2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07) 2007
DOI: 10.1109/hicss.2007.323
|View full text |Cite
|
Sign up to set email alerts
|

Leveraging Computational Grid Technologies for Building a Secure and Manageable Power Grid

Abstract: The US Power Industry is in the process of overhauling the Power Grid to make it more secure, reliable, and available. The IT systems that comprise a major part of this change need to address a number of security and management challenges for the data generated by power systems and for resources consumed by distributed applications. In this work we leverage the technologies developed by the Computational Grid to address these challenges. We identify striking similarities between the systems and use these simil… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2011
2011
2015
2015

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 20 publications
0
6
0
Order By: Relevance
“…Scaling such accesses requires federated approaches where the organizations agree on a common authentication and authorization system for accessing data and resources Intrusion detection (IEEE 2010b; Khurana et al 2007;Sugwon and Myongho 2010) • Organizations need to define security policies, deploy monitoring systems supported by advanced IDSs, and set up mechanisms for forensic analyses and development of a communication process to share incident data with other organizations and a response in a coordinated fashion Operational cost (IEEE 2010b) This chapter briefly surveyed the different standards for Smart Electric Grid.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…Scaling such accesses requires federated approaches where the organizations agree on a common authentication and authorization system for accessing data and resources Intrusion detection (IEEE 2010b; Khurana et al 2007;Sugwon and Myongho 2010) • Organizations need to define security policies, deploy monitoring systems supported by advanced IDSs, and set up mechanisms for forensic analyses and development of a communication process to share incident data with other organizations and a response in a coordinated fashion Operational cost (IEEE 2010b) This chapter briefly surveyed the different standards for Smart Electric Grid.…”
Section: Discussionmentioning
confidence: 99%
“…We need to model faults and failures more accurately with respect to security incidents. To utilize this data several C-Grid techniques such as data federation, data virtualization and integration and data location services can be realized Load management (Khurana et al 2007) • Energy can be treated as a resource and its delivery to an appliance can be treated like a task. Constrained network and devices must also be considered Evolvability (IEEE 2010a; Khurana et al 2010) • The design should be modular, so that it can be easily upgraded later on with minimal disturbance to other components working properly Data management (Khurana et al 2007) • Managing and accessing large amount of energy usage and business related data at control center are challenging issues.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…While executing a task, the status of ongoing jobs needs to be monitored for potential task scheduling conflicts and re-scheduling them if needed. A tricky issue in task scheduling is handling of irregular and time dependent performance of processors [22]. In addition to time dependency, an important scheduling issue is priority and sequence of object (e.g., power generator) execution.…”
Section: Task Scheduling and Executionmentioning
confidence: 99%