Conferences related to Grid Security

Back to Top

2021 IEEE Photovoltaic Specialists Conference (PVSC)

Photovoltaic materials, devices, systems and related science and technology


GLOBECOM 2020 - 2020 IEEE Global Communications Conference

IEEE Global Communications Conference (GLOBECOM) is one of the IEEE Communications Society’s two flagship conferences dedicated to driving innovation in nearly every aspect of communications. Each year, more than 2,900 scientific researchers and their management submit proposals for program sessions to be held at the annual conference. After extensive peer review, the best of the proposals are selected for the conference program, which includes technical papers, tutorials, workshops and industry sessions designed specifically to advance technologies, systems and infrastructure that are continuing to reshape the world and provide all users with access to an unprecedented spectrum of high-speed, seamless and cost-effective global telecommunications services.


2020 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT)

Innovative Smart Grid Technologies

  • 2010 Innovative Smart Grid Technologies (ISGT)

    -Power and Energy System Applications (generation, transmission, distribution, distribution, markets, operations, and planning) - Cyber and Physical Security Systems (Intelligent Monitoring and Outage Management)-Smart Sensing, Communication, and Control in Energy Systems; - Wireless Communications and Advanced Metering Infrastructure; -Energy Mgmt Systmes (with applications to buildings and home automation); - Interdependent Energy Infrastructures (with applications to gas, water, transportation, and telec

  • 2011 IEEE PES Innovative Smart Grid Technologies (ISGT)

    Power and Energy System Applications (generation, transmission, distribution, distribution, markets, operations, and planning) - Cyber and Physical Security Systems (Intelligent Monitoring and Outage Management)-Smart Sensing, Communication, and Control in Energy Systems; - Wireless Communications and Advanced Metering Infrastructure; -Energy Mgmt Systmes (with applications to buildings and home automation); - Interdependent Energy Infrastructures (with applications to gas, water, transportation, and more.

  • 2012 IEEE PES Innovative Smart Grid Technologies (ISGT)

    Power and Energy System Applications (generation, transmission, distribution, distribution, markets, operations, and planning) - Cyber and Physical Security Systems (Intelligent Monitoring and Outage Management)-Smart Sensing, Communication, and Control in Energy Systems; - Wireless Communications and Advanced Metering Infrastructure; -Energy Mgmt Systmes (with applications to buildings and home automation); - Interdependent Energy Infrastructures (with applications to gas, water, transportation, and more.

  • 2013 IEEE PES Innovative Smart Grid Technologies (ISGT)

    Power and Energy System Applications (generation, transmission, distribution, distribution, markets, operations, and planning) - Cyber and Physical Security Systems (Intelligent Monitoring and Outage Management)-Smart Sensing, Communication, and Control in Energy Systems; - Wireless Communications and Advanced Metering Infrastructure; -Energy Mgmt Systmes (with applications to buildings and home automation); - Interdependent Energy Infrastructures (with applications to gas, water, transportation, and more.

  • 2014 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT)

    Power and Energy System Applications (generation, transmission, distribution, distribution, markets, operations, and planning) - Cyber and Physical Security Systems (Intelligent Monitoring and Outage Management)-Smart Sensing, Communication, and Control in Energy Systems; - Wireless Communications and Advanced Metering Infrastructure; -Energy Mgmt Systmes (with applications to buildings and home automation); - Interdependent Energy Infrastructures (with applications to gas, water, transportation, and more.

  • 2015 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT)

    Power and Energy System Applications (generation, transmission, distribution, distribution, markets, operations, and planning) - Cyber and Physical Security Systems (Intelligent Monitoring and Outage Management)-Smart Sensing, Communication, and Control in Energy Systems; - Wireless Communications and Advanced Metering Infrastructure; - Energy MgmtSystems (with applications to buildings and home automation); - Interdependent Energy Infrastructures (with applications to gas, water, transportation, and more.

  • 2016 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT)

    The Conference will be a forum for participants to discuss state-of-the-art innovations in smart grid technologies and will feature plenary and panel sessions as well as technical paper presentations and poster sessions.

  • 2017 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT)

    Forum for participants to discuss state of the art innovations in smart grid technologies and will feature plenary and panel sessions as well as technical paper presentations and poster sessions

  • 2018 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT)

    Forum for participants to discuss state of the art innovations in Smart Grid Technologies and will feature plenary and panel sessions as well as technical paper presentations and poster sessions.

  • 2019 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT)

    Innovative Smart Grid Technologies


2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC)

The 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC 2020) will be held in Metro Toronto Convention Centre (MTCC), Toronto, Ontario, Canada. SMC 2020 is the flagship conference of the IEEE Systems, Man, and Cybernetics Society. It provides an international forum for researchers and practitioners to report most recent innovations and developments, summarize state-of-the-art, and exchange ideas and advances in all aspects of systems science and engineering, human machine systems, and cybernetics. Advances in these fields have increasing importance in the creation of intelligent environments involving technologies interacting with humans to provide an enriching experience and thereby improve quality of life. Papers related to the conference theme are solicited, including theories, methodologies, and emerging applications. Contributions to theory and practice, including but not limited to the following technical areas, are invited.


2020 IEEE Power & Energy Society General Meeting (PESGM)

The Annual IEEE PES General Meeting will bring together over 2900 attendees for technical sessions, administrative sessions, super sessions, poster sessions, student programs, awards ceremonies, committee meetings, tutorials and more



Periodicals related to Grid Security

Back to Top

Aerospace and Electronic Systems Magazine, IEEE

The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Communications Surveys & Tutorials, IEEE

Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Computing in Science & Engineering

Physics, medicine, astronomy—these and other hard sciences share a common need for efficient algorithms, system software, and computer architecture to address large computational problems. And yet, useful advances in computational techniques that could benefit many researchers are rarely shared. To meet that need, Computing in Science & Engineering (CiSE) presents scientific and computational contributions in a clear and accessible format. ...



Most published Xplore authors for Grid Security

Back to Top

Xplore Articles related to Grid Security

Back to Top

A new architecture of grid security system construction

2006 International Conference on Parallel Processing Workshops (ICPPW'06), 2006

Due to the complexity of grid computing, many new security problems have appeared in grid, and so the traditional network security practices can not meet the security demand of grid. As a result, the study of security problems in grid is important, complicated and arduous. In this paper, we propose a new approach to construct grid security systems, and analyze ...


Grid Security Services Simulator (G3S) - a simulation tool for the design and analysis of grid security solutions

First International Conference on e-Science and Grid Computing (e-Science'05), 2005

Security services are one of the most desirable characteristics of the computational grids. Nowadays the swelling number of applications and consequent increase in the amount of critical data over the grids have considerably raised the stakes for an efficient security architecture. Establishing security solutions for computational grid remains in its initial stages, as there are a number of impediments in ...


Grid security research based on middleware

2010 International Conference on Networking and Digital Society, 2010

Considering OGSA architecture, this paper introduces a new Grid Security System Based on Middleware (GSSBM). The grid includes many different domains; it can make use of middleware technology to implement grid security. Integrating the GSI and PKI technologies, the architecture can solve the single sign-on, authentication, proxy and user-based trust model.


Research of Grid security authentication model subtitle as needed

2010 International Conference on Computer Application and System Modeling (ICCASM 2010), 2010

Grid security is a core issue of grid system, how to make security solutions seamlessly melt with grid system is a priority in grid security research. Safety grid technology provides a set of effective security programs to the grid system. The paper introduces information security control theory; studies security grid based on information security grid control theory, establishes a security ...


A Password-Based Grid Security Infrastructure

Second International Conference on the Digital Society, 2008

The globus security infrastructure (GSI) is one of the most famous security architecture. GSI is based on public key infrastructure (PKI), which performs mutual authentication via X.509 certificates. We present a password-based grid security infrastructure (PBGSI), which authenticates clients by authenticated key exchange (AuthA) methods and uses improved chaffing and winnowing protocol for secure data transfer. By using password-based methods ...



Educational Resources on Grid Security

Back to Top

IEEE-USA E-Books

  • A new architecture of grid security system construction

    Due to the complexity of grid computing, many new security problems have appeared in grid, and so the traditional network security practices can not meet the security demand of grid. As a result, the study of security problems in grid is important, complicated and arduous. In this paper, we propose a new approach to construct grid security systems, and analyze both the disadvantages of current existing grid security systems. Our grid security system framework is positioned as an alternative to the security framework of open grid service architecture (OGSA). Based on our analysis, we conclude that a security system in grid should be composed of two parts: security rule definitions and security rule implementation. We also discuss the advantages of our new security system architecture

  • Grid Security Services Simulator (G3S) - a simulation tool for the design and analysis of grid security solutions

    Security services are one of the most desirable characteristics of the computational grids. Nowadays the swelling number of applications and consequent increase in the amount of critical data over the grids have considerably raised the stakes for an efficient security architecture. Establishing security solutions for computational grid remains in its initial stages, as there are a number of impediments in the way of successful implementation of these security designs on a real grid. Absence of suitable mechanism to simulate the various functionalities of grid security models is a major concern for security designers. A reliable simulator for the grid security services is indispensable so that the grid security solutions can be adequately tested before their implementation on a real grid. The available range of grid simulators does not provide any support for the security functions. This vacuity has overwhelmingly motivated us to develop the Grid Security Services Simulator (G3S)

  • Grid security research based on middleware

    Considering OGSA architecture, this paper introduces a new Grid Security System Based on Middleware (GSSBM). The grid includes many different domains; it can make use of middleware technology to implement grid security. Integrating the GSI and PKI technologies, the architecture can solve the single sign-on, authentication, proxy and user-based trust model.

  • Research of Grid security authentication model subtitle as needed

    Grid security is a core issue of grid system, how to make security solutions seamlessly melt with grid system is a priority in grid security research. Safety grid technology provides a set of effective security programs to the grid system. The paper introduces information security control theory; studies security grid based on information security grid control theory, establishes a security control strategy base, build and implements a security grid model.

  • A Password-Based Grid Security Infrastructure

    The globus security infrastructure (GSI) is one of the most famous security architecture. GSI is based on public key infrastructure (PKI), which performs mutual authentication via X.509 certificates. We present a password-based grid security infrastructure (PBGSI), which authenticates clients by authenticated key exchange (AuthA) methods and uses improved chaffing and winnowing protocol for secure data transfer. By using password-based methods in authentication, authorization and delegation, PBGSI provides convenient interface for the user. At the same time, encryption-less secure data transfer improves the performance; and mechanisms used in our scheme (time-stamp etc.) enhance the security of the whole grid.

  • IEC 61850 based smart grid security

    This paper discusses mainly the requirements of enhanced IEC 61850 security parameters for smart grid. Since IEC 61850 has been specified in 2003, smart grid was developed rapidly. This modern grid requires reliable, flexible, efficient and secured communication standards. Recent researches confirm that IEC 61850 meets the first three requirements, yet its security is still an issue due to certain factors, such as threats from the internet because of the mapping to TCP/IP stack and the duration of handshake process. First section of the research states a literature of IEC 61850 and its performance in smart grid. Second section outlines an overview of IEC61850 security issues as well as the current smart grid security requirements. Third section outlines possible solutions to increase IEC 61850's security in order to meet these requirements based on laboratory tests and results. fourth section handles a discussion of the innovated security standard IEC 62351 that will be the future solution for IEC 61850 security issues.

  • The research about PV/wind hybrid energy considering grid security constraints

    With the high permeability of intermittent power supply in the power grid gradually increased, it will have a great influence on the stable operation of the power grid. Single wind or photovoltaic power generation will lead to great volatility that requires thermal power unit to supply sufficient spare capacity to participate in peak shaving, which influence power plant's benefit. The optimization scheduling strategy of PV/wind hybrid energy which is combined to the grid is proposed in this paper using of wind and photovoltaic generating space-time complementarities strategy. And it is verified in the 3 generators and 9 nodes system. Treat wind generator and photovoltaic battery as a PQ node. Compare the generating cost in the cases of single wind power generation and PV/wind hybrid energy that is combined to the power grid. It is concluded that the latter requires smaller generating cost than the former.

  • Notice of Retraction<br>Research and implement of the grid security authentication model

    Combined with the grid development, this article analyzed the current widespread adoption of authentication mechanisms and researched GSI program and KX.509 program in different grid environment. With the proxy idea of KX.509, using and implementing a Web-login module to build the grid authentication model in the Globus environment. The module provides the transparent user certificate generation, use and management for campus grid users. Web-login module generates digital proxy certificates automatically for users in the registration and certification process, so that users do not have their own digital certificate.

  • Fast grid security assessment with N-K Contingencies

    The challenge of grid security assessment with N-k contingencies lies in a huge amount of transmission security constraints and even for the modest values of N and k, the computational complexity would be very high. A new method for fast grid security assessment is presented in this paper for DC grid. The key idea is to construct a small number of representative constraints to equivalently represent the huge number of original security constraints. It is proved that applying the representative constraints is sufficient to assess grid security as the original security constraints do. An important feature of the new method is that the representative constraints need to be constructed only once offline. They are only related to the parameters of transmission network and do not change with power injections. Numerical testing is performed for IEEE-RTS 24-bus system, IEEE 118-bus system, and the Polish 2383-bus system. The number of representative constraints to be assessed is only 1.1%, 0.32%, and 0.27% of that of the original constraints, respectively, and the computational time of security assessment is greatly reduced.

  • Using Security Proxy Based Trusted Computing Enhanced Grid Security Infrastructure

    Grid security is a key component in Grid computing. The mainstream Grid security solution, Grid Security Infrastructure (GSI) for Globus Toolkit (GT), offers comprehensive security services. This is achieved by applying public- key cryptography, cryptographic protocols methodologies and the necessary infrastructural supporting services in which public-key authentication framework (PKI) is the main component. Although an important development from the provisions of security services for distributed computing, it is considered that there is much room for further strengthening GSI in the direction that Grid security can make a clear distinction from distributed computing security. A desired distinction would be that security services for Grid security should manifest and facilitate the Grid feature of advanced resource sharing. In our work, we developed a system called Security Proxy based Tusted Computing (SPTC) modular to enhaced the grid security.



Standards related to Grid Security

Back to Top

No standards are currently tagged "Grid Security"