Design of Power System Key Management Infrastructure

Article Preview

Abstract:

There are multiple key management centers in power system due to historical and other aspects, and most key management centers are dispersed and serve different information security systems. It has not been implemented that key management centers are centralized management. And it is necessary to establish trust-based network system based on cryptographic techniques and achieve a safe and reliable access, transfer and application in network. We should build the infrastructure covering key management according to the requirements of the network, facilities and standardization to provide key support services for the certificate system, multiple key devices and key applications. Centralized key management is conducive to the protection of the business systems and reduces of duplication construction. This paper makes a structural design of key management infrastructure according to existing problems and actual demand of power business systems to provide support services for the currently running certificate system and key applications.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

771-774

Citation:

Online since:

October 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Jian Huang, Chaowen Chang, Shiyou Ma, et al. Design and Implementation 0f Encryption Card Base on PCMCIA. Network Security Technology and Application[J], 2008, : 94-95.

Google Scholar

[2] Jin Chen, Xicai Zhang, Jinguo Zhang, et al. The design of the PCl encryption card driver based on DM642. Manufacturing Automation [J], 2011, 33(2): 129-131.

Google Scholar

[3] Xinli Huang, Guoqiang Cai, Yu Hong Yi. Research and Implementation of IPSec Encryption Card on Linux 2. 4 Kernel. Computer Technology and Development[J], 2011, 27(7): 161-164.

Google Scholar

[4] Xiaogang Tan, Jianfeng Xie. Design of Data Encryption card PCIJMC2000 Based on DSP. Computer Information[J], 2007, 23(10): 154-155.

Google Scholar