000 03959nam a22005655i 4500
001 978-90-481-3594-3
003 DE-He213
005 20140220084559.0
007 cr nn 008mamaa
008 100301s2010 ne | s |||| 0|eng d
020 _a9789048135943
_9978-90-481-3594-3
024 7 _a10.1007/978-90-481-3594-3
_2doi
050 4 _aTK1001-1841
072 7 _aTH
_2bicssc
072 7 _aTEC031000
_2bisacsh
082 0 4 _a621.042
_223
100 1 _aLukszo, Zofia.
_eeditor.
245 1 0 _aSecuring Electricity Supply in the Cyber Age
_h[electronic resource] :
_bExploring the Risks of Information and Communication Technology in Tomorrow's Electricity Infrastructure /
_cedited by Zofia Lukszo, Geert Deconinck, Margot P. C. Weijnen.
264 1 _aDordrecht :
_bSpringer Netherlands,
_c2010.
300 _aVI, 187p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aTopics in Safety, Risk, Reliability and Quality,
_x1566-0443 ;
_v15
520 _aThe electricity infrastructure is one of society’s most critical infrastructures. The complexity of the electricity infrastructure system is increasing quickly, due to the increasing intensity of trade within and between electricity systems, the associated market restructuring and an increasing share of decentralized generation. At the same time, there is a shift in public goals towards low-carbon and sustainable power generation. This requires a drastic transformation of the industry. Increasingly, ICT is being depended upon for managing this infrastructure, for technical control and operation as well as for facilitating markets. A recent example is demand-side management, which requires detailed metering of consumption and decentralized electricity generation. The mutual dependence of the electricity and the ICT infrastructures raises challenging questions in the areas of dependability, security and resilience. Examples include vulnerability to (cyber) attacks, avoiding and repairing technical failures and protecting data confidentiality, while guaranteeing accessibility. Therefore, better models and methods for protection against exploits of system vulnerabilities, whether accidental or intentional such as in cyber attacks, are called for. These problems were addressed at an advanced research workshop, titled "Electricity security in the cyber age: Managing the increasing dependence of the electricity infrastructure on ICT", which was organized in the Netherlands in May 2009. The objective of the workshop was to contribute to the security of current and future electricity infrastructures by analyzing the risks that are caused by the increasing reliance upon ICT and investigating options for managing these risks. This book presents the contributions to the workshop by distinguished invited keynote speakers and participants from the international scientific and industrial community.
650 0 _aEngineering.
650 0 _aSystem safety.
650 0 _aTelecommunication.
650 0 _aSystems engineering.
650 0 _aElectric engineering.
650 0 _aEconomic policy.
650 0 _aTechnology.
650 1 4 _aEngineering.
650 2 4 _aEnergy Technology.
650 2 4 _aCommunications Engineering, Networks.
650 2 4 _aQuality Control, Reliability, Safety and Risk.
650 2 4 _aCircuits and Systems.
650 2 4 _aTechnology Management.
650 2 4 _aEconomic Policy.
700 1 _aDeconinck, Geert.
_eeditor.
700 1 _aWeijnen, Margot P. C.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9789048135936
830 0 _aTopics in Safety, Risk, Reliability and Quality,
_x1566-0443 ;
_v15
856 4 0 _uhttp://dx.doi.org/10.1007/978-90-481-3594-3
912 _aZDB-2-ENG
999 _c113390
_d113390