAU.THIS PUBLICATION IS COPYRIGHT PROTECTED Copyright 2008 IEC,Geneva,Switzerland All rights reserved.Unless otherwise specified,no part of this publication may be reproduced or utilized in any form or by any means,electronic or mechanical,including photocopying and microfilm,without permiss

3、ion in writing from either IEC or IECs member National Committee in the country of the requester.If you have any questions about IEC copyright or have an enquiry about obtaining additional rights to this publication,please contact the address below or your local IEC member National Committee for fur

4、ther information.Droits de reproduction rservs.Sauf indication contraire,aucune partie de cette publication ne peut tre reproduite ni utilise sous quelque forme que ce soit et par aucun procd,lectronique ou mcanique,y compris la photocopie et les microfilms,sans laccord crit de la CEI ou du Comit na

5、tional de la CEI du pays du demandeur.Si vous avez des questions sur le copyright de la CEI ou si vous dsirez obtenir des droits supplmentaires sur cette publication,utilisez les coordonnes ci-aprs ou contactez le Comit national de la CEI de votre pays de rsidence.IEC Central Office 3,rue de Varemb

6、CH-1211 Geneva 20 Switzerland Email:inmailiec.ch Web:www.iec.ch About IEC publications The technical content of IEC publications is kept under constant review by the IEC.Please make sure that you have the latest edition,a corrigenda or an amendment might have been published.?Catalogue of IEC publica

7、tions:www.iec.ch/searchpub The IEC on-line Catalogue enables you to search by a variety of criteria(reference number,text,technical committee,).It also gives information on projects,withdrawn and replaced publications.?IEC Just Published:www.iec.ch/online_news/justpub Stay up to date on all new IEC

8、publications.Just Published details twice a month all new publications released.Available on-line and also by email.?Electropedia:www.electropedia.org The worlds leading online dictionary of electronic and electrical terms containing more than 20 000 terms and definitions in English and French,with

9、equivalent terms in additional languages.Also known as the International Electrotechnical Vocabulary online.?Customer Service Centre:www.iec.ch/webstore/custserv If you wish to give us your feedback on this publication or need further assistance,please visit the Customer Service Centre FAQ or contac

10、t us:Email:csciec.ch Tel.:+41 22 919 02 11 Fax:+41 22 919 03 00 LICENSED TO MECON Limited.-RANCHI/BANGALOREFOR INTERNAL USE AT THIS LOCATION ONLY,SUPPLIED BY BOOK SUPPLY BUREAU.IEC/TS 62351-2Edition 1.0 2008-08TECHNICAL SPECIFICATION Power systems management and associated information exchange Data

11、and communications security Part 2:Glossary of terms INTERNATIONAL ELECTROTECHNICAL COMMISSION XAICS 33.200 PRICE CODEISBN 2-8318-9956-7 Registered trademark of the International Electrotechnical Commission LICENSED TO MECON Limited.-RANCHI/BANGALOREFOR INTERNAL USE AT THIS LOCATION ONLY,SUPPLIED BY

12、 BOOK SUPPLY BUREAU.2 TS 62351-2 IEC:2008(E)CONTENTS FOREWORD.9 1 Scope and object.11 2 Terms and definitions.11 2.1 Glossary references and permissions.11 2.2 Glossary of security and related communication terms.13 2.2.1 Abstract Communication Service Interface(ACSI).13 2.2.2 Access.13 2.2.3 Access

13、 Authority.13 2.2.4 Access Control.13 2.2.5 Access Control List(ACL).13 2.2.6 Accountability.13 2.2.7 Adequate Security.13 2.2.8 Advanced Encryption Standard(AES).14 2.2.9 Alarm.14 2.2.10 Application Layer.14 2.2.11 Association.14 2.2.12 Assurance.14 2.2.13 Asymmetric Cipher.14 2.2.14 Asymmetric Cry

14、ptography.14 2.2.15 Asymmetric Key Pair.14 2.2.16 Attack.14 2.2.17 Audit.15 2.2.18 Audit Log.15 2.2.19 Audit Record Field.15 2.2.20 Audit Trail.15 2.2.21 Authentic Signature.15 2.2.22 Authentication.15 2.2.23 Authorization.15 2.2.24 Authorization Process.15 2.2.25 Authorized User.16 2.2.26 Availabil

15、ity.16 2.2.27 Back Door.16 2.2.28 Bandwidth.16 2.2.29 Biometric.16 2.2.30 Block Cipher.16 2.2.31 Boundary Protection.16 2.2.32 Buffer Overflow.16 2.2.33 Bump-in-the-Stack.17 2.2.34 Bump-in-the-Wire.17 2.2.35 Call Back.17 2.2.36 Certificate.17 2.2.37 Certificate Management.17 2.2.38 Certificate Revoc

16、ation List(CRL).17 2.2.39 Certification.17 2.2.40 Certification Authority(CA).18 LICENSED TO MECON Limited.-RANCHI/BANGALOREFOR INTERNAL USE AT THIS LOCATION ONLY,SUPPLIED BY BOOK SUPPLY BUREAU.TS 62351-2 IEC:2008(E)3 2.2.41 Chain of Custody.18 2.2.42 Challenge Handshake Authentication Protocol(CHAP).18 2.2.43 Challenge-Response,Challenge-Response Protocol.18 2.2.44 Checksum.18 2.2.45 Cipher.18 2.2.46 Ciphertext.19 2.2.47 Cleartext.19 2.2.48 Client.19 2.2.49 Compromise.19 2.2.50 Computer Emergen

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 专业资料 > 国外标准

copyright@ 2008-2023 wnwk.com网站版权所有

经营许可证编号:浙ICP备2024059924号-2