Powered by Deep Web Technologies
Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

OHA Security Cases Archive File  

Energy.gov (U.S. Department of Energy (DOE))

This is a archive file of our Security decisions, Please download this file to your local computer and use the build in adobe search feature. Individual cases are listed in the bookmark section of...

2

Scalable security for petascale parallel file systems  

Science Conference Proceedings (OSTI)

Petascale, high-performance file systems often hold sensitive data and thus require security, but authentication and authorization can dramatically reduce performance. Existing security solutions perform poorly in these environments because they cannot ... Keywords: capabilities, high-performance computing, scalability, secure object-based storage

Andrew W. Leung; Ethan L. Miller; Stephanie Jones

2007-11-01T23:59:59.000Z

3

Scalable Security for Petascale Parallel File Systems  

E-Print Network (OSTI)

Y. Hu. Snare: A strong security scheme for network-attachedThekkath. Block-level security for network-attached disks.and J. Satran. The OSD security protocol. In Proc. 3rd IEEE

Leung, Andrew W.; Miller, Ethan L; Jones, Stephanie

2007-01-01T23:59:59.000Z

4

Department of Energy FILE& National Nuclear Secur~ty Administration  

Office of Legacy Management (LM)

FILE& FILE& National Nuclear Secur~ty Administration Nevada Site Office 2005 M U 22 AII 9 ~5 P.O. Box 9851 8 Las Veaas. N V 89193-8518 ytL'i,ii. C;,;/TH Lamar County Chancery,Clerk's Office P.O. Box 1240 Purvis, Mississippi 39475-1240 AUG 2 5 2005 CHANCEiiY CLERK DEED RESTRICTION The U. S. Department of Energy, Nevada Site Office (DOENSO), hereby requests that this document be recorded as part of the deed to the property identified below, and become public record for future inquiries regarding ownership, history and property restrictions of said parcel. 1. The United States of America possesses the lands described below and shown on attached map as Tract 100 In Warranty Deed Conveying Fee and Easement recorded December 2nd 1994 further described as follows:

5

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Nuclear Regulatory Commission; National Security Agency (File ... Richard S. Carson & Associates; RSA Securities; RU Consulting (File 1 of 2 ...

6

FILE  

Office of Legacy Management (LM)

c&o--L>+/ c&o--L>+/ co.o-09 ~~Epq-J+~~jDU" 1 . [o( / 5-/-- 1, "I ' -i, [ . - -. j s: FILE :3r.jNER is} -------.- pas',: Current: -----__---_---__-------- ----____-_________________ Cwner ccntacted 0 yes 0 nag i+ yet,? date czntacted ----___--I__- Ty-;Pfz ,' F iTiC~CC2~j 1 iljbj AA-r-ti--=' ="L---- /8;' ; z.eseaf-ch & sevei apment EJ F' raducticx scale tssting rJ Pilot si-jle 0 ' jench Scale Fracess 0 Theoretical Studies 0 Samp:! e & haivsis 0 Fz-citity Tvpe 0 Manui artur i ng 0 University 3 Research *27ganizati.sn g Government Spensored Faci I i ty 0 other -~-q_-~ ----- i *c' rcd$srti an Di rposal /Storage T' /P!= I-IF rgfijTk#qfJ- -~L=-=--e---~----- 0 Prime Suacontractot- i f' urchass Order 0 Other infcrmatian

7

GAO Information Security Issues Update  

Science Conference Proceedings (OSTI)

... Critical IT Systems & Infrastructure - NNSA Supercomputers CP & Security - State Security System - Wireless Security - IRS e*File ...

2010-10-08T23:59:59.000Z

8

eia757b.xls  

U.S. Energy Information Administration (EIA) Indexed Site

Fax: (202) 586-1076 If any Plant Identification Data has changed since the last report, Secure File Transfer: Plant Name: Questions? Call: (877) 800-5261 Plant Address 1: Plant Address 2: City: State: County: Zip: - Plant Owner Companies (Top Three): 1 2 3 Operator Company: Processing Plant Operations Contact: Contact Name: Contact Name: Title: Title: Company: Company: Secondary Phone No.: Secondary Phone No.: Page 1 Comments: (To separate one comment from another, press ALT+ENTER) Ext: Ext: NATURAL GAS PROCESSING PLANT SURVEY Schedule B: Emergency Status Report Version No.: 2012.01

9

EIA-819  

U.S. Energy Information Administration (EIA) Indexed Site

Site Name: Terminal Control Number (TCN): Email: Physical Address (e.g., Street Address, Building Number, Floor, Suite): Fax: (202) 586-1076 Secure File Transfer: City: State: Zip: - Electronic Transmission: City: State: Zip: - Contact Name: Phone No.: Ext: Fax No.: Email address: Questions? Call: 202-586-9612 Product Code 190 Comments: Identify products reported as "Other Oxygenates" (code 445) in Part 4 and any unusual aspects of your reporting month's operations. (To separate one comment from another, press ALT+ENTER.) Nameplate Capacity Fuel Ethanol Nameplate Production Capacity Item Description FORM EIA-819 MONTHLY OXYGENATE REPORT

10

Security  

Science Conference Proceedings (OSTI)

... Security. Organizations need standards, guidelines, and ... to support health IT implementations. HIPAA Security Rule Toolkit. ...

2011-12-05T23:59:59.000Z

11

FAQs for Survey Forms 809 and 819  

Gasoline and Diesel Fuel Update (EIA)

9 and 819 9 and 819 EIA-809 (Weekly Oxygenate Report) How do I submit the form? There are four ways to submit the EIA-809 form. Secure File Transfer: https://signon.eia.doe.gov/upload/noticeoog.jsp The Secure File Transfer System uses the secure hypertext transfer protocol (HTTPS), an industry standard method to send information over the web using secure, encrypted processes. Electronic Filing Option: The PC Electronic Data Reporting Option (PEDRO) is a Windows-based application that will enable you to enter data interactively, import data from your own database, validate your data online, and transmit the encrypted data electronically to EIA via the Internet or a dial-up modem. To receive this free software call (202) 586-9659. Email: oog.surveys@eia.gov Fax forms to: (202) 586-1076

12

This form may be submitted to the EIA by mail, fax, e-mail, or secure file trans  

U.S. Energy Information Administration (EIA) Indexed Site

using a secure method of transmission: HTTPS. This is an industry standard method to send information over the web using secure, encrypted processes. (It is the same method that commercial companies communicate with customers when transacting business on the web.) To use this service, we recommend the use of Microsoft Internet Explorer 5.5 or later or Netscape 4.77 or later. Send your surveys using this secure method at: https://idc.eia.doe.gov/upload/noticeoog.jsp." using a secure method of transmission: HTTPS. This is an industry standard method to send information over the web using secure, encrypted processes. (It is the same method that commercial companies communicate with customers when transacting business on the web.) To use this service, we recommend the use of Microsoft Internet Explorer 5.5 or later or Netscape 4.77 or later. Send your surveys using this secure method at: https://idc.eia.doe.gov/upload/noticeoog.jsp." ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,," OMB No. 1905-0057" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,," Expiration Date: 7/31/2016" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,," Version No: 2013.002" "ANNUAL REPORT OF THE ORIGIN OF NATURAL GAS LIQUIDS PRODUCTION"

13

EIA-801  

U.S. Energy Information Administration (EIA) Indexed Site

EIA ID NUMBER: If any Respondent Identification Data has changed since the last report, enter an "X" in the box: Company Name: Doing Business As: Email: Fax: (202) 586-1076 Secure File Transfer: City: State: Zip: - Electronic Transmission: City: State: Zip: - Contact Name: Phone No.: Ext: Fax No.: Questions? Call: 202-586-3307 Email address: Physical Address (e.g., Street Address, Building Number, Floor, Suite): Day Mo FORM EIA-801 WEEKLY BULK TERMINAL REPORT This report is mandatory under the Federal Energy Administration Act of 1974 (Public Law 93-275). Failure to comply may result in criminal fines, civil penalties and other sanctions as provided by law. For further information concerning sanctions and data protections see the provision on sanctions and the provision concerning the

14

EIA-800  

U.S. Energy Information Administration (EIA) Indexed Site

1. RESPONDENT IDENTIFICATION DATA 1. RESPONDENT IDENTIFICATION DATA PART 2. SUBMISSION/RESUBMISSION INFORMATION Year REPORT PERIOD: If this is a resubmission, enter an "X" in the box: EIA ID NUMBER: If any Respondent Identification Data has changed since the last report, enter an "X" in the box: Company Name: Doing Business As: Site Name: Email: Terminal Control Number (TCN): Fax: (202) 586-1076 Physical Address of Contact (e.g., Street Address, Building Number, Secure File Transfer: Floor, Suite): City: State: Zip: - Electronic Transmission: City: State: Zip: - Contact Name: Questions? Call: 202-586-3307 Phone No.: Ext: Fax No.: Email address: Day Mailing Address of Contact (e.g., PO Box, RR): If the physical and mailing addresses are the same, only complete the physical address.

15

EIA-820  

U.S. Energy Information Administration (EIA) Indexed Site

EIA ID NUMBER: EIA ID NUMBER: If this is a resubmission, enter an "X" in the box: If any Respondent Identification Data has changed since the last report, enter an "X" in the box: Company Name: Forms may be submitted using one of the following methods: Doing Business As: Site Name: Email: Terminal Control Number (TCN): Physical Address (e.g., Street Address, Building Number, Floor, Suite): Fax: (202) 586-1076 City: State: Zip: - Secure File Transfer: City: State: Zip: - Questions? Call: 202-586-6281 Contact Name: Phone No.: Ext: Fax No.: Email address: Mailing Address of Contact (e.g., PO Box, RR): If the physical and mailing addresses are the same, only complete the physical address. FORM EIA-820 REPORT YEAR 2014 This report is mandatory under the Federal Energy Administration Act of 1974 (Public Law 93-275). Failure to comply may result in criminal fines, civil penalties and

16

Version No.:2010.01 PART 2. SUBMISSION/RESUBMISSION INFORMATION  

U.S. Energy Information Administration (EIA) Indexed Site

Email: Floor, Suite): Fax: (202) 586-1076 City: State: Zip: - Secure File Transfer: Electronic Transmission: City: State: Zip: - Contact Name: Phone No.: Ext: Fax No.: Email address: Questions? Call: 202-586-3307 FORM EIA-804 This report is mandatory under the Federal Energy Administration Act of 1974 (Public Law 93-275). Failure to comply may result in criminal fines, civil penalties and other sanctions as provided by law. For further information concerning sanctions and data protections see the provision on sanctions and the provision concerning the confidentiality of information in the instructions. Title 18 USC 1001 makes it a criminal offense for any person knowingly and willingly makes to any Agency or Department of the United States any false, fictitious, or fraudulent statements as to any matter within its jurisdiction.

17

EIA-800  

U.S. Energy Information Administration (EIA) Indexed Site

Site Name: Site Name: Email: Terminal Control Number (TCN): Fax : (202) 586-1076 Physical Address of Contact (e.g., Street Address, Building Number, Secure File Transfer: State: Zip: - Electronic Transmission: City: State: Zip: - Contact Name: Questions? Call: 202-586-6281 Ext: Product Code 990 490 491 492 493 Product Code 399 400 401 % % Comments: Identify any unusual aspects of your reporting month's operations. (To separate one comment from another, press ALT+ENTER.) Weighted Average API Gravity (at 60 o F) PART 4. SULFUR CONTENT AND API GRAVITY OF CRUDE OIL (Report either 030 or 040 but not both) o API Weighted Average Sulfur Content Input 040 FORM EIA-810 MONTHLY REFINERY REPORT This report is mandatory under the Federal Energy Administration Act of 1974 (Public Law 93-275). Failure to comply may result in criminal fines, civil penalties and

18

EIA-817  

U.S. Energy Information Administration (EIA) Indexed Site

Email: Email: Physical Address (e.g., Street Address, Building Number, Floor, Suite): Fax: (202) 586-1076 Secure File Transfer: City: State: Zip: - Electronic Transmission: City: State: Zip: - Contact Name: Phone No.: Ext: Fax No.: Email address: Questions? Call: 202-586-6254 FORM EIA-817 MONTHLY TANKER AND BARGE MOVEMENTS REPORT This report is mandatory under the Federal Energy Administration Act of 1974 (Public Law 93-275). Failure to comply may result in criminal fines, civil penalties and other sanctions as provided by law. For further information concerning sanctions and data protections see the provision on sanctions and the provision concerning the confidentiality of information in the instructions. Title 18 USC 1001 makes it a criminal offense for any person knowingly and willingly makes to any Agency or

19

EIA-800  

U.S. Energy Information Administration (EIA) Indexed Site

Email: Email: Floor, Suite): Fax: (202) 586-1076 City: State: Zip: - Secure File Transfer: Electronic Transmission: City: State: Zip: - Contact Name: Phone No.: Ext: Fax No.: Questions? Call: 202-586-3307 Email address: PADD 2 PADD 3 PADD 4 PADD 5 Mailing Address of Contact (e.g., PO Box, RR): If the physical and mailing addresses are the same, only complete the physical address. Comments: Identify any unusual aspects of your reporting week's operations. (To separate one comment from another, press ALT+ENTER.) For the PC Electronic Data Reporting Option (PEDRO) software, call (202) 586-9659. (See Form instructions, pg 1.) Quantities entered below should be the weekly equivalent of those reported monthly to the Energy Information Administration by your company on Form EIA-813, "Monthly Crude Oil Report".

20

This form may be submitted to the EIA by mail, fax, e-mail, or secure file trans  

U.S. Energy Information Administration (EIA) Indexed Site

5.5 or later or Netscape 4.77 or later. Send your surveys using this secure method at: https://signon.eia.doe.gov/upload/noticeoog.jsp" 5.5 or later or Netscape 4.77 or later. Send your surveys using this secure method at: https://signon.eia.doe.gov/upload/noticeoog.jsp" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"OMB No. 1905-0174" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Expiration Date: 12/31/2015" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Version No.: 2013.01" "FORM EIA-782A" "REFINERS'/GAS PLANT OPERATORS' MONTHLY PETROLEUM PRODUCT SALES REPORT" "This report is mandatory under the Federal Energy Administration Act of 1974 (Public Law 93-275). Failure to comply may result in criminal fines, civil penalties and other sanctions as provided by law. Title 18 USC 1001 makes it a criminal offense for any person knowingly and willingly to make to any Agency or Department of the United States any false, fictitious, or fraudulent statements as to any matter within its jurisdiction. See Instructions for further details on the sanctions and the provisions concerning the confidentiality of information submitted on this form."

Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Security, Emergency Planning & Safety Records | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security, Emergency Planning & Safety Records Security, Emergency Planning & Safety Records Protection program records include the various files created by the Department to...

22

V-237: TYPO3 Security Bypass Vulnerabilities | Department of...  

NLE Websites -- All DOE Office Websites (Extended Search)

SA54717 Security Focus ID 62257 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Some errors when handling file actions can be exploited to bypass file action permission restrictions and...

23

T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: PHP File Upload Bug May Let Remote Users Overwrite Files on 7: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System June 15, 2011 - 3:45pm Addthis PROBLEM: A vulnerability was reported in PHP. A remote user may be able to overwrite files on the target system. PLATFORM: PHP prior to 5.3.7 ABSTRACT: PHP is prone to a security-bypass vulnerability.Successful exploits will allow an attacker to delete files from the root directory, which may aid in further attacks. PHP 5.3.6 is vulnerable; other versions may also be affected. reference LINKS: PHP Security Notice PHP CVE-2011-2202 SecurityTracker Alert ID: 1025659 Secunia Advisory: SA44874 CVE-2011-2202 IMPACT ASSESSMENT: High Discussion: The vulnerability lies in the 'SAPI_POST_HANDLER_FUNC()' function in

24

grid file  

Science Conference Proceedings (OSTI)

NIST. grid file. (data structure). Definition: A point access method which splits space into a nonperiodic grid. Each spatial ...

2013-08-23T23:59:59.000Z

25

Steganographic information hiding that exploits a novel file system vulnerability  

Science Conference Proceedings (OSTI)

In this paper, we present DupeFile, a simple yet critical security vulnerability in numerous file systems. By exploiting DupeFile, adversary can store two or more files with the same name/path, with different contents, inside the same volume. ...

Avinash Srinivasan; Satish Kolli; Jie Wu

2013-08-01T23:59:59.000Z

26

File Systems  

NLE Websites -- All DOE Office Websites (Extended Search)

File Systems File Systems File Systems For a general description of the different file systems available on PDSF please see Eliza File Systems and Other File Systems. Below is a summary of how STAR uses the various systems: /common The STAR software is installed on /common. For 32sl44 it is under /common/star/star44 and for sl53 it is under /common/star/star53. In both cases the software consists primarily of a STAR-specific ROOT installation on which releases of the STAR libraries are built as shown on the Local STAR Libraries page. /eliza3, /eliza6, /eliza9, /eliza14, /eliza15, /eliza17 STAR has space on 6 elizas as shown in the table below. File System star space (TB) use eliza3 39 production eliza6 9 production eliza9 39 production eliza14 34 production, user space under /eliza14/star/pwg

27

Globus Online: Robust File Transfer of Big Data | Argonne National...  

NLE Websites -- All DOE Office Websites (Extended Search)

Globus Online: Robust File Transfer of Big Data Globus Online: Robust File Transfer of Big Data Globus Online is a software-as-a-service for secure, reliable, data management....

28

Important Filing Information | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Important Filing Information Important Filing Information Important Filing Information Filing Information The Office of Hearings and Appeals (OHA) encourages electronic filing of submissions, by e-mail or by telefax. OHA's e-mail address for filing submissions is OHA.filings@hq.doe.gov; the OHA telefax number is (202) 287-1415. Note, however, that because of signature issues, we may ask you to file a signed original of a document. We will send an acknowledgment (by letter or e-mail) upon our receipt of all principal pleadings. If you choose to file by regular mail, we caution that under governmental security procedures now in place, the U.S. Postal Service randomly selects items of first class mail addressed to OHA for screening at a facility outside of OHA, e.g. for irradiation of potentially hazardous materials.

29

File Formats  

NLE Websites -- All DOE Office Websites (Extended Search)

Home Page Home Page File Formats MODIS Product Subsets Output Data File Format Descriptions The MODIS product subsets for North America and Worldwide are available in several formats, which are described in the following text. MODIS Land Product ASCII Data Image Data Files in ASCII Grid Format QC-Filtered Data and Statistics Generated for this Request Land Cover Data in ASCII Grid Format Statistical Data for MODIS Land Products in Comma Separated Format Underlying BRDF Parameters Used in Generating this Request (available with Albedo MOD43B and MCD43B only) MODIS Land Product ASCII Data Description of File File Content: Data as read from MODIS Land Product HDF-EOS data files. These data are the starting point for deriving the other subset data products. Data Type: As indicated by Land Product Code (e.g., MOD15A2).

30

MICROCOMP output file  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

O:\END\EPAC300.lc (file 1 of 19) O:\END\EPAC300.lc (file 1 of 19) S.L.C. 109TH CONGRESS REPORT " ! HOUSE OF REPRESENTATIVES SENATE 1st Session 109- ENERGY POLICY ACT OF 2005 , 2005.-Ordered to be printed , from the committee of conference, submitted the following CONFERENCE REPORT [To accompany H.R. 6] The committee of conference on the disagreeing votes of the two Houses on the amendment of the Senate to the bill (H.R. 6), to en- sure jobs for our future with secure, affordable, and reliable energy, having met, after full and free conference, have agreed to rec- ommend and do recommend to their respective Houses as follows: That the House recede from its disagreement to the amendment of the Senate and agree to the same with an amendment as fol- lows: In lieu of the matter proposed to be inserted by the Senate

31

IFC File Analyzer  

Science Conference Proceedings (OSTI)

... The IFC File Analyzer generates a spreadsheet from an IFC file. ... In the spreadsheet, a worksheet is created for each type of IFC entity in the file. ...

2013-08-12T23:59:59.000Z

32

EIA-176 Electronic Filing System (EFS)  

Gasoline and Diesel Fuel Update (EIA)

EIA-176 Electronic Filing System (EFS) EIA-176 Electronic Filing System (EFS) Released: January 17, 2013 Background The Form EIA-176, "Annual Report of Natural and Supplemental Gas Supply and Disposition," is used to collect data on the supply and disposition of natural gas in the United States. These data are collected by the Energy Information Administration (EIA), U.S. Department of Energy (DOE), to fulfill its responsibilities for gathering and reporting energy data. Reporting on the Form EIA-176 is mandatory. Electronic Filing System The Form EIA-176 Electronic Filing System (EFS) provides respondents with an efficient and effective means for filing the form using a personal computer (PC). Respondents have a choice of submitting data via either secure file transfer or email. Hardware / Software Requirements

33

Expandable grids for visualizing and authoring computer security policies  

Science Conference Proceedings (OSTI)

We introduce the Expandable Grid, a novel interaction technique for creating, editing, and viewing many types of security policies. Security policies, such as file permissions policies, have traditionally been displayed and edited in user interfaces ... Keywords: expandable grid, file permissions, privacy, security, visualization

Robert W. Reeder; Lujo Bauer; Lorrie Faith Cranor; Michael K. Reiter; Kelli Bacon; Keisha How; Heather Strong

2008-04-01T23:59:59.000Z

34

TO: FILE  

Office of Legacy Management (LM)

TO: FILE TO: FILE FROM: ~~~r&m--- SUBJECT: MEMORANDUM DATE +!~&j!?~ _______ SITE NAME: CITY: -,&a o~-,--,-,--,-_-,sT~TE:-~A- P OWNER(S) --~=c-L&& ----- -------- Cu-rc"t: B_eh& --------------_- Owner contacted 0 yes 0 no; if yes, dete contacted ------------- TYPE OF OPERATION ----------------- 0 Research & Development 6 0 Production scale testing Pilot Scale 0 Bench Scale Process 0 Theoretical Studies 0 Sample 84 Analysis Y Facility Type Bi Manufacturing University 0 Research Organization 0 0 Government Sponsored Facility 0 Other --------------------- 0 Production 0 Disposal/Storage TYPE OF CONTRACT -------------w-w 0 Prime 0 Subcontract&r 6 Purchase Order cl Other information (i.e., cost + fixed fee, unit price, time & material, etc) ___

35

TO: FILE  

Office of Legacy Management (LM)

TO: FILE TO: FILE D iev' c FROM: ---L----l!!--- MEMORANDUM k+=+ 7 DATE--- _-- ----_---- past: ---------- - -- .---1---------. &4 k WOdY Curr="t:----------------------- Owner contacted ,es *no; ' 0, -if yes, date contacted TYPE OF OPERATION ----------------- p Research & Dews1 opment q Production scale testing 0 Pilot Scale q Sample 84 Analysis B Production q Facility Type 0 Hanufacturinq 0 University 0 Research Organization c] Government Sponsored Facility q Other --------------------- ' IvP!LoE-c!EI~ncI fl Prime 0 Subcontractor 0 Purchase Order !B Other information (i.e., cost + fixed fee, unit price, PIEWUED FIEWMED GOVT GOVT CONTRACTOR CONTRRCTOR OWE!! LEASE_D O!!!NH LE_ASEE OWNED ---------- ~-~LE!3_SEI! % LANDS i u 0 BUILDINGS EQUIPMENT

36

Security and Privacy Notice  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Privacy Notice Security and Privacy Notice Thank you for visiting the Office of Health, Safety and Security (HSS) web site and reviewing our position on security and privacy. SECURITY NOTICE This web site is part of a Federal computer system and is the property of the United States Government. It is for authorized use only. The Department of Energy monitors this web site for security purposes to ensure it remains available and to protect information in the system. The Department of Energy uses software programs and additional equipment to monitor network traffic to identify unauthorized attempts to access, obtain, alter, damage or destroy information, or otherwise to interfere with the system or its operation. Any and all uses of this system and all files on this system

37

Security Perimeter  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Perimeter Security Perimeter Protecting the Laboratory against threats and vulnerabilities. Contact Security Perimeter Coordinators Email The security perimeter helps to...

38

Global Home File System at NERSC  

NLE Websites -- All DOE Office Websites (Extended Search)

Home Home Global Home Filesystem Overview Global home directories (or "global homes") provide a convenient means for a user to have access to source files, input files, configuration files, etc., regardless of the platform the user is logged in to. Wherever possible, you should refer to your home directory using the environment variable $HOME. The absolute path to your home directory (e.g., /u4/elvis/) may change, but the value of $HOME will always be correct. For security reasons, you should never allow "world write" access to your $HOME directory or your $HOME/.ssh directory. NERSC scans for such security weakness, and, if detected, will change the permissions on your directories. Platforms Utilizing Global Home The Global Home file system is available on all NERSC systems except PDSF.

39

TO: FILE  

Office of Legacy Management (LM)

, , TO: FILE ---w-o----- SUBJECT: 1 CITY: STATE: fld -------------------------- OWNER(S) -------_ Past: _----------------------- curr,ent : --------------------______ Owner cnntakted 0 yes RI-IO; if yes, date contacted----- ~TYPE OF OPERATION .: ,. 0. Research & Development n Facility Type 0 Production scale testing 0 Pilot Scale 0 Manufacturing 0 Ben&i Scale Process 0 University 0 Theoretical Studies IJ Research Organizatian a 0 Government Sample & Analysis .' 0 Production 0. Disposal f Storage a Prime 0 Subcnntract& 0 Purchase Order cl Other inf brmation (i . e., cast + fixed fee, unit price, time & material, qtc) --_---- ~----~---~~~----_-----~~---~ Ccntract/Purch&se Order t). ~--~-~---~~~----_------~---- ---------------------------------

40

TO: FILE  

Office of Legacy Management (LM)

tlEtlORANDUtl tlEtlORANDUtl TO: FILE 311% /1 DATE-----------~------- FROM: P. %a- w-----------_____ SUBJECT: F,/;-;d&;- /3ec+.e I SITE ALTERNATE NAME: --~~~-~-;,.--_~~~~-~-------------NAHE:----------------- _____ CITY: -!%!2~-&&-~- _______ STATE: s.-c&- OWNER(S) _--_--__ Past: ------------------------ Current: I Owner contacted 0 yes --_--~~~--~~~~--~_~--~~-~~ 0 no; if ye., date contacted 1 I TYPE OF OPERATION ---------------__ q Research & Development 0 Production scale testing a Pilot scale 0 Bench Scale Process 0" Theoretical Studies Sample b Analysis 0 Production 0 Disposal/Storage @- Facility Type 0 Government Sponsored Facility W Clther --_Lp2+k-4;- --------------- TYPE OF CONTRACT -_------------__ a Prime 0 Subcontract&

Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

TO: FILE  

Office of Legacy Management (LM)

if' if' /, SO -1 : . . ' - ,? \\?.. . . ..- ,- I, al. I, .I (. ,g \. ' \ ,, " ' tlEMOHANDUM TO: FILE FROH: (?.)-/ki' + SITE ALTERNATE ---..~..~.~, NAME: ;d QJA I. /O", JL Ir,, e> 1 :' - _____ ---_--- ---+w- __________ -Nan= __- _____ - _________ Owner cork&ted I-J yes [Bno; If yes, data con'tacted _----__-_ TYPE OF OPERATION ---~~~~~---~~--__ a Research & Development 11 Facility Type 0 Production scale testing 0 Pilot Scale 3 Bench Scale Process Theoretical Studies cl Sample 81 finalysis !-J e4nufacturing 0 University q Research Organization IJ Government Sponsored Facil it) 0 Other ------------_ 0 Production 0 Disposal /Storage TYPE OF CONTRCICT -_-~~~~----~-~-- ,& Prime [II Subcontractor 0 Purchase Order 0 Other information (i.e., ~7,s:

42

Facility Security Officer Contractor Toolcart  

NLE Websites -- All DOE Office Websites (Extended Search)

U.S. DOE SECURITY CLEARANCES U.S. DOE SECURITY CLEARANCES Clearnce Home Initial Clearance Clearance Reinstate Clearance Upgrade Clearance Downgrade Clearance Extension Clearance Reciprocity Clearance Reinvestigation Clearance Termination Clearance Transfer Sandia National Laboratories sponsors and processes U.S. DOE Security Clearances for contractor personnel working on an authorized contract requiring access to classified information. Clearance Office Functions Contractor Pre-Process Background Review Certification Clearance File Change Drug Testing e-Fingerprinting Enrollment Process Maintaining a DOE Security Clearance During an Extended Absence DOE Personnel Security Reporting Requirements Data Report on Spouse/Cohabitant Name Change Change in Citizenship Contractor Clearance Tools Clearance Action Status Inquiries

43

TO: FILE  

Office of Legacy Management (LM)

' -1 1. ' -1 1. : . . , . . . "a7 MEMLlRANlJUtl TO: FILE FROM= -&k-k!!L-- l Owner-&ntacted 17 yes Current: ----- ---------- --__ -- -____ I If yes, data contacted ------------- TYPE OF OPERATION -------------____ IJ Research & Development cl Facility Type 0 Production scale testing Cl Pilot Scale a Bench Scale PrOCess 0 Theoretical Studies 0 Sample & Analysis Production 0 Disposal/Storage a Manuf actuiing , q University 0 Research Organizatian / IJ Government Sponsored Facility 0 Other I -------------------- 0 Prime 0 Subcantractk 0 Purchase Order 0 Other information (i.e., iost + fixed fee, unit price, , time & material, .$z) --e-L-- LL---------------------i---- Co"+act/Purchase Order # CONTRACTING PERIOD: __---------------- ----L'r'oll---- --------_-- ____________

44

TO: FILE  

Office of Legacy Management (LM)

pA.l4-l-j pA.l4-l-j TO: FILE I 4 MENORANDUM SUBJECT: aLwE?. .v --_---__ Past: Current: ----__-_____-----------~ -------------------_------ owner c:3ntacted q yes pm; if yes, date contacted ----------__- TYPE OF OPERATION ---_--__~~------_ 0 Research & Development 0 Production scale testing 0 Pilot 5cale 0 Bench Scale Process i Thearetical Studies Sample & Analysis 0 Producti on E Disposal/Storage Facility Type 0 Manufacturing 0 Uni verri ty 0 Research Organization 0 Government Sponsored Facility Cl Other &by-& e- -------- TYPE OF CONTRACT ~--_---_~_-----_ 0 Prime G Subcontractor *! Put-c!wse Order 0 Other information (i.e., cost + fixed fee, unit price, time & material, qtr) m--m--- -----------------_-------~~~ Contract/Purchase Order #

45

To: File  

Office of Legacy Management (LM)

iU i.1 ' iU i.1 ' i d1m1 To: File Fl-0lll: a. Wall0 Subject: FUSRAP review of the former Internationai Rare Metals site in Mt. Kisco New York. The former International Rare Metals Refinery in Mt. Eisco, NY began operations in the early 1940's. Throughout its operatic and in various correspondence it has also been known as "Pregs Mt. Ki sco Refinery" and most,recently, the Canadian Radium and Uranium Corporation site; During the Manhattan Engineer District (MED) era, the federal government through the MED, purchased uranium froni foreign sources, African ores and Canadian ores. The largest part of uranium in the early years were derived from the African ores. The contracts were only for the uranium in these ores. The agreements provided that all of the other valuable elements in

46

TO: FILE  

Office of Legacy Management (LM)

nEnoRANDUn nEnoRANDUn TO: FILE FR0f.t: ~L!S&km. ALTERNATE ---- -COME: ______ --~Z __________ I_v!E-!2E~_oEEeIIE!! p Research & Development 4 beq I I;om +obiylg 0 Production scale testing 0 Pilot Scale 0 ' Bench Scale Process i Theoretical Studies Sample & Analysis 0 Productiart Cl Disposal/Storage a Facility Type 0 Manufacturing 0 University 0 Research Organization 0 Government Sponsored Facility a Other --------------__----_ 0 VI Chic430 Other information (i.e., cost + fixed fee, unit price, time & material, etc) ------- Contract/R I) 7fo,-37+8 ----- ----- ------ ----- ________- __________-______--____ _C!?!!E3~_C12!E-E!!GE: -___~~~~~~-~---~~~~~~-~---- -__- -__ OWNERSHIP: AEC/UED AEC/UED GOVT GOUT co~TiacT0~ ~CONTRACTOR OWNEE LECISE_D EJE!2

47

V-237: TYPO3 Security Bypass Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-237: TYPO3 Security Bypass Vulnerabilities V-237: TYPO3 Security Bypass Vulnerabilities V-237: TYPO3 Security Bypass Vulnerabilities September 9, 2013 - 6:00am Addthis PROBLEM: Some vulnerabilities have been reported in TYPO3 PLATFORM: TYPO3 6.x ABSTRACT: TYPO3 comes with the possibility to restrict editors to certain file actions (copy, delete, move etc.) and to restrict these actions to be performed in certain locations REFERENCE LINKS: Secunia Advisory SA54717 Security Focus ID 62257 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Some errors when handling file actions can be exploited to bypass file action permission restrictions and e.g. create or read arbitrary files within or outside the webroot. 2) An error when validating file names within the file renaming functionality can be exploited to bypass the denied file extensions check

48

Data & File Systems  

NLE Websites -- All DOE Office Websites (Extended Search)

Data Management Policies NERSC File Systems HPSS Data Archive Optimizing IO performance on the Lustre file system IO Formats Sharing Data Transferring Data Unix Groups at NERSC...

49

FILE MANAGEMENT MANUAL  

NLE Websites -- All DOE Office Websites (Extended Search)

6.5.2 (ZAP BAD POINTERS) : Appendices :1 Glossary of Important File-Management Terms :29 SPIRES Documentation * SPIRES File Management ***...

50

Euclid File Systems  

NLE Websites -- All DOE Office Websites (Extended Search)

Request Form Euclid File Systems Euclid has 3 kinds of file systems available to users: home directories, scratch directories and project directories, all provided by the NERSC...

51

CENTRAL FILES  

Office of Legacy Management (LM)

/ .- / .- ~ _. ,- *-.* . . CENTRAL FILES +, a/ o(-t.z2-5 AlLO 1 Pab-FJr 3. 19% TYtxP REPaT To A&7bA cM.m rlmc)HA~ ON JANtJm 23, 1956 f. A. W~~~+Y, M.D. c. 1. 08huRann 8nd J. A. Hlaeririg ob3e8tilw of Trlpr in @ ttd~, (;rulw 2?), 1956, a ttip na nda to UM Crrrit &abw8tury, cword, Ohio. The purpow o? this trip u&a to aondwt the WMnd ti 8 #etia8 of indUrtF%al mgiene run~yr uhiah hre been Thwr8port ia 8 66mpondzLusofthe Amu4ll;rmtr forth&, rtsnyu@raaaderith~.~~M Alb8ugh, emamrud~~roft&~b8 Cnft UbOP&tOraJ'. Duaar&ptian of Trtpr The m88h&nlng oper8t1oM 8t the Alba ah6p lmm UlrrWarf tho# sf&&8mBthrrbrsrtbiefint~~#rru&. r%vo tUX!'lWt %&t&88, m (1) M8hb8 UthM, iOUr 4 th 5) urbthPW(3)dF%ll pSW888SUW8 ba-8

52

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Global Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent;...

53

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

January 11, 2012 January 11, 2012 TSO-01113 - In the Matter of Personnel Security Hearing The individual currently is employed by a DOE contractor, and that contractor has requested that he receive a DOE security clearance. Based on financial issues contained in the individual's security file, the Local Security Office (LSO) conducted a Personnel Security Interview (PSI) with the individual in July 2011. PSI, DOE Ex. 13 In August 2011, the LSO issued the individual a Notification Letter, together with a statement (Enclosure 2) setting forth the information that created a substantial doubt about his eligibility to hold a DOE security clearance. (DOE Ex. 1). December 21, 2011 TSO-1106 - In the Matter of Personnel Security Hearing The Individual is an applicant for a DOE access authorization in connection

54

SSH: secure login connections over the internet  

Science Conference Proceedings (OSTI)

SSH provides secure login, file transfer, X11, and TCP/IP connections over an untrusted network. It uses cryptographic authentication, automatic session encryption, and integrity protection for transferred data. RSA is used for key exchange and authentication, ...

Tatu Ylφnen

1996-07-01T23:59:59.000Z

55

NERSC File Systems  

NLE Websites -- All DOE Office Websites (Extended Search)

Systems Systems NERSC File Systems Overview NERSC file systems can be divided into two categories: local and global. Local file systems are only accessible on a single platform, providing best performance; global file systems are accessible on multiple platforms, simplifying data sharing between platforms. File systems are configured for different purposes. On each machine you have access to at least three different file system Home: Permanent, relatively small storage for data like source code, shell scripts, etc. that you want to keep. This file system is not tuned for high performance from parallel jobs. Referenced by the environment variable $HOME. Scratch: Large, high-performance file system. Place your large data files in this file system for capacity and capability computing. Data is

56

Security Plans  

Science Conference Proceedings (OSTI)

... Appendix A – Glossary - A glossary of security terms used within the security planning document. ... F, Glossary. None applicable.

2013-09-30T23:59:59.000Z

57

Large File System Backup: NERSC Global File System Experience  

E-Print Network (OSTI)

Large File System Backup NERSC Global File System ExperienceNational Laboratory Abstract NERSC’s Global File system (from all compute systems at NERSC, holds files and data from

Mokhtarani, Akbar

2008-01-01T23:59:59.000Z

58

CSV File Documentation: Consumption  

Gasoline and Diesel Fuel Update (EIA)

Consumption Consumption The State Energy Data System (SEDS) comma-separated value (CSV) files contain consumption estimates shown in the tables located on the SEDS website. There are four files that contain estimates for all states and years. Consumption in Physical Units contains the consumption estimates in physical units for all states; Consumption in Btu contains the consumption estimates in billion British thermal units (Btu) for all states. There are two data files for thermal conversion factors: the CSV file contains all of the conversion factors used to convert data between physical units and Btu for all states and the United States, and the Excel file shows the state-level conversion factors for coal and natural gas in six Excel spreadsheets. Zip files are also available for the large data files. In addition, there is a CSV file for each state, named

59

Dirac File Systems  

NLE Websites -- All DOE Office Websites (Extended Search)

http:help.nersc.gov consult@nersc.gov 1-800-66-NERSC, option 3 or 510-486-8611 Home For Users Computational Systems Dirac File storage File Storage Disk Quota...

60

Standard interface file handbook  

SciTech Connect

This handbook documents many of the standard interface file formats that have been adopted by the US Department of Energy to facilitate communications between and portability of, various large reactor physics and radiation transport software packages. The emphasis is on those files needed for use of the VENTURE/PC diffusion-depletion code system. File structures, contents and some practical advice on use of the various files are provided.

Shapiro, A.; Huria, H.C. (Cincinnati Univ., OH (United States))

1992-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber...

62

Guidelines for Filing Monthly Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guidelines for Filing Monthly Guidelines for Filing Monthly Reports Guidelines for Filing Monthly Reports Reporting Requirements Importers and exporters of natural gas must file monthly reports on their activities, as required in DOE/FE Order No. 2464, dated February 1, 2008. Reports are required to contain certain information, but there is no requirement regarding the format for the monthly submissions. The collection of this information is approved by OMB No. 1901-0294, which has an expiration date of July 31, 2016. For the convenience of filers, the Office of Oil and Gas Global Security and Supply, Division of Natural Gas Regulatory Activities provides formats for reporting through Form FE-746R. Filing Forms With The Federal Government And Estimated Reporting Burden Respondents are not required to file or reply to any Federal collection of

63

Active security  

Science Conference Proceedings (OSTI)

In this paper we introduce active security, a new methodology which introduces programmatic control within a novel feedback loop into the defense infrastructure. Active security implements a unified programming environment which provides interfaces ... Keywords: central management, digital forensics, network security

Ryan Hand, Michael Ton, Eric Keller

2013-11-01T23:59:59.000Z

64

V-117: Symantec Enterprise Vault for File System Archiving Unquoted Search  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Symantec Enterprise Vault for File System Archiving Unquoted 7: Symantec Enterprise Vault for File System Archiving Unquoted Search Path Lets Local Users Gain Elevated Privileges V-117: Symantec Enterprise Vault for File System Archiving Unquoted Search Path Lets Local Users Gain Elevated Privileges March 22, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Symantec Enterprise Vault PLATFORM: Versions prior to Enterprise Vault 9.0.4 and 10.0.1 are vulnerable. ABSTRACT: Symantec Enterprise Vault (EV) for File System Archiving has an unquoted search path in the File Collector and File PlaceHolder services REFERENCE LINKS: SecurityTracker Alert ID: 1028330 Symantec Security Advisories SYM13-003 SecurityFocus ID: 58617 CVE-2013-1609 IMPACT ASSESSMENT: Medium DISCUSSION: This could potentially allow an authorized but non-privileged local user to

65

A Game Theoretical Approach to Communication Security  

E-Print Network (OSTI)

Security solutions . . . . . . . . . . . . . . . .Practical security solutions . . . . . . . . . . . . .Communication security

Gueye, Assane

2011-01-01T23:59:59.000Z

66

T-610: Red Hat kdenetwork security update | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Red Hat kdenetwork security update 0: Red Hat kdenetwork security update T-610: Red Hat kdenetwork security update April 26, 2011 - 7:11am Addthis PROBLEM: A directory traversal flaw was found in the way KGet, a download manager, handled the "file" element in Metalink files. An attacker could use this flaw to create a specially-crafted Metalink file that, when opened, would cause KGet to overwrite arbitrary files accessible to the user running KGet. PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: A directory traversal flaw was found in the way KGet, a download manager, handled the "file" element in Metalink files. reference LINKS: RHSA-2011:0465-1 CVE-2011-1586 RH Classification RH Updates Support

67

Security Tools - A "Try Before You Buy" Web-Based Approach  

Science Conference Proceedings (OSTI)

... branch of the security tree, enter the user ... such details as: the depth of search within the file ... Additional keywords and taxonomy terms; Most and least ...

68

TFC-0010- In the Matter of National Security Archive  

Energy.gov (U.S. Department of Energy (DOE))

The National Security Archive filed an Appeal from a determination that the National Nuclear Security Administration (NNSA) issued on April 21, 2011. In that determination, NNSA denied in part a request for information that the National Security Archive had submitted on November 29, 2006, pursuant to the Freedom of Information Act (FOIA), 5 U.S.C. § 552.

69

Cyber Security Audit and Attack Detection Toolkit: Bandolier and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Audit and Attack Detection Toolkit: Bandolier and Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems. By building configuration audit and attack detection capabilities into tools already used by the energy sector, Bandolier and Portaledge offer energy asset owners low-cost and easily integrable control systems security solutions. Energy system operators can optimize the security of their control system configuration using Bandolier Security Audit Files, which assess the current configuration against an optimal security configuration.

70

1999 CBECS Public Use Files  

Gasoline and Diesel Fuel Update (EIA)

1999 Commercial Buildings Energy Consumption Survey Detailed Tables. If you need assistance viewing this page, please contact 202-586-8800. Energy Information Administration Home Page 1999 Commercial Buildings Energy Consumption Survey Detailed Tables. If you need assistance viewing this page, please contact 202-586-8800. Energy Information Administration Home Page Home > Commercial Buildings Home > CBECS Public Use Data > 1999 Files Updated: October 2002 DATA: How are these files used? Download all format codes (text file, 9 Kb) Download all layout files and format codes (PDF file, 373 Kb) Note: The following are all text files. Layout files range from 3 to 6 KB; data files range from 488 Kb to 1.16 MB. File 1: General Building Information and Energy End Uses (Last modified 10/1/01) Layout File Data File File 2: Building Activities, Special Measures of Size, and Multibuilding Facilities (Last modified 10/1/01) Layout File Data File

71

PDSF's Eliza File Systems  

NLE Websites -- All DOE Office Websites (Extended Search)

Eliza File Systems Eliza File Systems Eliza File Systems Storage at PDSF is organized by group and all partitions are exported to all the nodes in the cluster. Please note that files on these file systems are not backed up. It is the responsibility of users to back up their files themselves as necessary. Over the years at PDSF there have been incidents which resulted in a loss of data from disk, often related to aging hardware. Note that the way to display the SGE io units on the command line is "qconf -se global". Disk Vault Experiments SGE io units Disk Space (TB) Directories eliza1 Atlas 400 35 atlas eliza2 Atlas 200 35 atlas eliza5 Cuore, Kamland 400 34 cuore kamland eliza6 Alice, RNC, Star 400 34 alice rnc star eliza7 Dayabay 200 24 dayabay icecube

72

STEP File Analyzer  

Science Conference Proceedings (OSTI)

... The STEP File Analyzer is a software tool that generates a spreadsheet from a STEP (ISO 10303 –STandard for Exchange of Product model data ...

2013-08-06T23:59:59.000Z

73

File:Keystone.pdf | Open Energy Information  

Open Energy Info (EERE)

File Edit History Facebook icon Twitter icon File:Keystone.pdf Jump to: navigation, search File File history File usage File:Keystone.pdf Size of this preview: 463 599...

74

Secure Facilities & Capabilities | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Facilities SHARE Secure Facilities and Capabilities...

75

Dismantling security.  

E-Print Network (OSTI)

??University of Minnesota Ph.D. dissertation. October 2010. Major. Political Science. Advisor: Raymond Duvall. 1 computer file (PDF); x, 197 pages. Ill. (some col.) The post… (more)

Calkivik, Emine Asli

2010-01-01T23:59:59.000Z

76

Security Cases  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

security-cases Office of Hearings and Appeals 1000 security-cases Office of Hearings and Appeals 1000 Independence Ave., SW Washington, DC, 20585 202-287-1566 en PSH-13-0103 - In the Matter of Personnel Security http://energy.gov/oha/downloads/psh-13-0103-matter-personnel-security security" class="title-link">PSH-13-0103 - In the Matter of Personnel Security

77

Security Policy  

Science Conference Proceedings (OSTI)

... M/S ACES Pvt. Ltd. Pakistan Page Security Policy ... 2013 M/S ACES Pvt. Ltd. Pakistan 5/27/2013 Page 2. [SECURITY POLICY] May 27, 2013 ...

2013-05-29T23:59:59.000Z

78

File list | Open Energy Information  

Open Energy Info (EERE)

16 April 2013 Geothermal Cooling Towers.jpg (file) 690 KB Kyoung 1 11:01, 16 April 2013 Turbine.jpg (file) 530 KB Kyoung 1 23:27, 15 April 2013 Energy 101 GHP Video.png (file)...

79

----Google File System Windows IT  

E-Print Network (OSTI)

Essential ---- Google File System web Windows IT Google IT Google Google File System Google File System Datebase Google Google " " Goolge Goolge Google Google Goolge Google ()(,) Google ...... Google IT Google Google Google Google Google "Google " Google 10

80

Printer-Friendly Handbook Files  

Science Conference Proceedings (OSTI)

... Printer-Friendly Handbook Files. ... Please note that these pdf files are not updated as frequently as the html versions of the e-Handbook are. ...

2013-11-26T23:59:59.000Z

Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Nephele: Scalable Access Control for Federated File Services  

Science Conference Proceedings (OSTI)

The integration of storage resources across different administrative domains can serve as building block for the development of efficient collaboration environments. In order to improve application portability across such environments, we target data ... Keywords: Access control, Analytical evaluation, Decentralization, Distributed systems, File services, Performance measurements, Security

Giorgos Margaritis; Andromachi Hatzieleftheriou; Stergios V. Anastasiadis

2013-03-01T23:59:59.000Z

82

Cyber Security | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Home | Science & Discovery | National Security | Initiatives | Cyber Security SHARE Cyber Security Through Science A Science-Based Approach image ORNL uses a science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant, 'game-changing' transformation requires a science-based approach that combines fundamental understanding with experimentation, theory, and modeling. The most successful scientific programs use peer review to maximize intellectual capital and prioritize research needs. The Department of Energy has applied this approach through programs such as the Scientific Discovery through Advanced Computing (SciDAC) and ASCI,

83

Carver File Systems  

NLE Websites -- All DOE Office Websites (Extended Search)

HOME. The absolute path to a home directory (e.g., u4joe) may change, but the value of HOME will always be correct. Please back up all important files on a regular...

84

Fixing file descriptor leaks  

E-Print Network (OSTI)

We design, implement and test a tool for eliminating file descriptor (FD) leaks in programs at run-time. Our tool monitors FD allocation and use. When the allocation of a new FD would fail because a process's entire pool ...

Dumitran, Octavian-Daniel

2007-01-01T23:59:59.000Z

85

SecureBox: National Security Through Secure Cargo – Team Members  

SecureBox: National Security Through Secure Cargo – Team Members: Front Row (left to right): Howard Lowdermilk, Greg Dallum, Faranak Nekoogar, Vickie ...

86

Safety, Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Safety, Security Safety, Security Safety, Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our work Our commitments We conduct our work safely and responsibly to achieve our mission. We ensure a safe and healthful environment for workers, contractors, visitors, and other on-site personnel. We protect the health, safety, and welfare of the general public. We do not compromise safety for personal, programmatic, or

87

Renewal-anomalous-heterogeneous files  

E-Print Network (OSTI)

Renewal-anomalous-heterogeneous files are solved. A simple file is made of Brownian hard spheres that diffuse stochastically in an effective 1D channel. Generally, Brownian files are heterogeneous: the spheres' diffusion coefficients are distributed and the initial spheres' density is non-uniform. In renewal-anomalous files, the distribution of waiting times for individual jumps is exponential as in Brownian files, yet obeys: {\\psi}_{\\alpha} (t)~t^(-1-{\\alpha}), 0renewal as all the particles attempt to jump at the same time. It is shown that the mean square displacement (MSD) in a renewal-anomalous-heterogeneous file, , obeys, ~[_{nrml}]^{\\alpha}, where _{nrml} is the MSD in the corresponding Brownian file. This scaling is an outcome of an exact relation (derived here) connecting probability density functions of Brownian files and renewal-anomalous files. It is also shown that non-renewal-anomalous files are slower than the corresponding renewal ones.

Ophir Flomenbom

2010-08-13T23:59:59.000Z

88

U-216: HP StorageWorks File Migration Agent Buffer Overflows Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP StorageWorks File Migration Agent Buffer Overflows Let 6: HP StorageWorks File Migration Agent Buffer Overflows Let Remote Users Execute Arbitrary Code U-216: HP StorageWorks File Migration Agent Buffer Overflows Let Remote Users Execute Arbitrary Code July 19, 2012 - 7:14am Addthis PROBLEM: HP StorageWorks File Migration Agent Buffer Overflows Let Remote Users Execute Arbitrary Code PLATFORM: HP StorageWorks File Migration Agent ABSTRACT: Two vulnerabilities were reported in HP StorageWorks File Migration Agent. reference LINKS: SecurityTracker Alert ID: 1027281 ZDI-12-127 ZDI-12-126 IMPACT ASSESSMENT: High Discussion: The vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP StorageWorks File Migration Agent. Authentication is not required to exploit this vulnerability. 1. (ZDI-12-127) The specific flaw exists within the HsmCfgSvc.exe service

89

U-216: HP StorageWorks File Migration Agent Buffer Overflows Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-216: HP StorageWorks File Migration Agent Buffer Overflows Let U-216: HP StorageWorks File Migration Agent Buffer Overflows Let Remote Users Execute Arbitrary Code U-216: HP StorageWorks File Migration Agent Buffer Overflows Let Remote Users Execute Arbitrary Code July 19, 2012 - 7:14am Addthis PROBLEM: HP StorageWorks File Migration Agent Buffer Overflows Let Remote Users Execute Arbitrary Code PLATFORM: HP StorageWorks File Migration Agent ABSTRACT: Two vulnerabilities were reported in HP StorageWorks File Migration Agent. reference LINKS: SecurityTracker Alert ID: 1027281 ZDI-12-127 ZDI-12-126 IMPACT ASSESSMENT: High Discussion: The vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP StorageWorks File Migration Agent. Authentication is not required to exploit this vulnerability.

90

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8206,...

91

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

transparency, and security that are preconditions to the ultimate fulfillment of the Non-Proliferation Treaty's goals and ambitions. Open Source Center The Open Source Center...

92

Security Automation Conference & Workshop  

Science Conference Proceedings (OSTI)

... Security Automation Conference & Workshop. ... Richard Hale, DISA - Information Security & Security Automation in DoD (coming soon); ...

93

HIPAA Security Rule  

Science Conference Proceedings (OSTI)

Related ActivitiesHIPAA Security RuleHealth Information Exchange (HIE) Security Architecture. Related ... HIPAA Security Rule. NIST ...

2011-11-21T23:59:59.000Z

94

Security Enforcement Reporting Criteria  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Classified Information Security Noncompliance Reporting Criteria January 2012 MANDATORY SECURITY INCIDENT REPORTING Classified information security noncompliances are categorized...

95

Lab announces security changes  

NLE Websites -- All DOE Office Websites (Extended Search)

Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security...

96

Personnel Security Program | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Personnel Security Program Home > About Us > Our Programs > Nuclear Security > Personnel Security...

97

Office of Headquarters Security Operations: Headquarters Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Operations Home Sub Offices HQ Security Officers (HSO) Program Office of Information Security Office of Headquarters Personnel Office of...

98

ELCAP Data Assembly and Conversion Project: Report on File Contents  

E-Print Network (OSTI)

................................................................................................................7 PNNL Data Files.........................................................................................................................................9 PNNL Site Files.SASLIB.XPT.....................................................................................................................................14 PNNL AVAX Files

99

T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

704: RSA enVision Lets Remote Users View Files and Remote 704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password August 29, 2011 - 3:45am Addthis PROBLEM: Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT: RSA enVision lets remote users view files and remote authenticated users obtain password. reference LINKS: SecurityTracker Alert ID: 1025979 CVE-2011-2736 CVE-2011-2737 RSA enVision Product Security IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA enVision. A remote user can view files on the target system. A remote authenticated user can obtain

100

T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: RSA enVision Lets Remote Users View Files and Remote 4: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password August 29, 2011 - 3:45am Addthis PROBLEM: Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT: RSA enVision lets remote users view files and remote authenticated users obtain password. reference LINKS: SecurityTracker Alert ID: 1025979 CVE-2011-2736 CVE-2011-2737 RSA enVision Product Security IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA enVision. A remote user can view files on the target system. A remote authenticated user can obtain

Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Energy Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Security Energy Security Energy Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. April 12, 2012 A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. Proponents of such bioreactors (compared to open ponds) say the growth environment can be more easily controlled; they prevent evaporation; and light penetrates through all sides of the container, which increases cell density. However, bioreactors suffer high materials and energy costs as well as mixing and gas-exchange

102

Description file for NLCD92 contiguous raster coverage file  

NLE Websites -- All DOE Office Websites (Extended Search)

Readme file for NLCD92 contiguous raster coverage file Abstract: This data set is one complete raster coverage of the USGS National Land Cover Data (NLCD). The NLCD is a 21-class...

103

ENERGY SECURITY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

national strategy for national strategy for ENERGY SECURITY recommendations to the nation on reducing u.s. oil dependence september 2008 a project of a project of a national strategy for energy security Recommendations to the Nation on Reducing U.S. Oil Dependence september 2008 Table of Contents 2 Energy Security Leadership Council 3 Statement of Purpose 4 Letter to the President, the Congress, and the American People 7 Outline of Main Body of Report 13 Introduction 21 Policy Recommendations: Summary 33 Part I Β· Diversify Energy Supplies for the Transportation Sector

104

Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Security Security Security program under Office of Health, Safety and Security developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented. Headquarters Facilities Master Security Plan The purpose of the Headquarters Facility Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures

105

Cyber Security Guidelines, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

BNL Cyber Security Guidelines BNL Cyber Security Guidelines Appropriate Use Unauthorized and Malicious Access and Actions Blatant Disregard for Laboratory Computer Security Privacy of Electronic Files, and E-MAIL Publishing & Accessing Information on Electronic Networks The Laboratory's main concerns are protecting data and systems critical to operations in pursuit of its mission. The Laboratory's Computer Security Plan covers Laboratory systems, whether on-site and connected directly to the Laboratory network, or on- or off-site and connected to the Laboratory network by the telephone system or other means. The procedures and rules described here cover these systems no matter who is the owner or the method of connection to the network. Laboratory employees and registered users are responsible for their own actions under the computer security policy, as well as for the actions of any person who they permit to access a Laboratory system.

106

PDSF Shells and Startup Files  

NLE Websites -- All DOE Office Websites (Extended Search)

Shells and Startup Files Shells and Startup Files PDSF Defined Environment When new users are added to the PDSF machines, the shell is set according to the user's request. You can...

107

OHA EIA CASES ARCHIVE FILE  

Energy.gov (U.S. Department of Energy (DOE))

This is a archive file of our EIA decisions, Please download this file to your local computer and use the build in adobe search feature. Individual cases are listed in the bookmark section of the...

108

OHA Whistleblower Cases Archive File  

Energy.gov (U.S. Department of Energy (DOE))

This is a archive file of our Whistleblower decisions, Please download this file to your local computer and use the build in adobe search feature. Individual cases are listed in the bookmark...

109

OHA FOIA Cases Archive File  

Energy.gov (U.S. Department of Energy (DOE))

This is a archive file of our FOIA decisions, Please download this file to your local computer and use the build in adobe search feature. Individual cases are listed in the bookmark section of the...

110

OHA Misc Cases Archive File  

Energy.gov (U.S. Department of Energy (DOE))

This is a archive file of our Misc decisions, Please download this file to your local computer and use the build in adobe search feature. Individual cases are listed in the bookmark section of the...

111

Security Rulemaking  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM 2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM Knoxville, TN - May 16, 2012 2 NRC Actions Since September 11, 2001 * Interim solution - enhance existing regulations through Security Orders * Objectives of the Orders are enhanced control of material to - Prevent unauthorized access - Prevent malevolent use of material - Mitigate consequences * Orders were issued to NRC licensees that transport: - Spent Nuclear Fuel - IAEA Code of Conduct Category 1 and 2 quantities of radioactive material Security Rulemakings 3 NRC Ongoing Activities * Orders are an interim measure * Long-term approach is to enhance transport security through public rulemaking * Rulemaking process in progress for - SNF Transportation Security - Physical Protection of Category 1 and 2 material (both fixed

112

The NERSC CAM README file  

NLE Websites -- All DOE Office Websites (Extended Search)

decomposition and communication layer Parallel Library for Grid Manipulations (PILGRIM), source and build files for which are located in camrootmodelsutilspilgrim....

113

National Security Agency  

E-Print Network (OSTI)

The governmentattic.org web site (“the site”) is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. NATIONAL SECURITY AGENCY

unknown authors

2011-01-01T23:59:59.000Z

114

Edison File Storage and I/O  

NLE Websites -- All DOE Office Websites (Extended Search)

File Storage and IO File Storage and IO Disk Quota Change Request Form Edison File Systems The Edison system has 4 different file systems; they provide different levels of disk...

115

Transportation Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

116

The Multilevel Grid File {A Dynamic Hierarchical Multidimensional File Structure  

E-Print Network (OSTI)

ABSTRACT: We present a new dynamic hashed file organization that solves most problems associated with the directory of the grid file proposed by Nievergelt et al. Our scheme is a multilevel extension of the grid file that supports multiattribute accesses to the file for exact-match, partialmatch, and range queries as well as graceful expansion and shrinkage of the file in a dynamic environment. This new file organization offers a number of advantages over the grid file such as compact representation of the directory, linear growth of the directory in the number of records, easy splitting and merging of the directory, efficient processing of partial-match queries, and finer granularity of the directory. Moreover, it provides a new concept, calledabshuct d, that can be employed in practical database applications. 1.

Kyu-young Whang; Ravi Krishnamurthy

1991-01-01T23:59:59.000Z

117

Northern Pass WLT Filing  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

September 12, 2013 Electronic filing September 12, 2013 Electronic filing Christopher Lawrence Office of Electricity Delivery and Energy Reliability (OE-20), U.S. Department of Energy, 1000 Independence Avenue, SW. Washington, DC 20585 Fax: (202) 586-8008 Christopher.Lawrence@hq.doe.gov Re: Petition by The Weeks Lancaster Trust to intervene in the matter of the Northern Pass Transmission LLC Application for a Presidential Permit (OE Docket No. PP-371) Dear Mr. Lawrence, Following is the petition by The Weeks Lancaster Trust LLC to intervene and comment in the matter of Northern Pass Transmission LLC's Application for a Presidential Permit (PP-371). In accordance with the Notice of Application for this proceeding (75FR 69990), we are also sending a hard copy to the address above. Please contact us by

118

MEMORANDUfl J: FILE DATE  

Office of Legacy Management (LM)

J: FILE DATE J: FILE DATE // //r /so -----------w------m FROM: 9. 34oyc -w--------v----- SUBJECT: D3 Bo;s CL&;C J mL-;+J; - Rcc cap 049 /'A :j$: &336;s L-.fh~ w-f L-1 ALE"nirTE __ ------------- --- ---_------------------ CITY: &u+M- - &. -w---v------ ---B-------w STATE: 0 h' -a---- OWNER(S) --pi::;- l>cl, b af.5 CA.-*>J CD Current: Gr;W i- ~U~&;P~ -------------,,' ,-,,,,-, Owner contacted 0 yes jg no; -------------------------- if yes, date contacted ------m------ TYPE OF OPERATION --w--w----------- & Research & Development a Facility Type 0 Production scale testing Cl Pilot Scale 0 Bench Scale Process 0 Theoretical Studies w Sample & Analysis 0 Manufacturing 0 University 0 Research Organization 0 Government Sponsored Facility

119

TO: FILE MEMORANDUM  

Office of Legacy Management (LM)

FILE FILE MEMORANDUM DATE +zljlk> - - - - ---_ _ _ ALTERNATE NAME: CITY: -!~Lh_-~~~bl--~--------STATE: --%&A --~~~~~~---~~~------__ a OWNE=t (!, ----L--- P a s t i awne~-;Pntacted ?? yes --~~~~~-----_------_______ ; i f y e s , d a t e c o n t a c t e d ----------___ TYPE O& OPERATION -----+--------- & Development cl Facility Type 0 D i spbsal/Storage 0 Ma,nuf acturing 0 U n i v e r s i t y 0 R e s e a r c h O r g a n i z a t i o n / 0 Government 0 O t h e r Sponsored Facility -------------------L- TYPE OF CONTRACT -----------_____ 0 Prime 0 S u b & t r a c t o r ??Purctase Order ? Other information (i.e., cost / + fixed fee, unit price, time & material, gtc:) ------- ! ---------------------------- ~ .Ccntract/Purchase O r d e r - - - - - - - - I, # --~~-~-_~~~~---- CONTRACTING PESIOD- i -------e------L---- .I --~-~~r~-~~-~~--- ______ ~--~--- OWNERSHIP:

120

PSH-12-0021 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21 - In the Matter of Personnel Security Hearing 21 - In the Matter of Personnel Security Hearing PSH-12-0021 - In the Matter of Personnel Security Hearing The Individual is a contractor employee at a DOE facility. The Local Security Office (LSO) received information that the Individual had not filed a state income tax return for the year 2007. Exhibit (Ex.) 3 at 1. Consequently, LSO conducted a personnel security interview (PSI) with the Individual in October 2011. Ex. 7. Because the 2011 PSI failed to resolve the security concerns raised by the Individual's failure to file tax returns, the LSO informed the Individual, in a February 2012 notification letter (Notification Letter), that derogatory information existed which raised security concerns under 10 C.F.R. Β§ 710.8 (l) (Criterion L) and that her security clearance was suspended. Ex. 1. The Notification Letter

Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

National Security Technology Center | Y-12 National Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Security and Training National Security ... National Security Technology Center What kinds of security technologies are we talking about? See our capabilities...

122

Tag: security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

security security Tag: security Displaying 1 - 5 of 5... Category: Security Security Y-12 places the highest priority on maintaining and improving its security posture. More... Category: News Johnson shares perspective on security Rod Johnson, B&W Y-12 deputy general manager of Security, recently discussed the security atmosphere since his arrival last August and what he sees as Y-12's security future. More... Category: News Y-12 to Install New Fence to Reduce Trespassing The National Nuclear Security Administration today announced plans to extend the boundary fence at the Y-12 National Security Complex along Scarboro Road. The new fence is expected to be in place by April 4. More... Category: News New institute promotes nuclear security Y-12 is partnering with the University of Tennessee and others to provide

123

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8/2/06, Product #16, stated: "Develop an annotated bibliography of publicly-available documents related to security of radioactive material transportation." * Earlier this year, a preliminary draft annotated bibliography on this topic was developed by T-REX , UNM, to initially address this STG Work Plan Task. Preliminary Draft - For Review Only 3 Considerations in Determining Release of Information * Some "Publicly-available" documents could potentially contain inappropriate information according to standards set by DOE information security policy and DOE Guides. - Such documents would not be freely

124

Message Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Message Message Security Services Overview ECS Audio/Video Conferencing Fasterdata IPv6 Network Network Performance Tools (perfSONAR) ESnet OID Registry PGP Key Service Virtual Circuits (OSCARS) OSCARS Case Study Documentation User Manual FAQ Design Specifications Functional Specifications Notifications Publications Authorization Policy Default Attributes Message Security Clients For Developers Interfaces Links Hardware Requirements DOE Grids Service Transition Contact Us Technical Assistance: 1 800-33-ESnet (Inside the US) 1 800-333-7638 (Inside the US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net Message Security Overview The OSCARS Web pages and Web Services are run within a Tomcat container which uses SSL connections to encrypt all messages. The OSCARS Web Service

125

Allied Security Scholarship ALLIED SECURITY SCHOLARSHIP 2013  

E-Print Network (OSTI)

Allied Security Scholarship ALLIED SECURITY SCHOLARSHIP 2013 BACKGROUND The Allied Security Scholarship was established by Allied Security to assist students to undertake full-time study at the University of Waikato. REGULATIONS 1. The Scholarship shall be known as the Allied Security Scholarship. 2

Waikato, University of

126

Physical Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Summary Report - Independent Oversight Inspection of Safeguards and Security and Cyber Security at the Y-12 Site Office and the Y-12 National Security Complex (U), January...

127

Security for grids  

E-Print Network (OSTI)

S. Kent, R. Atkinson. Security Architecture for the InternetTsudik, S. Tuecke. A Security Architecture for ComputationalComputer and Communications Security Conference, pp. 83-92,

Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

2005-01-01T23:59:59.000Z

128

Taxation and Social Security  

E-Print Network (OSTI)

Re: Taxation and Social Security Attached is draft chapter11 TAXATION AND SOCIAL SECURITY A substantial fraction ofaspects of social security schemes in a setting in which

Kaplow, Louis

2006-01-01T23:59:59.000Z

129

Security and Elections  

E-Print Network (OSTI)

World Conf. Information Security Education, 2007, pp. 17–24;Security andElections IEEE Security & Privacy, 10(5):64–67, Sept. -

Bishop, Matt; Peisert, Sean

2012-01-01T23:59:59.000Z

130

V-190: ASUS RT-N66U Router AiCloud Security Bypass Security Issue |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: ASUS RT-N66U Router AiCloud Security Bypass Security Issue 0: ASUS RT-N66U Router AiCloud Security Bypass Security Issue V-190: ASUS RT-N66U Router AiCloud Security Bypass Security Issue July 2, 2013 - 12:38am Addthis PROBLEM: ASUS RT-N66U Router AiCloud Security Bypass Security Issue PLATFORM: ASUS RT-N66U Router firmware versions 3.0.0.4.270 and 3.0.0.4.354. ABSTRACT: A security issue in ASUS RT-N66U Router has been reported REFERENCE LINKS: Secunia Advisory SA53931 neohapsis IMPACT ASSESSMENT: Medium DISCUSSION: The security issue is caused due to the device not properly restricting access when processing certain HTTPS requests and can be exploited to gain access to otherwise restricted functionality and e.g. disclose the contents of arbitrary files and directories. Successful exploitation requires the AiCloud web service to be enabled.

131

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

132

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

133

NERSC Increases System Storage and Security for Users  

NLE Websites -- All DOE Office Websites (Extended Search)

Increases Increases System Storage and Security for Users NERSC Increases System Storage and Security for Users April 28, 2009 Franklin Upgrades Improve I/O Performance Throughout the month of March the Cray XT4 machine Franklin underwent a series of upgrades and improvements, including a major I/O upgrade. The disk capacity of the scratch file system was increased by 30% to 460 TB, and the I/O bandwidth was nearly tripled to an aggregate write performance of 32 GB/sec, compared to 11 GB/s before the upgrade. Instead of adding the new hardware to the existing scratch file system, NERSC chose to implement a second scratch file system so that Franklin now has two scratch file systems, each with a peak write bandwidth of 16 GB/sec. "We doubled the amount of I/O hardware and nearly tripled the bandwidth,

134

T-628: Debian APR Library Security Update | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-628: Debian APR Library Security Update T-628: Debian APR Library Security Update T-628: Debian APR Library Security Update May 23, 2011 - 3:35pm Addthis PROBLEM: Debian APR Library Security Update. PLATFORM: APR packages: 2009.0, 2010.1, Corporate 4.0, Enterprise Server 5.0 ABSTRACT: A flaw was found in the APR library, which could be exploited through Apache HTTPD's mod_autoindex. reference LINKS: Debian Security Advisory DSA-2237-2 Security Database Adviory Security Focus Advisory CVE-2011-1928 CVE-2011-0419 Secunia Advisory SA44574 IMPACT ASSESSMENT: Medium Discussion: A directory indexed by mod_autoindex contained files with sufficiently long names, a remote attacker could send a carefully crafted request which would cause excessive CPU usage. This could be used in a denial of service attack.

135

Large File System Backup: NERSC Global File System Experience  

SciTech Connect

NERSC's Global File system (NGF), accessible from all compute systems at NERSC, holds files and data from many scientific projects. A full backup of this file system to our High Performance Storage System (HPSS) is performed periodically. Disk storage usage by projects at NERSC has grown seven fold over a two year period, from ~;;20TB in June 2006 to ~;;140 TB in June 2008. The latest full backup took about 13 days and more than 200 T10k tape cartridges (.5 TB capacity). Petabyte file systems are becoming a reality in the next few years and the existing utilities are already strained in handling backup tasks.

Mokhtarani, Akbar; Andrews, Matthew; Hick, Jason; Kramer, William

2008-10-23T23:59:59.000Z

136

Java Security  

Science Conference Proceedings (OSTI)

From the Publisher:With a market share of almost 70%, Java can be rightly called the programming language of the Web. Java security allows transmission of sensitive information, stores sensitive data, ensures that code is from a trusted source, and ensures ...

Madhushree Ganguli

2002-11-01T23:59:59.000Z

137

The Fifth Workshop on HPC Best Practices: File Systems and Archives  

SciTech Connect

The workshop on High Performance Computing (HPC) Best Practices on File Systems and Archives was the fifth in a series sponsored jointly by the Department Of Energy (DOE) Office of Science and DOE National Nuclear Security Administration. The workshop gathered technical and management experts for operations of HPC file systems and archives from around the world. Attendees identified and discussed best practices in use at their facilities, and documented findings for the DOE and HPC community in this report.

Hick, Jason; Hules, John; Uselton, Andrew

2011-11-30T23:59:59.000Z

138

DotDFS: A Grid-based high-throughput file transfer system  

Science Conference Proceedings (OSTI)

DotGrid platform is a Grid infrastructure integrated with a set of open and standard protocols recently implemented on the top of Microsoft .NET in Windows and MONO .NET in UNIX/Linux. DotGrid infrastructure along with its proposed protocols provides ... Keywords: Concurrent systems, Data grids, Event-driven architecture, File transfer protocols, Grid computing, Grid security, High throughput file transfer, Modeling parallel TCP throughput

Alireza Poshtkohi; M. B. Ghaznavi-Ghoushchi

2011-02-01T23:59:59.000Z

139

MEMORANDUM TO: FILE  

Office of Legacy Management (LM)

3 3 MEMORANDUM TO: FILE FROM: D, h&Z *_ --------------__ SITE NA,,E: -------- CITY: -%+&6!? -------------------------- STATE: CT cr: 13 ------ WNERL_S, Past: -------_____-----_-_____ current: -----------------------~-- Owner contacted q yes q no; if yes, date contacted / TYPE OF OPERATION ----------------- J& Research & Development i \ 0 Production scale testing 0 Pilot Scale 0 Bench Scale Process i Theoretical Studies Sample & Analysis m Production e9 Facility Type p Manufacturing rJ University $ Research Organizat 0 Government Sponsor 0 Other I ------------ ,-, I I TFaLility Other information (i.e., cost + fixed fee, unit price, Contract/Purchase ~~~~---~~~_---~~~~---------- I OWNERSHiP: AEC/MED AECbED GOVT GOUT I CONTRACTOR CONTRACTOR

140

MEHORANDUfl TO: FILE SUBJECT:  

Office of Legacy Management (LM)

MEHORANDUfl MEHORANDUfl TO: FILE ------_____ SUBJECT: OWNER (S) -----_-- Post:-------_-------_________ current: ---------_---------_______ Owner contacted 0 yes Qnna; if yes, date contacted -------_--___ TYPE OF OPERATION ~~~---~~_-----__- 0 Research & Develapment x Facility Type 0 Production scale testing 0 Pilot Scale 0 Bench Scale Pkoces;s i ,Theoretical Studies Sample & Analysis 0 Manufacturing 0 University 0 Research Drganizaticn 0 Government Sponsored Facility & other &ded-S~AWe-- c Production 0 Di cposal /Storage TYPE OF CONTRACT ---------------- 5 Prime 0 Q Subcontract& -$JJ$~~~$~~' ~~*' - T04' L Other information (i.e., cost + fixed fee, unit price, 0 Purchase Order time 81 material, qtr) ------- _----__------_---__--------- Cantract/Purkhaae Order #-@ -'

Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

MEMORANDUM TO: FILE  

Office of Legacy Management (LM)

.f ! I I (' ii MEMORANDUM TO: FILE DATE 5 +/9! ----- ------------- FROM: D. Jxw+ a--------------- SUBJECT: E/;vlr;l~&~- fico -de+& Y&U- c . 6. %qo+y& + 3-r SITE NAME: c- G* ~.&-J&-& 4 fib+< ALTERNATE -------a----- _------------------------ NAME: ---------------------- CITY: &w;-&u; & ----------------------e-w- STATE: /+?# ------ OWNER(S) ---pi;;;- c * c. s&r--&&+ ------------ -- -------- Current: un W&e k Owner contacted 0 yes a no; ---w-------------------m-- if yes, date contacted -----a------- TYPE OF OPERATION ----------------- a Research 81 Development 0 Facility Type fl Production scale testing 0 Pilot Scale 0 Bench Scale Process 0 Theoretical Studies 0 Sample & Analysis 0 Production

142

MEIIORANDUM TO: FILE  

Office of Legacy Management (LM)

MEIIORANDUM MEIIORANDUM TO: FILE FROM: A. &/b~ ----------_----_ SUBJECT: TYPE OF OPERATION ~_~~_--~~_------_ q Research & Development 0 Production scale testing 0 Pilat Scale 0 Bench Scale Process 0 Theoretical Studies 0 Sample & Analysis q Facility Type 0 Manufacturing 0 University 0 Research Organization 0 Gavernment Sponsored Faci 1 i ty 0 Other ~~~~~~~-~~--_--___--- 0 Product: on a Disposal/Stiorage TYPE OF CONTRACT ------_----__--_ 0 Prime q Other information (i.e., cost 0 Subcontractor + fixed fee, unit price, U Purchase Order time & material, gtc) ------- -L-------------------------- .&ntr&/Purchase Order #-$&z a :~-_~~;;~~~-~~~~-~-~~bh~' ,~. CENTRACTING PERIOD: raj * ------------------------------------- OWNERSHIP: AEC/MED AEC/MED GOVT GOUT CONTRACTOR CONTRACToR

143

MEMORANDUM TO: FILE  

Office of Legacy Management (LM)

. . 8, +::.-., . MEMORANDUM TO: FILE FROM: A* d&k -------- SUBJECT: SITE NAME: ---------------i--__--____ if yes, date contacted --i---------- TYPE OF OPERATION ~-~_---_-~~~--__- 0 Research & Development 0 Production scale testing Cl Pilot Scale 0 Bench Scale Process i Theoretical Studies Sample & Analysis Cl Productian I3 Disposal /Storage Facility Type/ 0 Research Okganitation 0 Government~Spcnsored Facil$ty 0 Other ~~~~~~~--~-~~-_~~---- TYPE OF CONTRACT ~--_---_-~~----_ 0 Prime 0 Subcontract& 0 Purchase Order Cant.r&t/Purchase Order / I CI Other information (i.e., cost + fixed fee, unit pr~ice, time & material,.gtc) '~ ------- ---------------------------- CP!IE!!CIL~E-PSELgQ: rst4 ----------------------------- OWNERSHIP:

144

Chapter_8_Opertions_Security_Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Operations Security Program Operations Security Program This chapter covers the OPSEC Program in place at DOE HQ to fulfill the requirements of DOE Order 471.6, Section 4.f, Information Security Manual. The OPSEC Program seeks to assist HQ Elements in identifying and protecting Critical Information (CI) from inadvertent or unauthorized disclosure and in protecting classified matter. CI includes those classified or sensitive unclassified areas, activities, functions, data, or information about an activity or organization deemed sufficiently important to be protected from an adversary. CI, when disclosed without proper authorization, has detrimental impact on national security and or departmental operations. Examples of CI that must be protected are personnel files, proposal and contract documents, or financial data regarding a project. CI is

145

Formalizing information security knowledge  

Science Conference Proceedings (OSTI)

Unified and formal knowledge models of the information security domain are fundamental requirements for supporting and enhancing existing risk management approaches. This paper describes a security ontology which provides an ontological structure for ... Keywords: information security, risk management, security ontology

Stefan Fenz; Andreas Ekelhart

2009-03-01T23:59:59.000Z

146

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

147

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Management & Safeguards System Security Forms Federal Information Processing Standards Publications (FIPS PUBS) FIPS-Associated Documents FIPS 140-2 Security Requirements...

148

Physical Security Systems | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

149

Information Security: Coordination of Federal Cyber Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research...

150

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Security Forms Home > About Us > Our Programs > Nuclear Security > Nuclear Materials...

151

Cyber Security Evaluations Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Home Sub Offices Security Evaluations Cyber Security Evaluations Emergency Management Oversight Environment, Safety and Health Evaluations Mission &...

152

Global Security 2009  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security *Intelligence *Hyper Innovation Global Security Weapons & Complex Integration NIF Office of Strategic Outcomes Operations & Business Lawrence Livermore National...

153

National Security Initiatives | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Bioinformatics Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Initiatives SHARE National...

154

Safety and Security  

Science Conference Proceedings (OSTI)

*. Bookmark and Share. Safety and Security. ... National and International Standards for X-ray Security Screening Applications. ...

2013-07-29T23:59:59.000Z

155

Cryptographic and Security Testing  

Science Conference Proceedings (OSTI)

Directory of Accredited Laboratories. Cryptographic and Security Testing. ... TX. atsec information security corporation, Austin, TX [200658- 0] VA. ...

2013-12-27T23:59:59.000Z

156

Computer Security Division Homepage  

Science Conference Proceedings (OSTI)

Computer Security Division. ... The 2012 Computer Security Division Annual Report (Special Publication 800-165) is now available. ...

2013-09-12T23:59:59.000Z

157

Mobile Security and Forensics  

Science Conference Proceedings (OSTI)

Mobile Security and Forensics. Summary: The goal of the project is to improve the security of mobile devices and software. ...

2013-01-15T23:59:59.000Z

158

CONTAM Weather File Creator Help  

Science Conference Proceedings (OSTI)

... Then enter the start and end date for Daylight Savings Time. First Day of the Year. ... Converting an Energy Plus Weather File. ...

159

OMB No. 1905-0165 Expiration Date: 1/31/2013 Version No.:2011.01 ...  

U.S. Energy Information Administration (EIA)

Physical Address (e.g., Street Address, Building Number, Floor, Suite): Fax: (202) 586-1076: ... Kerosene & Light Gas Oils: 830 Heavy Gas Oils: 840 Residuum: 850

160

OMB No. 1905-0165 Version No.:xxxx.xx FORM EIA-815 MONTHLY BULK ...  

U.S. Energy Information Administration (EIA)

Physical Address (e.g., Street Address, Building Number, Floor, Suite): Fax: (202) 586-1076. ... Kerosene & Light Gas Oils. 830: Heavy Gas Oils. 840: Residuum. 850:

Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

EIA-802  

U.S. Energy Information Administration (EIA)

Product Code (202) 586-1076 OR ... Hawaii IA Iowa ID Idaho IL ... Quantities entered below should be the weekly equivalent of those reported monthly to the Energy ...

162

HAN System Security Requirements  

Science Conference Proceedings (OSTI)

This report, "Home Area Network (HAN) Security Requirements," identifies and discusses the key cyber security requirements for different interfaces of HAN-based systems. These cyber security requirements for HAN interfaces are derived from the Department of Homeland Security (DHS) "Catalog of Control Systems Security," which provides an excellent checklist of general security requirements.

2009-12-22T23:59:59.000Z

163

quFiles: the right file at the right time  

Science Conference Proceedings (OSTI)

A quFile is a unifying abstraction that simplifies data management by encapsulating different physical representations of the same logical data. Similar to a quBit (quantum bit), the particular representation of the logical data displayed by a quFile ...

Kaushik Veeraraghavan; Jason Flinn; Edmund B. Nightingale; Brian Noble

2010-02-01T23:59:59.000Z

164

U-059: Blackberry PlayBook File Sharing Option Lets Local Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Blackberry PlayBook File Sharing Option Lets Local Users 9: Blackberry PlayBook File Sharing Option Lets Local Users Gain Elevated Privileges U-059: Blackberry PlayBook File Sharing Option Lets Local Users Gain Elevated Privileges December 13, 2011 - 6:00am Addthis PROBLEM: Blackberry PlayBook File Sharing Option Lets Local Users Gain Elevated Privileges. PLATFORM: BlackBerry PlayBook tablet software version 1.0.8.4985 and earlier ABSTRACT: A local user can obtain root privileges on the target tablet system. reference LINKS: SecurityTracker Alert ID:1026386 Vulnerability Summary for CVE-2011-0291 BlackBerry Technical Solution Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Blackberry PlayBook. A local user can obtain elevated privileges on the target system. On a tablet with File Sharing enabled and connected via USB to a system running BlackBerry

165

U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

075: Apache Struts Bug Lets Remote Users Overwrite Files and 075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code January 5, 2012 - 8:15am Addthis PROBLEM: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code PLATFORM: Version(s): 2.1.0 - 2.3.1 ABSTRACT: A remote user can execute arbitrary Java code on the target system. reference LINKS: SecurityTracker Alert ID: 1026484 Secunia Advisory SA47393 Bugtraq ID: 51257 Apache Struts 2 Documentation S2-008 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache Struts. A remote user can execute arbitrary Java code on the target system. A remote user can overwrite arbitrary files on the target system. A remote user can send specially

166

Sandia secure processor : a native Java processor.  

SciTech Connect

The Sandia Secure Processor (SSP) is a new native Java processor that has been specifically designed for embedded applications. The SSP's design is a system composed of a core Java processor that directly executes Java bytecodes, on-chip intelligent IO modules, and a suite of software tools for simulation and compiling executable binary files. The SSP is unique in that it provides a way to control real-time IO modules for embedded applications. The system software for the SSP is a 'class loader' that takes Java .class files (created with your favorite Java compiler), links them together, and compiles a binary. The complete SSP system provides very powerful functionality with very light hardware requirements with the potential to be used in a wide variety of small-system embedded applications. This paper gives a detail description of the Sandia Secure Processor and its unique features.

Wickstrom, Gregory Lloyd; Gale, Jason Carl; Ma, Kwok Kee

2003-08-01T23:59:59.000Z

167

Security seal  

DOE Patents (OSTI)

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, Garth W. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

168

File and Data Repositories for CALPHAD and Beyond  

Science Conference Proceedings (OSTI)

Such a repository needs to include files with functional descriptions, data files used for refinement of the functional descriptions and auxiliary files. The files are  ...

169

File:07TXBRECGeneratorCertification.pdf | Open Energy Information  

Open Energy Info (EERE)

TXBRECGeneratorCertification.pdf Jump to: navigation, search File File history File usage Metadata File:07TXBRECGeneratorCertification.pdf Size of this preview: 463 599 pixels....

170

File:03MTCEncroachmentOverview.pdf | Open Energy Information  

Open Energy Info (EERE)

MTCEncroachmentOverview.pdf Jump to: navigation, search File File history File usage File:03MTCEncroachmentOverview.pdf Size of this preview: 463 599 pixels. Other resolution:...

171

File:Federal Hydropower - Southeastern Power Administration.pdf...  

Open Energy Info (EERE)

Login | Sign Up Search File Edit History Facebook icon Twitter icon File:Federal Hydropower - Southeastern Power Administration.pdf Jump to: navigation, search File File...

172

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com Β© Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

173

Security rules versus Security properties Mathieu Jaume  

E-Print Network (OSTI)

Security rules versus Security properties Mathieu Jaume SPI Β­ LIP6 Β­ University Pierre & Marie components of security policies can be expressed, and we identify their role in the de- scription of a policy, of a system and of a secure system. In this setting, we formally describe two approaches to define policies

Paris-Sud XI, UniversitΓ© de

174

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com Β© Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

175

Security Procedures Caltech Campus Security Dispatch  

E-Print Network (OSTI)

Security Procedures Caltech Campus Security Dispatch: 5000 (from any Caltech phone) or (626) 395-5000 (from any phone) When emergencies arise, contact Caltech Campus Security MEDICAL If someone experiences a medical emergency: Β· Remain calm Β· Notify Campus Security Dispatch Β· Do NOT move victim EARTHQUAKE When

Goddard III, William A.

176

Obfuscation (IND-CPA Security Circular Security)  

E-Print Network (OSTI)

Obfuscation (IND-CPA Security Circular Security) (Draft Version, 24 October 2013) Antonio@cs.au.dk 2 Aarhus University, Denmark, orlandi@cs.au.dk Abstract Circular security is an important notion for public-key encryption schemes and is needed by several cryptographic protocols. In circular security

International Association for Cryptologic Research (IACR)

177

Nonproliferation & International Security | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

178

Nonproliferation & International Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

179

MEMORQNDUM TO: FILE  

Office of Legacy Management (LM)

MEMORQNDUM MEMORQNDUM TO: FILE 7./27/S 7. DATE------------------ M LAU FROt+ ---~--e--------e SITE ALTERNATE NAME: Net b-0 c/i-w, fS ~?L~-----------------N~~E:____---___------------ -----------------+-- CITY:-K_2_EJ=as+ Gz+q s+, pQ~:'&-STATE: cd past:----------------------- Curre"t:-------------------------- Owner contacted 0 yes sno; if yes, date contacted _ TYPE OF OPERATION ~~----_~~~---~~-- B Research & Development 0 'Production scale testing 0 Pilot Scale 0 Bench Scale Process 0 Theoretical Studies q Sample 81 Analysis 0 Praduction 0 Disposal/Storage m Facility Type 0 rlanuf acturing rJ University a Research Organization 0 Sovernment Sponsored Facility U Other --~~~---_~--~-_~~~~-_ q Prime, B Subcontractor a Purchase Order 0 Other information (i.e., cost

180

TO: FILE DATE  

Office of Legacy Management (LM)

tlEi?ORANDUH tlEi?ORANDUH TO: FILE DATE FFtOil: c ----'- Y '%d 6- ----_----_ SUBJECT: SITE NAME: ----------STATE: Owner contacted 0 yes qno; if yes, date contacted ---------__-- TYPE OF OPERATION ----~_--_--~----_ &Research & Development @ Praduction scale testing. 0 Pilat Scale 0 Bench Scale Process a Theoretical Studies 0 Sample & Analysis tin Facility Type R Manufacturing IJ University 0 Research Organization IJ Gavernment Sponsored Facility 0 Other ----------------' --~- 0 Production E Disposal/Storage TYPE OF CONTRACT ~~_-~--_---_--__ P Prime 0 I Cl Subcontractor Other information (i.e., cost K Purchase Order jZM pati !& MC4 + fixed fee, unit price, time 81 material, etc) ---------------------_----~-- OWNERSHIP: AEC/MED AEC/MED GOVT GOVT

Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

MEHORANDUM TO: FILE  

Office of Legacy Management (LM)

MEHORANDUM MEHORANDUM TO: FILE FR0t-t: -~+?!+-- SUBJECT: u - 5..7. am . . ALTERNATE W% : ---\L-&--~~+. ___- ____ S-fA-rE: t-4 ;5- ------ wJ!%RLSL " Past: ------------------------ Current: --~~---~---__~~~-------~-- Owner contacted 0 yes -glnos if yes, date cotitectad TYPE OF OPERATION ---------_----__- 0 Research & Development 0 Facility Type 0 Production scale testing 0 Pilot Scale 0 Bench Scale Process *I Theoretical Studies 0 Sample & kialysis 0 Production 0 Disposal /Storage IV!?LPExB?!IBfiEI 0 Uanuf ecturing 0 University 0 Research Organization IfJ ,"WW="""s, ---------------___--_ 0 Prims 0 Subcontractor 0 Purchase Order 0 Other information (i.e., cost + fixed fee, unit price, time 81 material, etc) ------- Contract/Purchase Order #

182

MEMORANDUM TO: FILE DATE  

Office of Legacy Management (LM)

-.. -.. 37qg: MEMORANDUM TO: FILE DATE =b-- FROM: ---L- _------__ u . SUBJECT: SITE ACl= ALTERNATE NAME: -_______-~-----------------NA~E:__( CITY:--~---------_-STATE:-~~ (2 OWNE!sI_SL f Past- L&cl= w ------------------- ----- Current- w buL.r - ------------ ownq cm-ltacted 0 yes @ "no; if yes, data cnntacte TYPE OF OPERATION -------------_~-~ q Research & Development 0 Production %.cale testing 0 Pilot Scale 0 Bench Scale Process 0 Theoretical Studies 0 Sample 84 Analysis 0 Production i2 Disposal/Storage 0 Facility T 0 Hanufac 0 Univerrj 0 .R esearc 0 Governm 14 Other 1 I lil IrJ y,/3 Prime 0 Other infcrkion Subcwkractbr (i.e., ?bst + fixed fee! &nit price, Cl Purchase Order time & mate

183

GlNTRM FILES  

Office of Legacy Management (LM)

: .; : .; GlNTRM FILES .- Red Rwtaaie!a .=?%A .-m JJullen mtoxges8ntuuo -006 .017 .olb J-m .021 .OLt .Ol2 *Jeta Lhh .029 .0X9 ,026 ~k~exwteethaae~oyeencloee~ttothxflcmrof bUckaide. After the deccxmdnatimpxcblarrrro mlved.the rt8tma dt&itO lo- &ctioacoilrpasdistuEeed. 1. . ,, -. . . ' The conparty visited 3~ciali.z.e~ ja the a.ppLicatica of Znductiw beat. The purpose of this trip wa s to advise on haaBh and safety measures for the preoceeptance testing of inductioo heat treating equipment procmed by NU3. Tim conclusims &am attaining to the health and safety hazards involved in the iaducti0n heat treating of uraaim mtal axe stated in amtber trip report (D. i. Plowers to J. A. Quigley. LLD,, 12/18/58). Based ca those comzlosions. ,tbe following recomandations were given .to Ajax-

184

MEMORANDUM TO: FILE FROM:  

Office of Legacy Management (LM)

p' p' : , .; ' _ ' < 3.518 MEMORANDUM TO: FILE FROM: -Ye L&a --------e---e--- DATE 6j8/8 7 v---s -- ---------- SUBJECT: ;&l a+-b IA T~cornqm Q afib4 SITE NAME: CITY: & &&at leg co Current: ------------------------ Owner contacted 0 yes p no; if yem, date contacted --w---w------ TYPE OF OPERATION The T$SYI L-- Tj flmf ----------------- FResearch & Development a Facility 0 Production scale testing 0 Pilot Scale p Manufacturing 0 Bench Scale Process [3 University 0 Theoretical Studies 0 Research Organization 0 Sample t Analysis 0 Government Sponsored Facility 0 Other --------------------- 0 Production 0 Disposal/Storage TYPE OF CONTRACT ---------------- p Prim* tLl fo$q rJ WQ 0 Subcontractor 0 Purchase Order Cl Other information (i.e., cost

185

MEMORANDUrl TO: FILE  

Office of Legacy Management (LM)

MEMORANDUrl MEMORANDUrl TO: FILE FROM: 3. Lfwhle ---------------- ALTERNATE CITY: ---&!!!J&~~s__~- ________ STATE: --!?-c- (C&IO> OE!!EEL_S1 past: --rc;,b,&&~c! ---- current: --------- ---------- ---__-_ Owner contacted 0 yes g noi if yes, date contacted------ TYPE OF OPERATION ----------------- fl Research & Development 0 Production scale testing 0 Pilot Scale 0 Bench Scale Process p Theoretical Studies cl Sample s1 Analysis 0 Production 0 Disposal/Storage m Facility Type 0 tlanuf acturing p University 0 Research Organization 0 Government Sponsored Facility 0 Other --------------_______ B Prime AKC- cl. G&-Fo~~:~ q Other information (i.e., cost 0 Subcontractor + fixed fee, unit price, 0 Purchase Order C!2!LFSCII!!E-!33X!Z!:

186

HEMORANDUH TO: FILE DATE  

Office of Legacy Management (LM)

HEMORANDUH HEMORANDUH TO: FILE DATE 1123 lLjl ---WV-------------- FROM: P. s&w+ -------v-----s-- SUBJECT: lJ+ - e;& SITE NAME: LJo"zL - /L,' de Cd -J--h=- ALTERNATE l --e-e-- ------w------- ---,,,' ,m--, NAME: ---------------------- CITY: LL-pL~ ------------ ------------- STATE3 e--w-- OWNER tS) -----w-- Past I --k-!!.l~ -pa L . -v-----w------- Current: Owner contac?-ed 0 yes 0 no; if yes, I+Lff A zid;&m - -------------------------- date contacted ------B--m--- TYPE OF OPERATION ----------------- a Research 81 Development a Facility Type 0 Production scale testing 0 Pilot Scale 0 Bench Scale Procesr 0 Theoretical Studies 0 Sample & Analysis m Manuf acturinq 0 University 0 Research Organization 0 Government Sponrored Facility 0 Other

187

MEMORANDUM TO: FILE  

Office of Legacy Management (LM)

' ' a 7 > 3gI, q OH.I-r7.-I (jt' , ""7 MEMORANDUM TO: FILE FROM: ' 'Y OIL&i cz ,,,',, -------we- SUBJECT: SITE NAME: _____ CITY:-AQY&- --------------e----e-- OWNER(S) Owner contacted n yes =urr="t: ----- -Llz2-:---,-- -----___ &,&/4$- '1 :) ' if yes, data contacted ------------- TYPE OF OPERATION ----------------- a Research t Development lti- Facility Type 0 Production scale testing a Manufacturing 5 University 0 Research Organization 0 Government Sponsored Facility Cl Pilot Scale Cl Bench Scale Process : Theoretical Studies Sample SC Analysis 0 Production 0 Di 3posal /Storage TYPE OF CONTRACT -------------w-e BP rime 54, 1; cl Subcontractor a Purchase Order cs dL+f' d~ a 0 Other --------------------- Other information (i.e., cost

188

File:Oregonshpodocumentationstandards.pdf | Open Energy Information  

Open Energy Info (EERE)

Oregonshpodocumentationstandards.pdf Oregonshpodocumentationstandards.pdf Jump to: navigation, search File File history File usage File:Oregonshpodocumentationstandards.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 31 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 11:37, 20 November 2012 Thumbnail for version as of 11:37, 20 November 2012 1,275 Γ— 1,650 (31 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file. Retrieved from "http://en.openei.org/w/index.php?title=File:Oregonshpodocumentationstandards.pdf&oldid=538466"

189

File:DIAsample.pdf | Open Energy Information  

Open Energy Info (EERE)

DIAsample.pdf DIAsample.pdf Jump to: navigation, search File File history File usage File:DIAsample.pdf Size of this preview: 776 Γ— 600 pixels. Full resolution β€Ž(1,650 Γ— 1,275 pixels, file size: 280 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 15:53, 2 August 2012 Thumbnail for version as of 15:53, 2 August 2012 1,650 Γ— 1,275 (280 KB) Andbailey (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following page links to this file: Identify types of development and climate impacts that are country priorities Retrieved from "http://en.openei.org/w/index.php?title=File:DIAsample.pdf&oldid=501432

190

File:Installnot.pdf | Open Energy Information  

Open Energy Info (EERE)

Installnot.pdf Installnot.pdf Jump to: navigation, search File File history File usage File:Installnot.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 175 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 16:12, 13 November 2012 Thumbnail for version as of 16:12, 13 November 2012 1,275 Γ— 1,650 (175 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file. Retrieved from "http://en.openei.org/w/index.php?title=File:Installnot.pdf&oldid=536509"

191

File:Apschem.pdf | Open Energy Information  

Open Energy Info (EERE)

Apschem.pdf Apschem.pdf Jump to: navigation, search File File history File usage File:Apschem.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 105 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 12:25, 14 November 2012 Thumbnail for version as of 12:25, 14 November 2012 1,275 Γ— 1,650 (105 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file. Retrieved from "http://en.openei.org/w/index.php?title=File:Apschem.pdf&oldid=536777

192

File:20121127144736519.pdf | Open Energy Information  

Open Energy Info (EERE)

1127144736519.pdf 1127144736519.pdf Jump to: navigation, search File File history File usage File:20121127144736519.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 116 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 15:55, 27 November 2012 Thumbnail for version as of 15:55, 27 November 2012 1,275 Γ— 1,650 (116 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file. Retrieved from "http://en.openei.org/w/index.php?title=File:20121127144736519.pdf&oldid=53999

193

Help:Uploading Files | Open Energy Information  

Open Energy Info (EERE)

Uploading Files Uploading Files Jump to: navigation, search Click on the upload file link at the bottom of the page (NOTE: you must be logged in to have this option). Uploading tutorial.JPG Click on the "choose file" button to choose the file you would like to upload Uploading tutorial2.JPG Choose the file on your local drive that you would like to upload to OpenEI. Uploading tutorial3.JPG Click "upload file" to upload onto OpenEI Uploading tutorial4.JPG Finally, use the file name along with the instructions below to insert into the wikipage. Uploading tutorial5.JPG Links Link to description page If you put a colon (:) before File:, the image will not be embedded and the link will lead to the description page of the file. [[:File:Example.jpg]] [[:File:Example.jpg|Sunflowers]]

194

File:Install.pdf | Open Energy Information  

Open Energy Info (EERE)

Install.pdf Install.pdf Jump to: navigation, search File File history File usage File:Install.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 86 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 13:48, 1 November 2012 Thumbnail for version as of 13:48, 1 November 2012 1,275 Γ— 1,650 (86 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file. Retrieved from "http://en.openei.org/w/index.php?title=File:Install.pdf&oldid=53281

195

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... approach to protect critical federal missions and business functions ... security areas such physical security, personnel security, continuity of operations ...

196

Using Operational Security (OPSEC) to Support a Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

197

T-592: Cisco Security Advisory: Cisco Secure Access Control System...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System...

198

Cyber and Network Security Homepage  

Science Conference Proceedings (OSTI)

Cyber and Network Security. Cyber and network security is focused on ensuring three security objectives of information ...

2010-10-05T23:59:59.000Z

199

Bioinformatics Systems | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Cyber Security Nuclear Forensics Bioinformatics Videos Workshops National Security Home | Science & Discovery | National Security | Initiatives | Bioinformatics SHARE...

200

Security Components and Mechanisms Group  

Science Conference Proceedings (OSTI)

Security Components and Mechanisms Group. Welcome. ... A security checklist is a document that contains instructions for securely configuring … ...

2013-01-17T23:59:59.000Z

Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Information Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information Security | National Nuclear Security Administration Information Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Information Security Home > About Us > Our Programs > Nuclear Security > Information Security Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by

202

Privacy and Security Research Group workshop on network and distributed system security: Proceedings  

Science Conference Proceedings (OSTI)

This report contains papers on the following topics: NREN Security Issues: Policies and Technologies; Layer Wars: Protect the Internet with Network Layer Security; Electronic Commission Management; Workflow 2000 - Electronic Document Authorization in Practice; Security Issues of a UNIX PEM Implementation; Implementing Privacy Enhanced Mail on VMS; Distributed Public Key Certificate Management; Protecting the Integrity of Privacy-enhanced Electronic Mail; Practical Authorization in Large Heterogeneous Distributed Systems; Security Issues in the Truffles File System; Issues surrounding the use of Cryptographic Algorithms and Smart Card Applications; Smart Card Augmentation of Kerberos; and An Overview of the Advanced Smart Card Access Control System. Selected papers were processed separately for inclusion in the Energy Science and Technology Database.

Not Available

1993-05-01T23:59:59.000Z

203

FILES- COOLING TOWER PLUME MODELING  

E-Print Network (OSTI)

Ladies and Gentlemen:? In the referenced letter, Progress Energy Carolinas, Inc. (PEC) noted that the input and output' files for the modeling analysis for cooling tower plumes would be provided under a separate cover. due to the requirements for native file submittal (see NRC RAI # 5.3.3.1-1 and PGN RAI # H-295). The purpose of this letter is to submit these calculation native files. The supplemental information contained in the files on the attached CD is provided to support the NRC's review of the Shearon Harris Nuclear Power Plant Units 2 and 3 (HAR) Environmental Report (ER), but does not comply with the requirements for electronic submission in the NRC Guidance Document. The NRC staff requested the files be submitted in their native formats, required for utilization in the software employed to support the ER development. As discussed with the NRC's environmental project manager responsible for review of the HAR ER, the data provided on the attached CD are of a nature that is not easily convertible to PDF output files. Furthermore, PEC understands that converting the information to PDF output files; would not serve the underlying purpose of the submittal; i.e., to provide the raw, unprocessed data to enable reviewers to evaluate software used in the HAR application. Enclosure 1 provides a list of folders with the requested data files that are included on the attached CD (Attachment 5.3.3.1-1 SACTI Native Files). If you have any further questions, or need additional information, please contact Bob Kitchen at

Garry D. Mi Er

2009-01-01T23:59:59.000Z

204

Border Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

205

TSO-1105 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

105 - In the Matter of Personnel Security Hearing 105 - In the Matter of Personnel Security Hearing TSO-1105 - In the Matter of Personnel Security Hearing The individual currently is employed by a DOE contractor, and has held a DOE security clearance for several years. Based on issues contained in the individual's security file, the Local Security Office (LSO) conducted a Personnel Security Interview (PSI) with the individual in June 2011. PSI, DOE Ex. 6. In August 2011, the LSO suspended the individual's DOE security clearance and issued her a Notification Letter, together with a statement (Enclosure 2) setting forth the information that created a substantial doubt about the individual's eligibility to hold a DOE security clearance. (DOE Ex. 1). Specifically, the LSO alleges that the individual has raised a concern under 10 C.F.R. Β§ 710.8(f) (Criterion F)

206

File:Bonnevillepowerfactsheet.pdf | Open Energy Information  

Open Energy Info (EERE)

Bonnevillepowerfactsheet.pdf Bonnevillepowerfactsheet.pdf Jump to: navigation, search File File history File usage Metadata File:Bonnevillepowerfactsheet.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Go to page 1 2 Go! next page β†’ next page β†’ Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 648 KB, MIME type: application/pdf, 2 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 15:53, 10 July 2013 Thumbnail for version as of 15:53, 10 July 2013 1,275 Γ— 1,650, 2 pages (648 KB) Graham7781 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following page links to this file:

207

File:Noaafactsheet.pdf | Open Energy Information  

Open Energy Info (EERE)

Noaafactsheet.pdf Noaafactsheet.pdf Jump to: navigation, search File File history File usage Metadata File:Noaafactsheet.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Go to page 1 2 Go! next page β†’ next page β†’ Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 551 KB, MIME type: application/pdf, 2 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 15:55, 10 July 2013 Thumbnail for version as of 15:55, 10 July 2013 1,275 Γ— 1,650, 2 pages (551 KB) Graham7781 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following page links to this file: Federal Memorandum of Understanding for Hydropower/Participating

208

File:Npsfactsheet.pdf | Open Energy Information  

Open Energy Info (EERE)

Npsfactsheet.pdf Npsfactsheet.pdf Jump to: navigation, search File File history File usage Metadata File:Npsfactsheet.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Go to page 1 2 Go! next page β†’ next page β†’ Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 657 KB, MIME type: application/pdf, 2 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 15:56, 10 July 2013 Thumbnail for version as of 15:56, 10 July 2013 1,275 Γ— 1,650, 2 pages (657 KB) Graham7781 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following page links to this file: Federal Memorandum of Understanding for Hydropower/Participating

209

Help:Managing files | Open Energy Information  

Open Energy Info (EERE)

Managing files Managing files Jump to: navigation, search If file uploads are enabled, you can upload certain types of files to the wiki. This is particularly useful for uploading images, which you want to place on an article, but you can also upload other types of files. Upload a file Prepare the file for upload. Make sure the file is exactly as you want it. In the sidebar, under "toolbox", click "upload file." Click "Browse" next to the "Source filename:" to locate the file on your computer (the name of the "browse" button depends on your web browser). Change the "Destination filename:" to something descriptive, if necessary. Fill in the "Summary," if necessary. Click the "Upload file" button.

210

File:Lucs.pdf | Open Energy Information  

Open Energy Info (EERE)

Lucs.pdf Lucs.pdf Jump to: navigation, search File File history File usage File:Lucs.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Go to page 1 2 3 4 Go! next page β†’ next page β†’ Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 111 KB, MIME type: application/pdf, 4 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 15:40, 19 November 2012 Thumbnail for version as of 15:40, 19 November 2012 1,275 Γ— 1,650, 4 pages (111 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file. Retrieved from

211

File:Energydatabusfacthseet.pdf | Open Energy Information  

Open Energy Info (EERE)

Energydatabusfacthseet.pdf Energydatabusfacthseet.pdf Jump to: navigation, search File File history File usage Metadata File:Energydatabusfacthseet.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Go to page 1 2 Go! next page β†’ next page β†’ Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 385 KB, MIME type: application/pdf, 2 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 15:59, 10 July 2013 Thumbnail for version as of 15:59, 10 July 2013 1,275 Γ— 1,650, 2 pages (385 KB) Graham7781 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following 3 pages link to this file:

212

DOE FILE NO.  

Office of Legacy Management (LM)

DOE FILE NO. _ ffi~15970 ADMIN RCD _ COMM REF _ pRwm BttO" SVR.l!s.j tJF PLE7l:JJER Rf) TECHNICAL SERVICES DIVISION (TSD) BACKFIT (Documents dated prior to 1 November 1988) FUSRAP COMMUNICATIONS DISTRIBUTION DOEiORO TECHNICAL SERVICES DIVISION (CEΒ·53) BECHTEL NATIONAL INC. - JOB 14501 RESPONSE TRACKING INFORMATION PRIMARY, I lOWED BY: (ORG) I (ORG) TARGET DATE I I CLOSING CCN COMPL DATE ( ( CLOSING REF I I lOWED BY: (ORG) I I I I ( (ORG) TARGET DATE I CLOSING CCN COMPL DATE CLOSING REF AFFECTED DOCUMENT _ ~~~=.k'Β£...,JUrE.......,"'"A.'-"-- TO _ _....I!1)o<..;J:...!!S'--'L'--- 'COMM DATE tll,I.1t'l'l ADDR CODE I IPJuCLOSES CCN WBS ....Id. iCU DL.::2.."'-- ......... J""I .... 5

213

EIA-411 Data File  

Gasoline and Diesel Fuel Update (EIA)

Form EIA-411 Database Form EIA-411 Database Form EIA-411 - Β“Coordinated Bulk Power Supply Program ReportΒ” Data Coverage and Data Quality Release Date: December 22, 2011 Next Release Date: November 2012 In 2008, the Form EIA-411 became a mandatory collection for all schedules except No. 7 (Transmission Outages) which will continue to be a voluntary filing. The Form EIA-411 collects information about regional electricity supply and demand projections for a five-year advance period and information on the transmission system and supporting facilities. Editing of the data is done by each of the various reliability regions. The data collected on this form are used by the U.S. Department of Energy to monitor the current status and trends of the electric power industry and to evaluate the future reliability of the industry. Each of the reliability regions of the North American Electric Reliability Corporation (NERC) is asked to submit Form EIA-411 after compiling data furnished by utilities and other electricity suppliers within their regions to NERC. NERC then compiles and coordinates these reports and provides the data to the Energy Information Administration.

214

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1670P Thermal thermal environments different from regulatory standards. Packaging, Transport, Storage & Security

215

Designing security into software  

E-Print Network (OSTI)

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

216

CAMPUS SECURITY CARD REQUISITION  

E-Print Network (OSTI)

CAMPUS SECURITY CARD REQUISITION DEPARTMENT LAST NAME GIVEN NAME(S) SFU ID NUMBER CARD NUMBER CAMPUS SECURITY OFFICE USE ONLY SERVICE CHARGE: ___________________________ DEPOSIT be reported or returned to Campus Security TC 050 (291-5448). CARDHOLDER SIGNATURE DATE: #12;

217

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration National Nuclear Security Administration Ofice of Secure Transportation mKlK= Box RQMM= ^luquerqueI= kj= UTNUR= ;JAN 03 213 MEMORANDUM FOR GREGORY eK= WOODS GENERAL COUNSEL DEPARTMENT OF ENERGY FROM: SUBJECT: JEFFREY P. HARREL ASSIST ANT DEPU FOR SECURE 2013 ANNUAL PLANNING SUMMARY In response to your memorandum of December TI= 2012, the following information is provided for the National Nuclear Security Administration Ofice of Secure

218

Security guide for subcontractors  

Science Conference Proceedings (OSTI)

This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

Adams, R.C.

1991-01-01T23:59:59.000Z

219

File:(PECC) Special Program on Climate Change SUMMARY (english...  

Open Energy Info (EERE)

Up Search File Edit History Facebook icon Twitter icon File:(PECC) Special Program on Climate Change SUMMARY (english).pdf Jump to: navigation, search File File history File...

220

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... Standards. ITL January 1999, Jan 1999, Secure Web-Based Access to High Performance Computing Resources. ITL November ...

Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... Security Strategies for the Smart Grid: Protecting the ... Overview: The Government Smart Card Interoperability ... Mar 2001, An Introduction to IPsec ...

222

Personnel Security Program | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

223

Radiological Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

224

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Program Home Office of Security and Cyber Evaluations Office of Safety and Emergency Management Evaluations Guidance Documents Security and Cyber Evaluations ...

225

Cyber Security Module  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Module Cyber security training is required for all facility users and must be submitted before or upon arrival at the GUV Center. System Requirements and Information...

226

Security - Problem Solved?  

Science Conference Proceedings (OSTI)

There are plenty of security problems that have solutions. Yet, our security problems don't seem to be going away. What's wrong here?

John Viega

2005-06-01T23:59:59.000Z

227

Office of Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices β€Ί Security Policy β€Ί Security Assistance β€Ί Departmental Personnel Security Mission & Functions β€Ί Security Policy β€Ί Security Assistance β€Ί Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links β€Ί DOE β€Ί DOE CIO β€Ί NNSA β€Ί DOE CFO β€Ί NTC β€Ί S&S PIR Contact Us HSS Logo Welcome to the Office of Security Mission and Functions The Office of Security (HS-50) developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. The Office of Security, through the Office of Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented.

228

Security: A Coordinated Approach  

Science Conference Proceedings (OSTI)

... SIM / SEM Asset Management System AAA ICS/SCADA Security Physical Security ... Location-Awareness ICS/SCADA Smart Grid Mobile Devices ...

2012-10-26T23:59:59.000Z

229

JLab Security Banner  

NLE Websites -- All DOE Office Websites (Extended Search)

Computer Center | Jefferson Lab Home | Experiments | The Lab | News Privacy and Security Notice Security Notice This is a Federal computer system and is the property of the United...

230

NNSA orders security enhancements  

NLE Websites -- All DOE Office Websites (Extended Search)

orders security enhancements NNSA orders security enhancements Because of this government order, until further notice all vehicles entering government property will be required to...

231

NIST Cyber Security Framework  

Science Conference Proceedings (OSTI)

Page 1. NIST Cyber Security Framework ISA-62443-2-1 :2009 ISA-62443-2-1 (Ed. 2, D2E8 ... Page 2. Security NIST Cyber ...

2013-12-13T23:59:59.000Z

232

A transactional flash file system for microcontrollers  

Science Conference Proceedings (OSTI)

We present a transactional file system for flash memory devices. The file system is designed for embedded microcontrollers that use an on-chip or on-board NOR flash device as a persistent file store. The file system provides atomicity to arbitrary sequences ...

Eran Gal; Sivan Toledo

2005-04-01T23:59:59.000Z

233

File:Hydrofracking.pdf | Open Energy Information  

Open Energy Info (EERE)

Hydrofracking.pdf Hydrofracking.pdf Jump to: navigation, search File File history File usage File:Hydrofracking.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Go to page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 Go! next page β†’ next page β†’ Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 704 KB, MIME type: application/pdf, 19 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 15:47, 9 February 2012 Thumbnail for version as of 15:47, 9 February 2012 1,275 Γ— 1,650, 19 pages (704 KB) Graham7781 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage

234

Office of Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Security Policy Office of Security Policy Mission and Functions The Office of Security Policy develops and promulgates safeguards and security policy governing the protection of National Security and other critical assets entrusted to the Department. Director's Perspective Welcome to the Office of Security Policy Jack Cowden, Director The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the Department. This includes the protection of DOE nuclear facilities, nuclear weapons components, special nuclear materials and classified information. Our broad topical areas are organized as: Program Planning and Management, Protection Program Operations (which includes both physical security and protective forces), Information Security and Material Control and Accountability.

235

CYBER SECURITY METRICS AND MEASURES  

Science Conference Proceedings (OSTI)

... CYBER SECURITY METRICS AND MEASURES ... Keywords: cyber security; metrics; measures; software; computer systems; IT ...

2013-05-07T23:59:59.000Z

236

U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: WebCalendar Access Control and File Inclusion Bugs Let 5: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code April 25, 2012 - 7:00am Addthis PROBLEM: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code PLATFORM: 1.2.4 and prior versions ABSTRACT: Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system. reference links: SecurityTracker Alert ID: 1026966 CVE-2012-1495 CVE-2012-1496 IMPACT ASSESSMENT: Medium Discussion: A remote user can access '/install/index.php' to potentially modify '/includes/settings/' with arbitrary values or PHP code. A remote

237

V-177: VMware vCenter Chargeback Manager File Upload Handling Vulnerability  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

177: VMware vCenter Chargeback Manager File Upload Handling 177: VMware vCenter Chargeback Manager File Upload Handling Vulnerability V-177: VMware vCenter Chargeback Manager File Upload Handling Vulnerability June 13, 2013 - 6:00am Addthis PROBLEM: vCenter Chargeback Manager Remote Code Execution PLATFORM: VMware vCenter Chargeback Manager 2.x ABSTRACT: The vCenter Chargeback Manager contains a critical vulnerability that allows for remote code execution REFERENCE LINKS: Secunia Advisory SA53798 VMWare Security Advisory VMSA-2013-0008 CVE-2013-3520 IMPACT ASSESSMENT: Medium DISCUSSION: The vCenter Chargeback Manager (CBM) contains a flaw in its handling of file uploads. Exploitation of this issue may allow an unauthenticated attacker to execute code remotely. IMPACT: System Access SOLUTION: Vendor recommends updating to version 2.5.1

238

Secure Manufacturing | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to optimize manufacturing and systems performance; and executing projects cost effectively and with timeliness. Y-12 accomplishes this mission to meet the national security challenges of today and those of the future, with capability and expertise in the following areas:

239

Security tasks are highly interdependent.  

E-Print Network (OSTI)

Motivation Security tasks are highly interdependent. To improve security tools, we need to understand how security practitioners collaborate in their organizations. Security practitioners in context Exchange of Information Develop security tools that: Β· Integrate information from different communication

240

Security Policies Dr. Ahmad Almulhem  

E-Print Network (OSTI)

Security Policies Dr. Ahmad Almulhem Computer Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 51 #12;Security Policies Types of Security Policies Trust Types of Access Control Summary Part I Overview Ahmad Almulhem - Network Security Engineering

Almulhem, Ahmad

Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Nuclear Security | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

242

Nuclear Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

243

Nuclear Security Enterprise | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Enterprise | National Nuclear Security Administration Enterprise | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Enterprise Home > About Us > Our Programs > Defense Programs > Nuclear Security Enterprise Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective nuclear deterrent through the

244

PSH-11-0021 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1-0021 - In the Matter of Personnel Security Hearing 1-0021 - In the Matter of Personnel Security Hearing PSH-11-0021 - In the Matter of Personnel Security Hearing The individual currently is employed by a DOE contractor, and that contractor has requested that he receive a DOE security clearance. Based on issues contained in the individual's security file, the Local Security Office (LSO) conducted a Personnel Security Interview with the individual in May 2011 (the 2011 PSI, DOE Ex. 17). In July 2011, a DOE-consultant psychiatrist evaluated the individual, and memorialized her findings in a Psychological Evaluation Report (the Report, DOE Ex. 6). In October 2011, the LSO issued a Notification Letter to the individual, together with a Summary of Security Concerns (Enclosure 2) setting forth the information

245

PSH-11-0025 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

25 - In the Matter of Personnel Security Hearing 25 - In the Matter of Personnel Security Hearing PSH-11-0025 - In the Matter of Personnel Security Hearing The individual currently is employed by a DOE contractor, and that contractor has requested that he receive a DOE security clearance. Based on issues contained in the individual's security file, the Local Security Office (LSO) conducted a Personnel Security Interview with the individual in August 2011 (the 2011 PSI, DOE Ex. 8). In September 2011, a DOE-consultant psychologist (the DOE-consultant Psychologist) evaluated the individual, and memorialized her findings in a Psychological Evaluation Report (the Report, DOE Ex. 6). In October 2011, the LSO issued a Notification Letter to the individual, together with a Summary of Security Concerns (Enclosure 2) setting forth the information that created a

246

PSH-12-0020 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

20 - In the Matter of Personnel Security Hearing 20 - In the Matter of Personnel Security Hearing PSH-12-0020 - In the Matter of Personnel Security Hearing The individual is employed by a DOE contractor, and has held a DOE access authorization for several years. Based on financial issues contained in the individual's security file, the Local Security Office (LSO) issued letters of interrogatory (LOI) to the individual in August 2009 and June 2011. DOE Exs. 18 and 16. The LSO also conducted Personnel Security Interviews (PSIs) with the individual in December 2010, November 2011 and December 2011. DOE Exs. 20, 21 and 22. In January 2012, the LSO issued the individual a Notification Letter, together with a Summary of Security Concerns (Enclosure 2) setting forth the information that created a substantial doubt about his eligibility to hold a DOE security clearance.

247

Nuclear Security & Safety  

Energy.gov (U.S. Department of Energy (DOE))

The Energy Department is working to enhance nuclear security through defense, nonproliferation, and environmental efforts.

248

Security Technologies Group  

Science Conference Proceedings (OSTI)

Security Technologies Group. Welcome. Our group develops measurement science in support of performance-based standards ...

2012-10-24T23:59:59.000Z

249

Industrial Control Systems Security  

Science Conference Proceedings (OSTI)

... Risk Management • Architecture security focus • Physical interaction ... Cybersecurity • Cybersecurity Framework • Smart Grid Program ...

2013-06-05T23:59:59.000Z

250

NERSC Computer Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as possible at security@nersc.gov. You may also call the NERSC consultants (or NERSC Operations during non-business hours) at 1-800-66-NERSC. Please save any evidence of the break-in and include as many details as possible in your communication with us. NERSC Computer Security Tutorial

251

The Prospero File System User's Manual  

E-Print Network (OSTI)

Introduction The Prospero file system is based on the Virtual System Model[1, 2, 3, 4]. It differs from traditional distributed file systems in several ways. In traditional file systems, the mapping of names to files is the same for all users. Prospero supports user centered naming: users construct their own view of the files that are accessible. The mapping from names to files is controlled by this view. Objects may be organized in multiple ways and the same object may may appear in different virtual systems, or even with multiple names in the same virtual system. Prospero provides several mechanisms to support customization. Among them are the union link and the filter. Directories can contain references to files and other directories that are stored on remote nodes. This allows distribution at a much finer level of granularity than is possible in traditional distributed file systems. 2 The Directory Mechanism In Prospero, the global file system consists of

B. Clifford Neuman

1991-01-01T23:59:59.000Z

252

Office of Security Assistance  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices β€Ί Security Policy β€Ί Security Assistance β€Ί Departmental Personnel Security Mission & Functions β€Ί Security Policy β€Ί Security Assistance β€Ί Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links β€Ί DOE β€Ί DOE CIO β€Ί NNSA β€Ί DOE CFO β€Ί NTC β€Ί S&S PIR Contact Us HSS Logo Director's Perspective Welcome to the Office of Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal Year 2007, HSS performed extensive assistance activities at the request of DOE/NNSA program offices and field sites. The activities ranged from special and routine site survey assistance, physical and technical security inspections in support of the Office of Intelligence, Vulnerability Assessment and Design Basis Threat (DBT) implementation assistance, third-party, adversary support, and DBT implementation and planning validation activities associated with the Site Assistance Visits and Technology Assistance Visits. The security assistance provided to our customers included technical expertise tailored to augment site capabilities in critical fields.

253

MasteringWeb Services Security MasteringWeb Services Security  

E-Print Network (OSTI)

Preview of MasteringWeb Services Security Preview of MasteringWeb Services Security Konstantin introduction Highlights of the book Web Services security problem XML Security WS-Security Security mechanisms for ASP.NET Web Services Planning and building secure Web Service systems Β­ Architectural and policy

254

Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Global Security We train nuclear industry professionals, emergency responders and security forces from around the world to safeguard vulnerable materials. Nuclear nonproliferation - stopping the spread of nuclear materials - is a critical part of creating a safer world. Y-12 has been working in nonproliferation since the early 1990s in more than 25 countries. As the nation reduces the size of its arsenal, Y-12 will play a central role in decommissioning weapons systems and providing weapons material for peacetime uses. We are a leader across the National Nuclear Security Administration in implementing technology and current training to ensure materials are protected with the highest degree of confidence. We provide the expertise to secure highly enriched uranium - domestically

255

Security Notice | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Notice Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized users; to access, obtain, alter, damage, or destroy information; or otherwise to interfere with the system or its operation - all are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and

256

File:NREL-africa-glo.pdf | Open Energy Information  

Open Energy Info (EERE)

glo.pdf Jump to: navigation, search File File history File usage Africa - Annual Global Horizontal Solar Radiation (PDF) Size of this preview: 776 600 pixels. Full resolution...

257

File:09NVAStateEnvironmentalProcess.pdf | Open Energy Information  

Open Energy Info (EERE)

file using an external application (See the setup instructions for more information) File usage The following page links to this file: GRRSection 9-NV-a - State Environmental...

258

File:NREL-camdirann.pdf | Open Energy Information  

Open Energy Info (EERE)

camdirann.pdf Jump to: navigation, search File File history File usage Central America - Annual Direct Normal Solar Radiation Size of this preview: 776 600 pixels. Full...

259

File:Cammetst 58.pdf | Open Energy Information  

Open Energy Info (EERE)

Cammetst 58.pdf Jump to: navigation, search File File history File usage Meteorology: map of Central America selected meteorological stations and elevation from NREL Size of this...

260

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... The NIST Handbook SP 800-12. SP 800-12 (HTML). NIST IR 7621, Oct 2009, Small Business Information Security: The Fundamentals NISTIR 7621. ...

Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Office of Headquarters Security Operations: Security Awareness...  

NLE Websites -- All DOE Office Websites (Extended Search)

Paul Ruehs Contact Information: Paul Ruehs - (301) 903-7189; Room F-324 Scope: The Security Awareness Program is established by DOE Order to inform individuals of their...

262

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

i. i. Message from the Administrator President Obama has reshaped our national security priorities making enterprise infrastructure modernization with integrated Information Technology (IT) capabilities a key strategic initiative. Our IT infrastructure must ensure that our workforce can access appropriate information in a secure, reliable, and cost-effective manner. Effective information sharing throughout the government enhances the national security of the United States (US). For the National Nuclear Security Administration (NNSA), effective information sharing helps strengthen our nuclear security mission; builds collaborative networks within NNSA as well as with the Department of Energy (DOE), Department of Defense (DoD), and other national security

263

Homeland Security Programs | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Homeland Security Programs Homeland Security Programs SHARE Homeland Security Programs The Homeland Security Programs support the Department of Homeland Security (DHS), other federal and state agencies, and commercial partners. Through the integration of a number of key competencies, ORNL is able to provide critical operational, technical, and scientific support to these sponsors. A key focus of this area is to translate the critical research into operational capability for the security, protection, response, and recovery of the nation against natural and man-made events. Research Areas detecting, preventing, and reversing the proliferation of weapons of mass destruction deploying integrated systems for incident awareness, detection, and response providing technology for detecting explosives at the

264

File:Bureauofreclamationfactsheet.pdf | Open Energy Information  

Open Energy Info (EERE)

Bureauofreclamationfactsheet.pdf Bureauofreclamationfactsheet.pdf Jump to: navigation, search File File history File usage Metadata File:Bureauofreclamationfactsheet.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Go to page 1 2 Go! next page β†’ next page β†’ Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 663 KB, MIME type: application/pdf, 2 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 15:54, 10 July 2013 Thumbnail for version as of 15:54, 10 July 2013 1,275 Γ— 1,650, 2 pages (663 KB) Graham7781 (Talk | contribs) 15:54, 10 July 2013 Thumbnail for version as of 15:54, 10 July 2013 1,275 Γ— 1,650, 2 pages (663 KB) Graham7781 (Talk | contribs) You cannot overwrite this file.

265

Global Scratch File System at NERSC  

NLE Websites -- All DOE Office Websites (Extended Search)

Scratch Scratch Global Scratch File System Overview The global scratch file system (or "global scratch") can be accessed by multiple NERSC systems. Its default quota is much larger than the Global Home quota, so it can be used to temporarily store large amounts of data. This file system is periodically purged. Platforms Using Global Scratch The global scratch file system is available on all NERSC systems except PDSF. Quotas Default global scratch quotas are 20 TB and 2,000,000 inodes. If you need more than that, fill out the Disk Quota Change Request Form. Purging Yes, files in global scratch file system are subject to purging. Backup No, Files in global scratch file system are not backed up. Environment Variable You can reference your personal scratch directory in global scratch as

266

OHA Product Efficiency Cases Archive File  

Energy.gov (U.S. Department of Energy (DOE))

This is a archive file of our Product Efficiency decisions, Please download this file to your local computer and use the build in adobe search feature. Individual cases are listed in the bookmark...

267

Network File System (NFS) version 4 Protocol  

Science Conference Proceedings (OSTI)

The Network File System (NFS) version 4 is a distributed filesystem protocol which owes heritage to NFS protocol version 2, RFC 1094, and version 3, RFC 1813. Unlike earlier versions, the NFS version 4 protocol supports traditional file access while ...

S. Shepler; B. Callaghan; D. Robinson; R. Thurlow; C. Beame; M. Eisler; D. Noveck

2003-04-01T23:59:59.000Z

268

Metadata Efficiency in Versioning File Systems  

Science Conference Proceedings (OSTI)

Versioning file systems retain earlier versions of modified files, allowing recovery from user mistakes or system corruption. Unfortunately, conventional versioning systems do not efficiently record large numbers of versions. In particular, versioned ...

Craig A. N. Soules; Garth R. Goodson; John D. Strunk; Gregory R. Ganger

2003-03-01T23:59:59.000Z

269

Metadata efficiency in versioning file systems  

Science Conference Proceedings (OSTI)

Versioning file systems retain earlier versions of modified files, allowing recovery from user mistakes or system corruption. Unfortunately, conventional versioning systems do not efficiently record large numbers of versions. In particular, versioned ...

Craig A. N. Soules; Garth R. Goodson; John D. Strunk; Gregory R. Ganger

2003-03-01T23:59:59.000Z

270

OHA Worker Appeal Cases Archive File  

Energy.gov (U.S. Department of Energy (DOE))

This is a archive file of our Worker Appeal decisions, Please download this file to your local computer and use the build in adobe search feature. Individual cases are listed in the bookmark...

271

DOE-2 Input File From WINDOW  

NLE Websites -- All DOE Office Websites (Extended Search)

an EnergyPlus input file from WINDOW 5 Last update: 12232008 01:54 PM Creating an EnergyPlus Input File for One Window In the WINDOW Window Library, which defines a complete...

272

DOE-2 Input File From WINDOW  

NLE Websites -- All DOE Office Websites (Extended Search)

a DOE2 input file from WINDOW 5 Last update: 02012008 01:19 PM Creating a DOE-2 Input File for One Window In the WINDOW Window Library, which defines a complete window including...

273

File:600.pdf | Open Energy Information  

Open Energy Info (EERE)

.pdf .pdf Jump to: navigation, search File File history File usage File:600.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Go to page 1 2 3 4 5 6 7 Go! next page β†’ next page β†’ Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 497 KB, MIME type: application/pdf, 7 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 11:53, 5 October 2012 Thumbnail for version as of 11:53, 5 October 2012 1,275 Γ— 1,650, 7 pages (497 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file. Retrieved from "http://en.openei.org/w/index.php?title=File:600.pdf&oldid=52071

274

File:Methane.pdf | Open Energy Information  

Open Energy Info (EERE)

Methane.pdf Methane.pdf Jump to: navigation, search File File history File usage File:Methane.pdf Size of this preview: 448 Γ— 600 pixels. Go to page 1 2 3 4 5 Go! next page β†’ next page β†’ Full resolution β€Ž(1,218 Γ— 1,630 pixels, file size: 929 KB, MIME type: application/pdf, 5 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 15:51, 9 February 2012 Thumbnail for version as of 15:51, 9 February 2012 1,218 Γ— 1,630, 5 pages (929 KB) Graham7781 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following page links to this file: Hydraulic Fracturing Retrieved from "http://en.openei.org/w/index.php?title=File:Methane.pdf&oldid=404017"

275

Rapid file system development using ptrace  

Science Conference Proceedings (OSTI)

Developing kernel-level file systems is a difficult task that requires a significant time investment. For experimental file systems, it is desirable to develop a prototype before investing the time required to develop a kernel-level file system. We have ...

Richard P. Spillane; Charles P. Wright; Gopalan Sivathanu; Erez Zadok

2007-06-01T23:59:59.000Z

276

Rapid file system development using ptrace  

Science Conference Proceedings (OSTI)

Developing kernel-level file systems is a difficult task that requires a significant time investment. For experimental file systems, it is desirable to develop a prototype before investing the time required to develop a kernel-level file system. We have ... Keywords: monitors, rapid prototyping

Richard P. Spillane; Charles P. Wright; Gopalan Sivathanu; Erez Zadok

2007-06-01T23:59:59.000Z

277

Extending ACID semantics to the file system  

Science Conference Proceedings (OSTI)

An organization's data is often its most valuable asset, but today's file systems provide few facilities to ensure its safety. Databases, on the other hand, have long provided transactions. Transactions are useful because they provide atomicity, consistency, ... Keywords: File system transactions, databases, file systems, ptrace monitors, recoverable memory

Charles P. Wright; Richard Spillane; Gopalan Sivathanu; Erez Zadok

2007-06-01T23:59:59.000Z

278

SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS  

E-Print Network (OSTI)

SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology The selection and implementation of security controls are critical decisions for protecting

279

Campus Security Report 1 Campus seCurity  

E-Print Network (OSTI)

Campus Security Report 1 Campus seCurity and Fire saFety report UC Santa Cruz 2010 #12;Campus Security Report 2 UC Santa Cruz Geography ........................................................ 8 Security and Access to Campus Buildings and Grounds ........................................ 8

Wilmers, Chris

280

Learning mobile security with android security labware  

Science Conference Proceedings (OSTI)

As smart mobile devices grow increasingly in popularity, so do the incentives for attackers. Recent surveys on mobile security describe the rapidly increasing number and sophistication of mobile attacks. Newer sources of risks are being introduced or ... Keywords: android, labware, mobile security

Minzhe Guo; Prabir Bhattacharya; Ming Yang; Kai Qian; Li Yang

2013-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Quantifying Security in Secure Software Development Phases  

Science Conference Proceedings (OSTI)

Secure software is crucial in today’s software dependent world. However, most of the time, security is not addressed from the very beginning of a software development life cycle (SDLC), and it is only incorporated after the software has been developed. ...

Muhammad Umair Ahmed Khan; Mohammad Zulkernine

2008-07-01T23:59:59.000Z

282

TSO-1106 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

106 - In the Matter of Personnel Security Hearing 106 - In the Matter of Personnel Security Hearing TSO-1106 - In the Matter of Personnel Security Hearing The Individual is an applicant for a DOE access authorization in connection with his employment with a DOE contractor. DOE Ex. 3. During the application process, the Individual completed a Questionnaire for National Security Positions (QNSP) in June 2010, and participated in an October 2010 Personnel Security Interview (PSI). DOE Exs. 7, 8. After the PSI, the local security office (LSO) referred the Individual to a DOE consultant-psychologist ("the DOE psychologist") for an evaluation. The DOE psychologist evaluated the Individual in February 2011 and issued a report. DOE Ex. 10. After reviewing the Individual's personnel security file, the LSO informed the Individual in a June 2011 Notification Letter

283

PSH-12-0050 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2-0050 - In the Matter of Personnel Security Hearing 2-0050 - In the Matter of Personnel Security Hearing PSH-12-0050 - In the Matter of Personnel Security Hearing The individual's present employer, a DOE contractor, has requested a DOE access authorization for the individual. The individual completed and submitted an Electronic Questionnaire for Investigations Processing (QNSP) in November 2011. DOE Exhibit 8. Based on issues contained in the individual's security file, the Local Security Office (LSO) conducted a Personnel Security Interview (PSI) with the individual in January 2012. DOE Exhibit 9. In March 2012, a DOE-consultant Psychologist evaluated the individual, and memorialized his findings in a Psychological Assessment Report (the Report). PSH-12-0050.pdf More Documents & Publications PSH-11-0021 - In the Matter of Personnel Security Hearing

284

PSH-12-0014 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4 - In the Matter of Personnel Security Hearing 4 - In the Matter of Personnel Security Hearing PSH-12-0014 - In the Matter of Personnel Security Hearing The Individual, a 48-year-old employee of a DOE contractor, is an applicant for DOE access authorization. DOE Ex. 3. During the application process, the Individual completed a Questionnaire for National Security Positions (QNSP) in May 2011, and participated in an August 2011 Personnel Security Interview (PSI). DOE Exs. 8, 9. After the PSI, the local security office (LSO) referred the Individual to a DOE consultant-psychiatrist ("the DOE psychiatrist") for an evaluation. The DOE psychiatrist evaluated the Individual in September 2011 and issued a report. DOE Exs. 6, 7. After reviewing the Individual's personnel security file, the LSO informed the

285

PSH-12-0014 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

14 - In the Matter of Personnel Security Hearing 14 - In the Matter of Personnel Security Hearing PSH-12-0014 - In the Matter of Personnel Security Hearing The Individual, a 48-year-old employee of a DOE contractor, is an applicant for DOE access authorization. DOE Ex. 3. During the application process, the Individual completed a Questionnaire for National Security Positions (QNSP) in May 2011, and participated in an August 2011 Personnel Security Interview (PSI). DOE Exs. 8, 9. After the PSI, the local security office (LSO) referred the Individual to a DOE consultant-psychiatrist ("the DOE psychiatrist") for an evaluation. The DOE psychiatrist evaluated the Individual in September 2011 and issued a report. DOE Exs. 6, 7. After reviewing the Individual's personnel security file, the LSO informed the

286

TSO-1014 - In the Matter of Personnel Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TSO-1014 - In the Matter of Personnel Security TSO-1014 - In the Matter of Personnel Security TSO-1014 - In the Matter of Personnel Security The individual is employed by a Department of Energy (DOE) contractor and has held a security clearance at the request of his employer since 1998. DOE terminated his clearance in 2005, and then reinstated it in 2007 after a favorable psychiatric evaluation. In July 2010, the individual's wife filed a restraining order against him. He reported the incident to the local security office (LSO) and the LSO conducted a personnel security interview (PSI) with the individual in August 2010. The PSI did not resolve the security concerns and the individual agreed to be evaluated by a DOE consultant-psychiatrist. In November 2010, a DOE consultant-psychiatrist (DOE psychiatrist) interviewed the individual and concluded that the

287

TSO-1116 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TSO-1116 - In the Matter of Personnel Security Hearing TSO-1116 - In the Matter of Personnel Security Hearing TSO-1116 - In the Matter of Personnel Security Hearing The individual is an employee of a Department of Energy (DOE) contractor who has held a security clearance for several years. During a routine reinvestigation, the local security office (LSO) discovered that the individual had not filed federal taxes for the tax years 2008 and 2009. In July 2011, the LSO interviewed the individual during a Personnel Security Interview (PSI), but that interview did not resolve the security concerns. The LSO suspended his clearance and, in August 2011, the LSO informed the individual that it had received derogatory information that created a doubt regarding his continued eligibility for access authorization. See

288

TSO-1002 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TSO-1002 - In the Matter of Personnel Security Hearing TSO-1002 - In the Matter of Personnel Security Hearing TSO-1002 - In the Matter of Personnel Security Hearing The individual held a security clearance from 1990 until 2002 while working for government contractors and the federal government. In 2010, his present employer, a DOE contractor, requested DOE access authorization for the individual. Based on issues contained in the individual's security file, the Local Security Office (LSO) conducted a Personnel Security Interview with the individual in September 2010 (the 2010 PSI, DOE Ex. 10). In November 2010, a DOE-consultant Psychiatrist evaluated the individual, and memorialized her findings in a Report of Psychiatric Evaluation (the 2010 Report, DOE Ex. 4). In December 2010, the LSO issued a Notification Letter

289

TSO-1106 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TSO-1106 - In the Matter of Personnel Security Hearing TSO-1106 - In the Matter of Personnel Security Hearing TSO-1106 - In the Matter of Personnel Security Hearing The Individual is an applicant for a DOE access authorization in connection with his employment with a DOE contractor. DOE Ex. 3. During the application process, the Individual completed a Questionnaire for National Security Positions (QNSP) in June 2010, and participated in an October 2010 Personnel Security Interview (PSI). DOE Exs. 7, 8. After the PSI, the local security office (LSO) referred the Individual to a DOE consultant-psychologist ("the DOE psychologist") for an evaluation. The DOE psychologist evaluated the Individual in February 2011 and issued a report. DOE Ex. 10. After reviewing the Individual's personnel security file, the LSO informed the Individual in a June 2011 Notification Letter

290

File:PoliticsofFracking.pdf | Open Energy Information  

Open Energy Info (EERE)

PoliticsofFracking.pdf Jump to: navigation, search File File history File usage File:PoliticsofFracking.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

291

File:04UTAStateExplorationProcess.pdf | Open Energy Information  

Open Energy Info (EERE)

UTAStateExplorationProcess.pdf Jump to: navigation, search File File history File usage File:04UTAStateExplorationProcess.pdf Size of this preview: 463 599 pixels. Other...

292

Nuclear Security 101 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

293

Nuclear Security 101 | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

294

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO), May 2011

295

Secure Shell (SSH)  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Shell (SSH) Name: Rutaiwan Status: Educator Age: 20s Location: NA Country: NA Date: June 2003 Question: What is the Secure Shell (SSH)? What is a strong and weak points of...

296

Foundation for system security  

Science Conference Proceedings (OSTI)

We provide a coherent framework for the design and analysis of secure systems. Our framework is inspired by Lawrence Lessig's modalities of control, by Niklas Luhmann's theory of trust, by existing models of information security, and by existing models ...

Clark Thomborson

2009-01-01T23:59:59.000Z

297

Performance and security tradeoff  

Science Conference Proceedings (OSTI)

A tradeoff is a situation that involves losing one quality or aspect of something in return for gaining another quality or aspect. Speaking about the tradeoff between performance and security indicates that both, performance and security, can be measured, ...

Katinka Wolter; Philipp Reinecke

2010-06-01T23:59:59.000Z

299

Checking Security Policy Compliance  

E-Print Network (OSTI)

Ensuring compliance of organizations to federal regulations is a growing concern. This paper presents a framework and methods to verify whether an implemented low-level security policy is compliant to a high-level security policy. Our compliance checking framework is based on organizational and security metadata to support refinement of high-level concepts to implementation specific instances. Our work uses the results of refinement calculus to express valid refinement patterns and their properties. Intuitively, a low-level security policy is compliant to a high-level security policy if there is a valid refinement path from the high-level security policy to the low-level security policy. Our model is capable of detecting violations of security policies, failures to meet obligations, and capability and modal conflicts.

Gowadia, Vaibhav; Kudo, Michiharu

2008-01-01T23:59:59.000Z

300

Safety, Security and Infrastructure (SSI) Homepage | U.S. DOE Office of  

NLE Websites -- All DOE Office Websites (Extended Search)

Laboratories Β» SSI Home Laboratories Β» SSI Home Safety, Security and Infrastructure (SSI) SSI Home Facilities and Infrastructure Safeguards & Security Environment, Safety and Health (ES&H) Organization Chart .pdf file (82KB) Phone Listing .pdf file (129KB) SC HQ Continuity of Operations (COOP) Implementation Plan .pdf file (307KB) Categorical Exclusion Determinations SLI & SS Budget Contact Information Safety, Security and Infrastructure U.S. Department of Energy SC-31/Germantown Building 1000 Independence Ave., SW Washington, DC 20585 P: (301) 903-4097 F: (301) 903-7047 BNL Chemistry Building 555 August 2012: Renovated lab space in the west wing of the BNL Chemistry Building 555 at Brookhaven National Laboratory. The New York Section of the American Chemistry Society recently designated

Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Digital Age - Information Security Transformation for the ... to Information Systems (Transforming the Certification ... for Smart Grid Cyber Security (NIST ...

302

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Automated Information Flows for Situational Awareness; Transformation of Dynamic Security ... Cyber security leadership in the Executive Branch. ...

303

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... per the Security Content Automation Protocol (SCAP ... securely install and configure a device; and; ... applicable scenarios and distribution formats, the ...

304

ADVANCED DATA SECURITY  

Science Conference Proceedings (OSTI)

ADVANCED DATA SECURITY. NVLAP Lab Code: 200968-0. Address and Contact Information: 1933 O'Toole Avenue San ...

2013-11-08T23:59:59.000Z

305

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

306

Security system signal supervision  

SciTech Connect

This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

1991-09-01T23:59:59.000Z

307

Application Filing Requirements for Natural Gas Pipeline Construction...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Application Filing Requirements for Natural Gas Pipeline Construction Projects (Wisconsin) Application Filing Requirements for Natural Gas Pipeline Construction Projects...

308

"Annual Electric Power Industry Report (EIA-861 data file)  

U.S. Energy Information Administration (EIA)

‹ ELECTRICITY DETAILED SURVEY DATA FILES: Electric power sales, revenue, and energy efficiency Form EIA-861 detailed data files ...

309

Verifiably secure devices  

Science Conference Proceedings (OSTI)

We put forward the notion of a verifiably secure device, in essence a stronger notion of secure computation, and achieve it in the ballot-box model. Verifiably secure devices 1. Provide a perfect solution to the problem of achieving correlated equilibrium, ...

Sergei Izmalkov; Matt Lepinski; Silvio Micali

2008-03-01T23:59:59.000Z

310

Understanding Android Security  

Science Conference Proceedings (OSTI)

Google's Android platform is a widely anticipated open source operating system for mobile phones. This article describes Android's security model and attempts to unmask the complexity of secure application development. The authors conclude by identifying ... Keywords: Android, mobile phones, Smartphones, security

William Enck; Machigar Ongtang; Patrick McDaniel

2009-01-01T23:59:59.000Z

311

Lemnos interoperable security project.  

Science Conference Proceedings (OSTI)

With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

Halbgewachs, Ronald D.

2010-03-01T23:59:59.000Z

312

Security auditing course development  

Science Conference Proceedings (OSTI)

As people increasingly depend on computers and network systems, security auditing has become one of the most effective security practices to achieve defense-in-depth in organizations. It follows an effective process to measure policies, procedures ... Keywords: IT audit, IT education, curriculum development, security

Yin Pan

2007-10-01T23:59:59.000Z

313

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1846P CustomTraining Sandia providesPRAsandhowtheycanbemanaged to increase levels of safety and security. Like othertrainings,Sandiaexpertsdesigncoursesto beasbroadorin

314

Human Rights and Security  

E-Print Network (OSTI)

Migration, Human Rights and Security in Europe MRU Student Conference Proceedings 2012 Edited by Siril Berglund, Helen McCarthy and Agata Patyna #12;2 "Migration, Human Rights and Security...............................................................................................58 #12;3 "Migration, Human Rights and Security in Europe", MRU Student Conference Proceedings

Saunders, Mark

315

UNIVERSITY POLICE ANNUAL SECURITY  

E-Print Network (OSTI)

UNIVERSITY POLICE 2013 ANNUAL SECURITY AND FIRE SAFETY GUIDE In compliance with the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act The University of New Orleans. Please take a moment to read the following information. #12;ANNUAL SECURITY AND FIRE SAFETY GUIDE 2013

Kulp, Mark

316

Functional Programming and Security  

E-Print Network (OSTI)

This paper analyses the security contribution of typical functional-language features by examining them in the light of accepted information security principles. Imperative and functional code are compared to illustrate various cases. In conclusion, there may be an excellent case for the use of functional languages on the grounds of better security; however, empirical research should be done to validate this possibility.

Motara, Yusuf Moosa

2012-01-01T23:59:59.000Z

317

Information Security Guide  

E-Print Network (OSTI)

Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

318

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-0987P Transportation of the safe and secure transport of radioactive and hazardous materials. AWaytoEnsureSafeTransport Sandia

319

TO: FILE FROM: I SUBJECT:  

Office of Legacy Management (LM)

TO: FILE TO: FILE FROM: I .- SUBJECT: 9EEEW Pos$:&&~ rk/ErvlK& @orzb Current: Lov?r_ &%2J*l&o3?fi; Owner contacted 0 yes &no; if yes, date contacted . TYPE OF OPERATION ----------------- q Research & Development @ Facility Type 0 Production scale testing 0 Pilot Scale & rlanuf acturing 0 Bench Scale Process 0 University 0 Theoretical Studies 0 Research Organizatil 0 Sample SC Analysis 0 Government Sponsarec 0 Other -------------_ q Production 0 Disposal /Storage TYPE CIF CONTRACT ~------_~-~----_ q Prime 0 0 Subcontract& Other information (i.e. 0 Purchase Order + fixed fee, unit prier time 81 material, t+tc:)-- ------------w-----z-. Contract/Purchase Order #-&)A (c& YJ c -7 / -t 4,&>~c-~7~7------ --- -7

320

Program Areas | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Programs Initiatives Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Program Areas SHARE Program...

Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Supporting Organizations | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Supporting Organizations SHARE Supporting...

322

File:Susquehannariver.pdf | Open Energy Information  

Open Energy Info (EERE)

Susquehannariver.pdf Susquehannariver.pdf Jump to: navigation, search File File history File usage File:Susquehannariver.pdf Size of this preview: 776 Γ— 600 pixels. Go to page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 Go! next page β†’ next page β†’ Full resolution β€Ž(1,650 Γ— 1,275 pixels, file size: 2.11 MB, MIME type: application/pdf, 24 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 15:56, 9 February 2012 Thumbnail for version as of 15:56, 9 February 2012 1,650 Γ— 1,275, 24 pages (2.11 MB) Graham7781 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following page links to this file:

323

A Metadata-Rich File System  

Science Conference Proceedings (OSTI)

Despite continual improvements in the performance and reliability of large scale file systems, the management of file system metadata has changed little in the past decade. The mismatch between the size and complexity of large scale data stores and their ability to organize and query their metadata has led to a de facto standard in which raw data is stored in traditional file systems, while related, application-specific metadata is stored in relational databases. This separation of data and metadata requires considerable effort to maintain consistency and can result in complex, slow, and inflexible system operation. To address these problems, we have developed the Quasar File System (QFS), a metadata-rich file system in which files, metadata, and file relationships are all first class objects. In contrast to hierarchical file systems and relational databases, QFS defines a graph data model composed of files and their relationships. QFS includes Quasar, an XPATH-extended query language for searching the file system. Results from our QFS prototype show the effectiveness of this approach. Compared to the defacto standard, the QFS prototype shows superior ingest performance and comparable query performance on user metadata-intensive operations and superior performance on normal file metadata operations.

Ames, S; Gokhale, M B; Maltzahn, C

2009-01-07T23:59:59.000Z

324

Instructions to CBECS 1992 Microdata Files  

Gasoline and Diesel Fuel Update (EIA)

2 Public Data 2 Public Data 1992 CBECS Public Use Data The 18 Public Use Data files of the 1992 Commercial Buildings Energy Consumption Survey (CBECS) data are available in ASCII (i.e. CE92F01T.TXT) and dBASE (CE92F01D.DBF) formats. These files contain the 1992 CBECS basic data including building characteristics, energy consumption and expenditures, and temperature data. The files can be accessed below. The data have been compressed into zip files with an extension of zip. After downloading the files, they should be placed in a separate directory and expanded by using a pkunzip program (also available below). Readme.TXT Information on the 1992 CBECS Public Use Data C920105T.ZIP and C920105D.ZIP contain the following files: File 1: CE92F01T.TXT General Building Information

325

SEDS CSV File Documentation: Price and Expenditure  

Gasoline and Diesel Fuel Update (EIA)

Prices and Expenditures Prices and Expenditures The State Energy Data System (SEDS) comma-separated value (CSV) files contain the price and expenditure estimates shown in the tables located on the SEDS website. There are three files that contain estimates for all states and years. Prices contains the price estimates for all states and Expenditures contains the expenditure estimates for all states. The third file, Adjusted Consumption for Expenditure Calculations contains adjusted consumption estimates used in calculating expenditures (see Appendix E below). Zip files are also available for the large data files. In addition, there is a CSV file for each state, named with the two-letter U.S. Postal Code listed in Appendix A, as well as a file for the United States.

326

Splitting and Confirming Large File  

NLE Websites -- All DOE Office Websites (Extended Search)

Splitting and Confirming Large File Splitting and Confirming Large File Name: Bradley C. Status: Student Age: 16 Location: N/A Country: N/A Date: June 2003 Question: I just calculated one billion digits of pi on my PC, how do I confirm them? I cannot access them because the file size is 1.28 GB, my ram is only 512 MB, meaning none of my word processor's will touch it. Is it possible to split the document, somehow? Then how do I confirm the digits? Replies: Checking the correctness of large numbers -- transcendental numbers like 'pi', or a large prime -- is not easy because there are many sources of error that are difficult to detect, or track down. Some, but by no means all are: 1. How "good" (that is convergent) is the algorithm? If, for example the algorithm is some sort of infinite series, there is always a truncation error, because you cannot compute an infinite number of terms in a finite amount of time. The further out you go in the algorithm, the more significant these errors become.

327

Building security requirements with CLASP  

Science Conference Proceedings (OSTI)

Traditionally, security requirements have been derived in an ad hoc manner. Recently, commercial software development organizations have been looking for ways to produce effective security requirements.In this paper, we show how to build security ... Keywords: application security, security process, security requirements

John Viega

2005-07-01T23:59:59.000Z

328

Lemnos Interoperable Security Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Lemnos Interoperable Security Program Lemnos Interoperable Security Program Creating common language and metrics for describing functions of network security tools and testing for interoperability As energy control systems employ more Internet-based features and routable communication methods, the need grows for enhanced security functions, such as firewalls, virtual private networks (VPNs), and intrusion detection systems. When purchasing network security products, today's control systems users cannot adequately compare products from different vendors because the industry lacks a widely accepted mechanism for evaluating functionality, performance,

329

Security | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Nonproliferation and Nuclear Forensics Decision Science Sensors and Materials Security Enhancing national and homeland security requires technological advancements in everything from biosensors to risk assessments. Game-changing scientific discovery is required for the development of sensors, detectors and other technological advancements used to protect and defend our country. At Argonne, our highly collaborative community of scientists and engineers discover and develop critical security and defense technologies to prevent and mitigate events with the potential for mass disruption or destruction, thereby protecting our citizens and our national interests. Our goal is to make America a safer place through innovations in threat decision science, sensors and materials, infrastructure assurance,

330

Engineering secure software  

E-Print Network (OSTI)

In recent years computer software has gained notoriety for the endemic nature of security problems in software. These problems have been exploited with malicious intent by attackers. Most attempts at fixing these problems have been after-the-fact fixes in the form of software patches. The root causes for security problems in software are explored. A survey of research attempts at engineering secure software is presented. The techniques discussed range from those that are very similar to classical software engineering, to those that may be used in analyses of security requirements, as well as tools that can help engineer secure software. The survey classifies the approaches as process-oriented and as tools-oriented. The current approaches are incomplete in nature. They seem to address the security problem in parts and not in the whole. A comprehensive methodology, integrated with evolutionary software engineering practices is presented. The methodology combines both process and tools oriented approaches to construct secure software.

Jetly, Prateek

2001-01-01T23:59:59.000Z

331

T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Adobe Flash SWF File Processing Memory Corruption Remote 9: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability March 3, 2011 - 3:05pm Addthis PROBLEM: Adobe Flash Player contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. PLATFORM: Adobe Flash Player versions 10.1.102.64 and prior ABSTRACT: Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system. reference LINKS: Cisco IntelliShield ID:22576 Adobe Security Update: APSB11-02

332

T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Adobe Flash SWF File Processing Memory Corruption Remote 9: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability March 3, 2011 - 3:05pm Addthis PROBLEM: Adobe Flash Player contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. PLATFORM: Adobe Flash Player versions 10.1.102.64 and prior ABSTRACT: Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system. reference LINKS: Cisco IntelliShield ID:22576 Adobe Security Update: APSB11-02

333

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

74: Drupal Secure Password Hashes Module Security Bypass 74: Drupal Secure Password Hashes Module Security Bypass Vulnerability T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability July 22, 2011 - 3:00pm Addthis PROBLEM: Drupal Secure Password Hashes Module Security Bypass Vulnerability PLATFORM: Drupal Secure Password Hashes 6.X-1.0 Drupal Secure Password Hashes 5.X-1.4 ABSTRACT: The Secure Password Hashes module for Drupal is prone to a security-bypass vulnerability. reference LINKS: Drupal Homepage SA-CONTRIB-2011-026 - Secure Password Hashes (phpass) - Multiple Vulnerabilities IMPACT ASSESSMENT: Medium Discussion: This module uses the PHPass hashing library to try to store users hashed passwords securely. The module sets a fixed string for the 'pass' column in the {users} database column but does not replace the pass attribute of the account

334

Safeguards and Security and Cyber Security RM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safeguards and Security and Safeguards and Security and Cyber Security Review Module March 2010 CD- -0 OFFICE O S CD-1 OF ENVIRO Standard Safeguar and Cy Rev Critical D CD-2 M ONMENTA Review Pla rds and S yber Secu view Modul Decision (CD CD March 2010 AL MANAG an (SRP) Security urity le D) Applicabili D-3 GEMENT ity CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-

335

Office of Headquarters Security Operations: Operations Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

336

Office of Headquarters Security Operations: Headquarters Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

337

File  

U.S. Energy Information Administration (EIA) Indexed Site

1,"Alabama","Alabama","Coke Plant","Railroad",71299 1,"Alabama","Alabama","Coke Plant","Railroad",71299 2013,1,"Alabama","Alabama","Coke Plant","Truck",87126 2013,1,"Alabama","Alabama","Electric Power Sector","Railroad",448583 2013,1,"Alabama","Alabama","Electric Power Sector","River",358269 2013,1,"Alabama","Alabama","Industrial Plants Excluding Coke","Railroad",14493 2013,1,"Alabama","Alabama","Industrial Plants Excluding Coke","Truck",267108 2013,1,"Alabama","Colorado","Electric Power Sector","Railroad",203781 2013,1,"Alabama","Illinois","Electric Power Sector","River",129358

338

File  

U.S. Energy Information Administration (EIA) Indexed Site

1,"Alabama","Alabama","Electric Power Sector","Railroad",800913 1,"Alabama","Alabama","Electric Power Sector","Railroad",800913 2012,1,"Alabama","Alabama","Coke Plant","Railroad",8914 2012,1,"Alabama","Alabama","Industrial Plants Excluding Coke","Railroad",35029 2012,1,"Alabama","Alabama","Electric Power Sector","River",519184 2012,1,"Alabama","Alabama","Electric Power Sector","Truck",50499 2012,1,"Alabama","Alabama","Coke Plant","Truck",174999 2012,1,"Alabama","Alabama","Industrial Plants Excluding Coke","Truck",240989 2012,1,"Alabama","Georgia","Industrial Plants Excluding Coke","Truck",419

339

File  

U.S. Energy Information Administration (EIA) Indexed Site

1,"Alabama","Alabama","Coke Plant","Railroad",8914 1,"Alabama","Alabama","Coke Plant","Railroad",8914 2012,1,"Alabama","Alabama","Coke Plant","Truck",174999 2012,1,"Alabama","Alabama","Electric Power Sector","Railroad",800913 2012,1,"Alabama","Alabama","Electric Power Sector","River",519184 2012,1,"Alabama","Alabama","Electric Power Sector","Truck",50499 2012,1,"Alabama","Alabama","Industrial Plants Excluding Coke","Railroad",35029 2012,1,"Alabama","Alabama","Industrial Plants Excluding Coke","Truck",240989 2012,1,"Alabama","Colorado","Electric Power Sector","Railroad",82497

340

File  

U.S. Energy Information Administration (EIA) Indexed Site

2,"Alabama","Alabama","Electric Power Sector","Railroad",495478 2,"Alabama","Alabama","Electric Power Sector","Railroad",495478 2013,2,"Alabama","Alabama","Coke Plant","Railroad",116028 2013,2,"Alabama","Alabama","Industrial Plants Excluding Coke","Railroad",26409 2013,2,"Alabama","Alabama","Electric Power Sector","River",511695 2013,2,"Alabama","Alabama","Industrial Plants Excluding Coke","River",1588 2013,2,"Alabama","Alabama","Electric Power Sector","Truck",58856 2013,2,"Alabama","Alabama","Coke Plant","Truck",94157 2013,2,"Alabama","Alabama","Industrial Plants Excluding Coke","Truck",272760

Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

File  

U.S. Energy Information Administration (EIA) Indexed Site

1,"Alabama","Alabama","Electric Power Sector","Railroad",448583 1,"Alabama","Alabama","Electric Power Sector","Railroad",448583 2013,1,"Alabama","Alabama","Coke Plant","Railroad",71299 2013,1,"Alabama","Alabama","Industrial Plants Excluding Coke","Railroad",14493 2013,1,"Alabama","Alabama","Electric Power Sector","River",358269 2013,1,"Alabama","Alabama","Coke Plant","Truck",87126 2013,1,"Alabama","Alabama","Industrial Plants Excluding Coke","Truck",267108 2013,1,"Alabama","Indiana","Coke Plant","Railroad",164223 2013,1,"Alabama","Kentucky","Industrial Plants Excluding Coke","River",6042

342

File  

U.S. Energy Information Administration (EIA) Indexed Site

4,"Alabama","Alabama","Electric Power Sector","Railroad",802677 4,"Alabama","Alabama","Electric Power Sector","Railroad",802677 2012,4,"Alabama","Alabama","Coke Plant","Railroad",17349 2012,4,"Alabama","Alabama","Industrial Plants Excluding Coke","Railroad",22271 2012,4,"Alabama","Alabama","Electric Power Sector","River",384071 2012,4,"Alabama","Alabama","Electric Power Sector","Truck",39426 2012,4,"Alabama","Alabama","Coke Plant","Truck",144411 2012,4,"Alabama","Alabama","Industrial Plants Excluding Coke","Truck",252085 2012,4,"Alabama","Georgia","Electric Power Sector","Truck",6

343

File  

U.S. Energy Information Administration (EIA) Indexed Site

2012,4,"Alabama","Alabama","Coke Plant","Truck",144411 2012,4,"Alabama","Alabama","Electric Power Sector","Railroad",802677 2012,4,"Alabama","Alabama","Electric Power...

344

File  

U.S. Energy Information Administration (EIA) Indexed Site

2013,2,"Alabama","Alabama","Coke Plant","Truck",94157 2013,2,"Alabama","Alabama","Electric Power Sector","Railroad",495478 2013,2,"Alabama","Alabama","Electric Power...

345

MEMORANDUM I TO: FILE DATE  

Office of Legacy Management (LM)

MEMORANDUM MEMORANDUM I TO: FILE DATE -----_-_- FaOM: ~~,~hkcid!,~- ' ALTERNATE CITY: I\ptw)a.yk --~---_--___-~--~---______ STATE: I current: ------------_------_-~~~~~ if yes, date contacted ____ TYPE OF OPERATION -_---_---------__ 0 Research & Development 6 Facility Type 0 Production scale testing 0 Pilat Scale 0 Bench Scale Process 0 Theoretical Studies Sample $ rraductian & Analysis a Manufacturing I 0 University I (1 Research Organization 0 Government Sponao&ed Facility 0 Cither I ----e------y-------- 0 Disposal/Storage TYPE OF CONTRACT --~_----~__~~~-- ' 0 Prime q Subcontract& q Purchase Order cl Other informatian (i.e., cost + fixed fee, unit pri'ce, time & material, qtc) ------- --------------------~------ Contract/Purchase Order #

346

Cyberspace security: How to develop a security strategy  

E-Print Network (OSTI)

Despite all visible dividers, the Internet is getting us closer and closer, but with a great price. Our security is the price. The internatl. community is fully aware of the urgent need to secure the cyberspace as you see the multiplication of security standards and national schemes interpreting them beyond borders: ISO 15408, ISO 17799, and ISO 27001. Even though some countries, incl. the Security Big Six (SB6), are equipped with their security books and may feel relatively safe; this remains a wrong sense of security as long as they share their networks with entities of less security. The standards impose security best practices and system specifications for the development of information security management systems. Partners beyond borders have to be secure as this is only possible if all entities connected to the partnership remain secure. Unfortunately, there is no way to verify the continuous security of partners without periodic security auditing and certification, and members who do not comply should ...

Raggad, Bel G

2007-01-01T23:59:59.000Z

347

PSH-12-0044 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

44 - In the Matter of Personnel Security Hearing 44 - In the Matter of Personnel Security Hearing PSH-12-0044 - In the Matter of Personnel Security Hearing The Individual is a contractor employee at a DOE facility and has possessed a security clearance on various occasions since 1978. Exhibit (Ex.) 8 at 2. In December 2011, the Individual reported to the Local Security Office (LSO) that his wages were being garnished for back federal taxes. Ex. 13 at 1. Consequently, the LSO conducted a personnel security interview (PSI) with the Individual in January 2012. Ex. 15. Because the PSI and further investigation indicated that the Individual had not filed state and federal tax returns for several years and had a number of delinquent financial accounts, the LSO informed the Individual in a March 2012 notification

348

PSH-11-0036 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1-0036 - In the Matter of Personnel Security Hearing 1-0036 - In the Matter of Personnel Security Hearing PSH-11-0036 - In the Matter of Personnel Security Hearing The Individual is employed by a DOE contractor and has held an access authorization for several years. DOE Exhibit (Ex.) 6 at 1. Pursuant to an investigation, it was discovered that the Individual, for a second period of time, had not filed state or federal tax returns. Ex. 4 at 1-2. This discovery prompted the Local Security Office (LSO) to conduct a Personnel Security Interview (PSI) with the Individual in October 2011. Ex. 5. After conducting the October 2011 PSI with the Individual, the LSO informed the Individual in a November 2011 notification letter (Notification Letter) that derogatory information existed that raised security concerns under 10

349

PSH-11-0039 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1-0039 - In the Matter of Personnel Security Hearing 1-0039 - In the Matter of Personnel Security Hearing PSH-11-0039 - In the Matter of Personnel Security Hearing The individual is an employee of a DOE contractor and holds a suspended access authorization. On September 8, 2011, the individual notified the DOE that the Internal Revenue Service (IRS) began garnishing his wages in August 2011, due to his failure to file a 2006 federal tax return. Exhibit 7. A Local Security Office (LSO) summoned the individual for an interview (PSI) with a personnel security specialist on September 28, 2011. Exhibit 7. After the PSI, the LSO determined that derogatory information existed that cast into doubt the individual's eligibility for access authorization. The LSO informed the individual of this determination in a letter that set forth the DOE's security concerns and the reasons for

350

PSH-11-0034 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

34 - In the Matter of Personnel Security Hearing 34 - In the Matter of Personnel Security Hearing PSH-11-0034 - In the Matter of Personnel Security Hearing The Individual is employed by a DOE contractor and has held a DOE access authorization for several years. DOE Ex. 3. In August 2011, the Individual timely reported to the Local Security Office (LSO) her arrest for Driving Under the Influence (DUI) of alcohol. DOE Ex. 10. The incident prompted a September 2011 Personnel Security Interview (PSI). DOE Ex. 11. After the PSI, the LSO referred the Individual to a DOE consultant-psychiatrist ("the DOE psychiatrist") for an evaluation. The DOE psychiatrist evaluated the Individual in October 2011 and issued a report. DOE Ex. 8. After reviewing the Individual's personnel security file, the LSO informed the Individual in a November 2011 Notification Letter that there

351

National Security Science Archive  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Science Β» National Security Science Β» NSS Archive National Security Science magazine Latest Issue:April 2013 All Issues Β» submit National Security Science Archive Using its broad and unique scientific and engineering capabilities, the Laboratory solves a diverse set of challenges to national and global security and the weapons programs. National Security Science magazine showcases the breadth and depth of the Laboratory's scientific and technical work to policy makers, the general public, academia, and scientific and technical experts. past issues cover Issue 2 2012 interactive | web | pdf past issues cover Issue 1 2012 interactive | web | pdf past issues cover Issue 3 2011 web | pdf past issues cover Issue 2 2011 web | pdf past issues cover Issue 1 2011 web | pdf past issues cover

352

PNNL: Security & Privacy  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Privacy Security & Privacy Thank you for visiting the Pacific Northwest National Laboratory (PNNL) website (pnnl.gov) and reviewing our security and privacy policies. The following policies apply to all pages and sites in the pnnl.gov domain, unless otherwise noted. Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or

353

Security Topic Group  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Group Group Security and TEC * Tension exists between open forum concept of TEC and the ability of STG members to discuss security topics. - DOE will maintain the open forum - it will not form a subgroup of cleared members NAS Study * Some members want STG to formally recommend a fully independent review of security issues - DOE is reviewing the NAS study and has not formulated a position Security Topic Group (Continued) Classification Guide & Information Sharing Protocol * Guide is finished and undergoing internal concurrence - Slated for late September release * Protocol will be completed once the guide is issued Security-Related Lessons Learned * Lessons learned document was distributed and comments requested by the end of March Security Topic Group (Continued) SRG/CVSA Survey

354

Office of Security Operations  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Physical Protection Office of Physical Protection Bill Dwyer Director, 202-586-7887 Mission The mission of the Office of Physical Protection is to implement and oversee dedicated human resources, processes, and equipment designed to protect personnel and assets entrusted to our care at Department of Energy (DOE) Headquarters facilities. The Office is comprised of dedicated DOE Federal security professionals, Headquarters Protective Force personnel, and Alarms and Access Control Technicians. These security subject matter experts work together to ensure compliance with DOE Safeguards and Security regulations, Interagency Security Committee guidance, and federal laws. The result of this collaboration is a security program designed to ensure a safe and secure working environment for all Headquarters employees.

355

Security (Un-)Usability 17 Security Usability Fundamentals  

E-Print Network (OSTI)

Security (Un-)Usability 17 Security Usability Fundamentals An important consideration when you're building an application is the usability of the security features that you'll be employing. Security experts frequently lament that security has been bolted onto applications as an afterthought, however

Cortes, Corinna

356

Evaluated nuclear-data file for niobium  

SciTech Connect

A comprehensive evaluated nuclear-data file for elemental niobium is provided in the ENDF/B format. This file, extending over the energy range 10/sup -11/-20 MeV, is suitable for comprehensive neutronic calculations, particulary those dealing with fusion-energy systems. It also provides dosimetry information. Attention is given to the internal consistancy of the file, energy balance, and the quantitative specification of uncertainties. Comparisons are made with experimental data and previous evaluated files. The results of integral tests are described and remaining outstanding problem areas are cited. 107 refs.

Smith, A.B.; Smith, D.L.; Howerton, R.J.

1985-03-01T23:59:59.000Z

357

File:Drillinghandbook.pdf | Open Energy Information  

Open Energy Info (EERE)

source History View New Pages Recent Changes All Special Pages Semantic SearchQuerying Get Involved Help Apps Datasets Community Login | Sign Up Search File Edit History Facebook...

358

Surveyor / Gadzooks File Systems | Argonne Leadership Computing...  

NLE Websites -- All DOE Office Websites (Extended Search)

IntrepidChallengerSurveyor Decommissioning of BGP Systems and Resources Introducing Challenger Quick Reference Guide System Overview Data Transfer Data Storage & File Systems...

359

Intrepid / Challenger / Eureka File Systems | Argonne Leadership...  

NLE Websites -- All DOE Office Websites (Extended Search)

IntrepidChallengerSurveyor Decommissioning of BGP Systems and Resources Introducing Challenger Quick Reference Guide System Overview Data Transfer Data Storage & File Systems...

360

1997 RECS Public Use Data Files Page  

U.S. Energy Information Administration (EIA)

Lights, Doors, Windows, and Insulation: Data File (Size - 917 kilobytes) Date Released: 11-22-99: Codebook (Size - 49 kilobytes) Date Released: 11-22-99 ...

Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Enterprise Cyber Security Posture  

Science Conference Proceedings (OSTI)

... to enable organizations to transform uncertainties into ... org/issues- research/telecom/security-breach-notification ... systems C. Cyber-physical systems ...

2013-04-10T23:59:59.000Z

362

Hazardous Material Security (Maryland)  

Energy.gov (U.S. Department of Energy (DOE))

All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

363

Nevada National Security Site  

NLE Websites -- All DOE Office Websites (Extended Search)

of nuclear weapons and storing special nuclear materials. Other activities include environmental management, national security response, and defense and civil technologies....

364

Security - Identification Badges  

Science Conference Proceedings (OSTI)

Security - Identification Badges. All doors to the Child Care Center are locked at all times and access is via the card reader system only. ...

2013-08-15T23:59:59.000Z

365

Seamless and Secure Mobility  

Science Conference Proceedings (OSTI)

... layer techniques and the use of advanced measurement in order to accurately assess and manage the performance and security characteristics of ...

2013-11-27T23:59:59.000Z

366

security blunders (INMM 2010)  

NLE Websites -- All DOE Office Websites (Extended Search)

OF SECURITY BLUNDERS Roger G. Johnston and Jon S. Warner Vulnerability Assessment Team Nuclear Engineering Division Argonne National Laboratory 9700 S. Cass Ave, Building 206,...

367

DOC Information System Security Conference on Innovating ...  

Science Conference Proceedings (OSTI)

... B. Walsh, Acting Director, Cyber Security Program, Department of Homeland Security. ... R. Clark, Senior Advisor National and Cyber Security, DOC. ...

2013-06-28T23:59:59.000Z

368

National Nuclear Security Administration Overview | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nuclear Security Administration Overview National Nuclear Security Administration Overview National Nuclear Security Administration Overview More Documents & Publications National...

369

SECURITY TERMINATION STATEMENT | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

SECURITY TERMINATION STATEMENT SECURITY TERMINATION STATEMENT Form provides an individual's statement in connection with the termination of access authorization (security...

370

Annual Security Report October 2012  

E-Print Network (OSTI)

1 Annual Security Report October 2012 Mission Statement The Campus Security and Parking Services Department ("Security") exists to provide a secure and welcoming research, educational, and work environment in which security concerns are balanced with freedom of movement in an open campus atmosphere while

Goddard III, William A.

371

Dumb Ideas in Computer Security  

E-Print Network (OSTI)

Dumb Ideas in Computer Security Dr Charles P Pfleeger Pfleeger Consulting Group 19 July 2011 chuck Security" (2005) http://www.ranum.com/security/computer_security/editorials/dumb/ Default permit Ideas in Computer Security 219 Jul 2011 #12;Struck a Nerve Results 1-10 of about 2,030,000 for dumb

372

Security and Cyber Evaluations - Guidance Documents  

NLE Websites -- All DOE Office Websites (Extended Search)

Guidance Documents Security and Cyber Evaluations Security Evaluations Appraisal Process Guide, April 2008 Cyber Security Evaluations Appraisal Process Guide, April 2008 Security...

373

Integrated Security System | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Integrated Security System Integrated Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems...

374

Nevada National Security Site | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nevada National Security Site Nevada National Security Site Nevada National Security Site | October 2011 Control Point Nevada National Security Site | October 2011 Control Point...

375

Headquarters Facilities Master Security Plan | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Headquarters Facilities Master Security Plan Headquarters Facilities Master Security Plan Welcome to the 2013 version of the Headquarters Facilities Master Security...

376

Physical Security Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Oversight Security & Cyber Evaluations Security and Cyber Guidance Physical Security Reports Physical Security Reports 2012 (U) Pantex Plant Protective Force Response...

377

Tag: Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Global Security Tag: Global Security Displaying 1 - 10 of 61... Category: Global Security Ultrasonic cleaner cuts costs, enhances safety The process of upgrading an old cleaning unit revealed how things were once done and the advances that have followed. More... Category: Global Security Well Logging Security Initiatives GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the security of these sources worldwide. More... Category: Global Security Y-12 Receives Two R&D 100 Awards Engineers at the National Nuclear Security Administration's Y-12 National Security Complex have won two R&D 100 Awards. More... Category: Global Security Y-12 researchers garner R&D 100 awards A research chemist and his revolutionary cloth invented to clean surfaces

378

Organizing and managing personal electronic files: A mechanical engineer's perspective  

Science Conference Proceedings (OSTI)

This article deals with the organization and management of the computer files handled by mechanical engineers on their personal computers. In engineering organizations, a wide variety of electronic files (documents) are necessary to support both business ... Keywords: Engineers, directory and file naming conventions, file sharing and file recognition and recall, information management

B. J. Hicks; A. Dong; R. Palmer; H. C. Mcalpine

2008-09-01T23:59:59.000Z

379

Secure video communications system  

DOE Patents (OSTI)

A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

Smith, Robert L. (Idaho Falls, ID)

1991-01-01T23:59:59.000Z

380

The Office of Nuclear Safeguards and Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Safeguards and Security | National Nuclear Security Safeguards and Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The Office of Nuclear Safeguards and Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security > The Office of Nuclear Safeguards and Security The Office of Nuclear Safeguards and Security

Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... and Space Administration, the National Security Agency, the Department of Energy, the US Office of Management and Budget, the Social Security ...

382

Well Logging Security Initiatives | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Well Logging Security ... Well Logging Security Initiatives The mp4 video format is not supported by this browser. Download video Captions: On Watch as GTRI demonstrates the threat...

383

Berkeley Lab Cyber Security - Cyber Security Website - Berkeley...  

NLE Websites -- All DOE Office Websites (Extended Search)

Department of Energy logo Phone Book Jobs Search Contact Us About CPIC Intranet Cyber Home Resources Training Requirements Search Cyber Security Cyber Security Website FAQs...

384

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... NIST Computer Security Division is Proud to Announce the Release of DRAFT NISTIR 7298, Revision 2: NIST Glossary of Key Information Security ...

385

Security and Training | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Training Security and Training Instability in parts of the world and increased terrorist activities worldwide intensify security concerns in protecting personnel, materials and...

386

From National Security to Environmental Security: A Historical Overview .  

E-Print Network (OSTI)

??The study attempts to provide a historical approach to the role of the environment in security studies. Contemporary security challenges have shown that the narrow… (more)

Vella, Andre`

2012-01-01T23:59:59.000Z

387

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... To receive email notification(s) when new security publications are released, subscribe to the CSRC Publications Mailing List. ... NIST Security Events. ...

388

Connecting to the Internet Securely: Windows 2000 CIAC-2321  

SciTech Connect

As the threat to computer systems increases with the increasing use of computers as a tool in daily business activities, the need to securely configure those systems becomes more important. There are far too many intruders with access to the Internet and the skills and time to spend compromising systems to not spend the time necessary to securely configure a system. Hand-in-hand with the increased need for security are an increased number of items that need to be securely configured. Windows 2000 has about seven hundred security related policy settings, up from seventy two in Windows NT. While Windows 2000 systems are an extension of the Windows NT 4 architecture, there are considerable differences between these two systems, especially in terms of system and security administration. Operational policy, system security, and file security are other areas where Windows 2000 has expanded considerably beyond the domain model of Windows NT 4. The Windows NT 4 Domain model consists of domains of workstations that, with a single login, share resources and are administered together. The database of user settings and credentials resides in the domain server. Domains can trust other domains to expand the sharing of resources between users of multiple domains. On Windows 2000, the domains still exist but multiple domains that share trust are combined into Domain Trees and Domain Forests depending on how the logical namespace is divided. These trees and forests are combined under a new object called Active Directory. Domains themselves are broken down into Organizational Units. As such, there are more levels at which security policies can be set and for which information sharing can be controlled.

Orvis, W; Call, K; Dias, J

2002-03-12T23:59:59.000Z

389

Noncontiguous locking techniques for parallel file systems  

Science Conference Proceedings (OSTI)

Many parallel scientific applications use high-level I/O APIs that offer atomic I/O capabilities. Atomic I/O in current parallel file systems is often slow when multiple processes simultaneously access interleaved, shared files. Current atomic I/O solutions ...

Avery Ching; Wei-keng Liao; Alok Choudhary; Robert Ross; Lee Ward

2007-11-01T23:59:59.000Z

390

File:USFWSList.pdf | Open Energy Information  

Open Energy Info (EERE)

USFWSList.pdf USFWSList.pdf Jump to: navigation, search File File history File usage Metadata File:USFWSList.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Go to page 1 2 3 4 5 Go! next page β†’ next page β†’ Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 79 KB, MIME type: application/pdf, 5 pages) Summary US Fish and Wildlife Service Species List - Salt Wells Geothermal Drilling Project EA Licensing PD This file has been released into the public domain by the copyright holder, its copyright has expired, or it is ineligible for copyright. This applies worldwide. File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 12:43, 17 July 2013 Thumbnail for version as of 12:43, 17 July 2013 1,275 Γ— 1,650, 5 pages (79 KB) Agentile (Talk | contribs) US Fish and Wildlife Service Species List - Salt Wells Geothermal Drilling Project EA

391

File:AEOearlyrelease.pdf | Open Energy Information  

Open Energy Info (EERE)

AEOearlyrelease.pdf AEOearlyrelease.pdf Jump to: navigation, search File File history File usage File:AEOearlyrelease.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Go to page 1 2 3 4 5 6 7 8 9 10 11 12 Go! next page β†’ next page β†’ Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 254 KB, MIME type: application/pdf, 12 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 13:37, 27 April 2011 Thumbnail for version as of 13:37, 27 April 2011 1,275 Γ— 1,650, 12 pages (254 KB) Graham7781 (Talk | contribs) 15:18, 20 April 2011 Thumbnail for version as of 15:18, 20 April 2011 1,275 Γ— 1,650, 12 pages (254 KB) Graham7781 (Talk | contribs) You cannot overwrite this file.

392

LOGJAM: a scalable unified log file archiver  

Science Conference Proceedings (OSTI)

Log files are a necessary record of events on any system. However, as systems scale, so does the volume of data captured. To complicate matters, this data can be distributed across all nodes within the system. This creates challenges in ways to obtain ... Keywords: archiving, log files, system management

Nicholas P. Cardo

2011-11-01T23:59:59.000Z

393

Frugal storage for cloud file systems  

Science Conference Proceedings (OSTI)

Enterprises are moving their IT infrastructure to cloud service providers with the goal of saving costs and simplifying management overhead. One of the critical services for any enterprise is its file system, where users require real-time access to files. ... Keywords: caching, cloud computing, storage, storage cost

Krishna P.N. Puttaswamy; Thyaga Nandagopal; Murali Kodialam

2012-04-01T23:59:59.000Z

394

Security Assistance | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Assistance Security Assistance Security Assistance Welcome to Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal

395

Evaluating mobile agent platform security  

Science Conference Proceedings (OSTI)

Agent mobility requires additional security standards. While the theoretical aspects of mobile agent security have been widely studied, there are few studies about the security standards of current agent platforms. In this paper, test cases are proposed ...

Axel Bόrkle; Alice Hertel; Wilmuth Mόller; Martin Wieser

2006-09-01T23:59:59.000Z

396

UC SECURITY FRAMEWORK 2011 -2012  

E-Print Network (OSTI)

1 UC SECURITY FRAMEWORK 2011 - 2012 #12;2 Contents Background..................................................................................................................................4 About UC Security & Campus Community Support .................................................................5 Security Service Authority and Relationship with NZ Police and Emergency Services ...........5

Hickman, Mark

397

The security of machine learning  

E-Print Network (OSTI)

of the IEEE symposium on security and privacy (pp. 188–201).and communications security (CCS) (pp. 59–68). Globerson,detection. In USENIX security symposium. Klimt, B. , & Yang,

Barreno, Marco; Nelson, Blaine; Joseph, Anthony D.; Tygar, J. D.

2010-01-01T23:59:59.000Z

398

January 2005 INTEGRATING IT SECURITY  

E-Print Network (OSTI)

January 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS By Joan S. Hash, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Introduction To assist federal agencies with effec tively integrating security

399

Securing Control Systems Modems  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Recommended Practice for Securing Recommended Practice for Securing Control System Modems January 2008 iii ABSTRACT This paper addresses an often overlooked "backdoor" into critical infrastructure control systems created by modem connections. A modem's connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods. iv ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland

400

International Nuclear Security  

SciTech Connect

This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

Doyle, James E. [Los Alamos National Laboratory

2012-08-14T23:59:59.000Z

Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

PRIVACY/SECURITY NOTICE  

NLE Websites -- All DOE Office Websites (Extended Search)

PRIVACY/SECURITY NOTICE PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system employs software programs to monitor network traffic to identify unauthorized activities. By accessing this Web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized

402

Secure Contexts (Extended Abstract)  

E-Print Network (OSTI)

Information flow security in a multilevel system aims at guaranteeing that no high level information is revealed to low levels. A usual requirement to ensure information flow security for a process is that no generic attacker can induce a high-to-low information flow. This requirement is too demanding when we have some knowledge about the contexts where the process is going to run. To deal with these situations we introduce the notion of secure contexts for a process. The notion is parametric with respect to both the observational equivalence and the operation used to characterize the low level behavior. In the paper we mainly analyze the cases of bisimulation and trace equivalence. We describe how to build secure contexts in these cases and we show that two well-known security properties, BNDC and NDC, are just special instances of our general notion.

Annalisa Bossi; Damiano Macedonio; Carla Piazza; Sabina Rossi

2003-01-01T23:59:59.000Z

403

Indirection and computer security.  

SciTech Connect

The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

Berg, Michael J.

2011-09-01T23:59:59.000Z

404

MEPleRANDUM TO: FILE  

Office of Legacy Management (LM)

MEPleRANDUM MEPleRANDUM ( TO: FILE , , ------ --------iS"I;=~:ta,,,-;onFa;tedl/~~-r*z .-+a~* & 0 no; TYV= OF CP==ATION ---=-------aY----- 0 8:esearch & Develoyent B Facility Type Q Other information

405

BEM~RANDu~~ TO: FILE  

Office of Legacy Management (LM)

BEM~RANDu~~ BEM~RANDu~~ TO: FILE FROM: a. Rq- -__-----_- -_--- SUBJECT: cl;-; nAC; a-.. & ~3 -+.e-&&& SITE NAHE: CITY: M; /L-)-J L ce --_--__---__-~_~~~_-~~~~~~ STATE: WE -----_ OWNER(S) ------_- Past: ------------------------ Current: --_----_--_--------------- Owner ctx-atacted 0 yes 0 no) if ye8, date contacted ---__-------- TYPE OF OPERATION -_-__--_--_--_--_ 0 Research & Development w Facility Type 0 Production scale testing 0 Pilot Scale 0 Manufacturing (3 Bench Scale Process 0 University i Theoretical Studies 0 Research Organization 0 Governments Spans red Facility Sample 84 Analysir W Other --L%%z!k------~~-~ A.- 0 Production & Jrccj- dx& 0 Disposal/Storage 0 Prime 0 Subcontract& 0 Purchase Order cl Other information (i.e., cost

406

MEMORANDU TO: FILE FHOM: SUBJECT:  

Office of Legacy Management (LM)

' .- _. I _ ' ' .- _. I _ ' 1.3 7 -3 , MEMORANDU TO: FILE FHOM: SUBJECT: Curre"t: Ll&k&&d ________ l- ; if yes, date contacted ___ 0 Production scale testing Cl Pilot Scale 0 Bench Scale Process 0 Theoretical Studies 0 Sample & Analysis 0 Production 0 Disposal /Storage TYPE OF CONTRACT --------------_- 0 Prime 13 Subcontract& 0 Purchase Order 0 Cl Facility Type 0 Manufacturing 0 University 0 Research Organization *i Government Sponsored Facility 0 Other --------------_-----_ Other information (i.e., cost + fixed fee, unit price, time & material, qtc) --------------------~~------ OWNERSHIP: AEC/UED AEWUED GOUT GOUT CONTRACTOR CONTRACTOR OWN!3 LEAS!32 @!NE_D LEEsE_n OWNED --_----___ --LEEEI) LANDS D 0 BUILDINGS EQUIPMENT : : cl 0

407

MEtlORANDUM TO: FILE  

Office of Legacy Management (LM)

\ \ MEtlORANDUM / TO: FILE "ATE--$ SUBJECT: ___ NfiME: ALTERNATE w-------- CITY:J!M ------------------ST~~=-i-!-~~- P Pest:-___----_____--______,__ Current: -----_-~~----~~~~~-------- Owner contacted 0 yes q no3 if yes, date contacted TYPE OF OPERATION ----------------- 0 Research & Development q Facility Type 0 Production scale testing 0 Pilot Scale q rlanuf ecturing 0 Bench Scale Process q University 0 Theor&i&l Studies 0 Research Organization 0 Sample & 'Anal*sis 0 Government Sponsored Facility M Other / -LLp&-+ ------- --- 0 Production ==~-++@L _ Cl Disposal/Storage d&&u IY!?~AELE!I~n_CI . - ~. .; 0 Prime 0 Subcontract& 0 Purchase Order 0 Other information (i.e., cost + fixed fee, unit price, time 84 material, etc)

408

Core File Settings | Argonne Leadership Computing Facility  

NLE Websites -- All DOE Office Websites (Extended Search)

Core File Settings Core File Settings The following environment variables control core file creation and contents. Specify regular (non-script) jobs using the qsub argument --env (Note: two dashes). Specify script jobs (--mode script) using the --envs (Note: two dashes) or --exp_env (Note: two dashes) options of runjob. For additional information about setting environment variables in your job, visit http://www.alcf.anl.gov/user-guides/running-jobs#environment-variables. Generation The following environment variables control conditions of core file generation and naming: BG_COREDUMPONEXIT=1 Creates a core file when the application exits. This is useful when the application performed an exit() operation and the cause and location of the exit() is not known. BG_COREDUMPONERROR=1

409

SCADA system security, complexity, and security proof  

Science Conference Proceedings (OSTI)

Modern Critical infrastructures have command and control systems. These command and control systems are commonly called supervisory control and data acquisition (SCADA). In the past, SCADA system has a closed operational environment, so these systems ... Keywords: 11770-2 mechanism 9, Formal security poof, SCADA, key management

Reda Shbib; Shikun Zhou; Khalil Alkadhimi

2012-11-01T23:59:59.000Z

410

Remote PC Security: Securing the home worker  

Science Conference Proceedings (OSTI)

A recent study of 1000 teleworkers in 10 countries, commissioned by Cisco, showed that one in five allows friends, family and others to use their work PC to access the Internet. Now is the time to pull stray remote workers back into the security fold. ...

Steven Furnell

2006-11-01T23:59:59.000Z

411

Office of Security Operations: Headquarters Security Officers (HSO) Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Officers (HSO) Program Headquarters Security Officers (HSO) Program Responsible Individual/Contact: Wayne Berkebile - (301) 903-1163 - D-320 Scope: The Headquarters Security Officer (HSO) Program was established in 1990 by the Under Secretary of Energy in order to improve communications between the Office of Headquarters Security Operations and component organizations within DOE Headquarters. It is governed by DOE Headquarters Order 472.1, Headquarters Security Officer Program, dated 3-19-2010. Each Headquarters element is required to appoint at least one HSO and an Alternate HSO. HSOs perform a wide variety of security-related functions within their element such as obtaining security badges and clearances, maintaining Security Areas, acquiring security equipment, implementing procedures for protecting classified and sensitive information, conducting security inquiries, and arranging for required security services.

412

File:08AKATransmission.pdf | Open Energy Information  

Open Energy Info (EERE)

AKATransmission.pdf AKATransmission.pdf Jump to: navigation, search File File history File usage File:08AKATransmission.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 24 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 15:01, 11 January 2013 Thumbnail for version as of 15:01, 11 January 2013 1,275 Γ— 1,650 (24 KB) Dfitzger (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following page links to this file: GRR/Section 8-AK-a - Transmission Retrieved from "http://en.openei.org/w/index.php?title=File:08AKATransmission.pdf&oldid=57856

413

File:Denver Basin.pdf | Open Energy Information  

Open Energy Info (EERE)

Basin.pdf Basin.pdf Jump to: navigation, search File File history File usage File:Denver Basin.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 625 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 11:00, 4 March 2013 Thumbnail for version as of 11:00, 4 March 2013 1,275 Γ— 1,650 (625 KB) Alevine (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file. Retrieved from "http://en.openei.org/w/index.php?title=File:Denver_Basin.pdf&oldid=5897

414

File:PublicNoticeApplicabilitytbl.pdf | Open Energy Information  

Open Energy Info (EERE)

PublicNoticeApplicabilitytbl.pdf PublicNoticeApplicabilitytbl.pdf Jump to: navigation, search File File history File usage Metadata File:PublicNoticeApplicabilitytbl.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 50 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 15:40, 14 June 2013 Thumbnail for version as of 15:40, 14 June 2013 1,275 Γ— 1,650 (50 KB) Apalazzo (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file. Metadata This file contains additional information, probably added from the digital

415

File:06UTATransportation.pdf | Open Energy Information  

Open Energy Info (EERE)

UTATransportation.pdf UTATransportation.pdf Jump to: navigation, search File File history File usage File:06UTATransportation.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 29 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 12:16, 30 August 2012 Thumbnail for version as of 12:16, 30 August 2012 1,275 Γ— 1,650 (29 KB) Jnorris (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following page links to this file: GRR/Section 6-UT-a - Transportation Retrieved from "http://en.openei.org/w/index.php?title=File:06UTATransportation.pdf&oldid=509115

416

File:TCEQ-20425.pdf | Open Energy Information  

Open Energy Info (EERE)

20425.pdf 20425.pdf Jump to: navigation, search File File history File usage Metadata File:TCEQ-20425.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 19 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 09:13, 10 July 2013 Thumbnail for version as of 09:13, 10 July 2013 1,275 Γ— 1,650 (19 KB) Abergfel (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file. Metadata This file contains additional information, probably added from the digital

417

File:GWS-31.pdf | Open Energy Information  

Open Energy Info (EERE)

pdf pdf Jump to: navigation, search File File history File usage Metadata File:GWS-31.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Go to page 1 2 Go! next page β†’ next page β†’ Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 126 KB, MIME type: application/pdf, 2 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 11:48, 15 March 2013 Thumbnail for version as of 11:48, 15 March 2013 1,275 Γ— 1,650, 2 pages (126 KB) Alevine (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file. Metadata This file contains additional information, probably added from the digital

418

File:03IDDIndustrialLease.pdf | Open Energy Information  

Open Energy Info (EERE)

IDDIndustrialLease.pdf IDDIndustrialLease.pdf Jump to: navigation, search File File history File usage File:03IDDIndustrialLease.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 24 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 18:37, 25 October 2012 Thumbnail for version as of 18:37, 25 October 2012 1,275 Γ— 1,650 (24 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following page links to this file: GRR/Flowcharts Retrieved from "http://en.openei.org/w/index.php?title=File:03IDDIndustrialLease.pdf&oldid=530956"

419

File:TCEQ-10202.pdf | Open Energy Information  

Open Energy Info (EERE)

02.pdf 02.pdf Jump to: navigation, search File File history File usage Metadata File:TCEQ-10202.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 29 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 09:15, 10 July 2013 Thumbnail for version as of 09:15, 10 July 2013 1,275 Γ— 1,650 (29 KB) Abergfel (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file. Metadata This file contains additional information, probably added from the digital

420

File:ExpeditedReview.pdf | Open Energy Information  

Open Energy Info (EERE)

ExpeditedReview.pdf ExpeditedReview.pdf Jump to: navigation, search File File history File usage File:ExpeditedReview.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 64 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 18:20, 19 November 2012 Thumbnail for version as of 18:20, 19 November 2012 1,275 Γ— 1,650 (64 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file. Retrieved from "http://en.openei.org/w/index.php?title=File:ExpeditedReview.pdf&oldid=538274

Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

File:Ger geothermal form 1.pdf | Open Energy Information  

Open Energy Info (EERE)

File File Edit History Facebook icon Twitter icon Β» File:Ger geothermal form 1.pdf Jump to: navigation, search File File history File usage Metadata File:Ger geothermal form 1.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Go to page 1 2 3 Go! next page β†’ next page β†’ Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 67 KB, MIME type: application/pdf, 3 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 10:26, 25 October 2013 Thumbnail for version as of 10:26, 25 October 2013 1,275 Γ— 1,650, 3 pages (67 KB) Abergfel (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information)

422

File:TCEQ-10204.pdf | Open Energy Information  

Open Energy Info (EERE)

TCEQ-10204.pdf TCEQ-10204.pdf Jump to: navigation, search File File history File usage Metadata File:TCEQ-10204.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 79 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 12:07, 2 July 2013 Thumbnail for version as of 12:07, 2 July 2013 1,275 Γ— 1,650 (79 KB) Abergfel (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file. Metadata This file contains additional information, probably added from the digital

423

File:03ORCEncroachment.pdf | Open Energy Information  

Open Energy Info (EERE)

ORCEncroachment.pdf ORCEncroachment.pdf Jump to: navigation, search File File history File usage File:03ORCEncroachment.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 11 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 12:59, 28 September 2012 Thumbnail for version as of 12:59, 28 September 2012 1,275 Γ— 1,650 (11 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following page links to this file: GRR/Flowcharts Retrieved from "http://en.openei.org/w/index.php?title=File:03ORCEncroachment.pdf&oldid=51882

424

File:StandardProcess.pdf | Open Energy Information  

Open Energy Info (EERE)

StandardProcess.pdf StandardProcess.pdf Jump to: navigation, search File File history File usage File:StandardProcess.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 62 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 17:15, 19 November 2012 Thumbnail for version as of 17:15, 19 November 2012 1,275 Γ— 1,650 (62 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file. Retrieved from "http://en.openei.org/w/index.php?title=File:StandardProcess.pdf&oldid=538266

425

A dynamic adjustment strategy for file transformation in data grids  

Science Conference Proceedings (OSTI)

In this paper, we propose a dynamic file transfer scheme with coallocation architecture, called Dynamic Adjustment Strategy, a dynamic file transfer scheme with co-allocation architecture that reduce the file transfer times and improves the performance ...

Chao-Tung Yang; Shih-Yu Wang; Chun-Pin Fu

2007-09-01T23:59:59.000Z

426

Security Suites | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Suites Available by Internet Service Providers Comcast Comcast offers the Norton Security Suite with antivirus and firewall software for your protection, for no additional...

427

Security and Suitability Process Reform  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security and Suitability Process Reform December 2008 Provided by the Joint Security and Suitability Reform Team EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET...

428

Smart-Grid Security Issues  

Science Conference Proceedings (OSTI)

TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

2010-01-29T23:59:59.000Z

429

Privacy/Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy/Security Privacy/Security Privacy/Security Policy This web site is part of a federal computer system used to accomplish federal functions. Read the following important privacy and security information carefully. Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The Department of Energy monitors this web site for security purposes to ensure that it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of 1986 (Pub. L. 99-474) and the National Information Infrastructure Protection Act of 1996 (Pub. L. 104-294), (18 U.S.C. 1030), or other applicable criminal laws.

430

Department of Energy Files Motion to Withdraw Yucca Mountain...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Files Motion to Withdraw Yucca Mountain License Application Department of Energy Files Motion to Withdraw Yucca Mountain License Application March 3, 2010 - 12:00am Addthis...

431

Application Filing Requirements for Natural Gas Pipeline Construction...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

You are here Home Savings Application Filing Requirements for Natural Gas Pipeline Construction Projects (Wisconsin) Application Filing Requirements for Natural Gas...

432

T-656: Microsoft Office Visio DXF File Handling Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability June 28,...

433

PARS II CPP Upload Template File | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

File PARS II CPP Upload Template File DPMIS091110OECMCompleteProjectTemplate.zip More Documents & Publications Microsoft Word - PARS II CPP Upload Requirements.docx...

434

How Do You File A Whistleblower Complaint? | National Nuclear...  

National Nuclear Security Administration (NNSA)

Do You File A Whistleblower Complaint? Home > About Us > Our Operations > Management and Budget > Whistleblower Program > How Do You File A Whistleblower Complaint? How Do You...

435

DOE Releases Filing Instructions for Federal Risk Insurance for...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Filing Instructions for Federal Risk Insurance for New Nuclear Power Plants DOE Releases Filing Instructions for Federal Risk Insurance for New Nuclear Power Plants December 21,...

436

V-117: Symantec Enterprise Vault for File System Archiving Unquoted...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Symantec Enterprise Vault for File System Archiving Unquoted Search Path Lets Local Users Gain Elevated Privileges V-117: Symantec Enterprise Vault for File System Archiving...

437

Home Network Security  

E-Print Network (OSTI)

Home computers that are connected to the Internet are under attack and need to be secured. That process is relatively well understood, even though we do not have perfect solutions today and probably never will. Meanwhile, however, the home computing environment is evolving into a home network of multiple devices, which will also need to be secured. We have little experience with these new home networks and much research needs to be done in this area. This paper gives a view of the requirements and some of the techniques available for securing home networks.

Technology Journal Interoperable; Carl M. Ellison; Corporate Technology Group; Intel Corporation

2002-01-01T23:59:59.000Z

438

Federal Computer Security Program Managers' Forum (Forum ...  

Science Conference Proceedings (OSTI)

Federal Computer Security Program Managers' Forum. Summary: The Federal Computer Security Program Managers' Forum ...

2013-01-15T23:59:59.000Z

439

Global Nuclear Security Technology Division (GNSTD)  

NLE Websites -- All DOE Office Websites (Extended Search)

Systems Nonproliferation Technology Nuclear Material Detection & Characterization Nuclear Security Advanced Technologies Safeguards & Security Technology Threat Reduction...

440

Federal Information Systems Security Educators' Association ...  

Science Conference Proceedings (OSTI)

Federal Information Systems Security Educators' Association (FISSEA). Summary: The Federal Information Systems Security ...

2013-01-15T23:59:59.000Z

Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Border Gateway Protocol - Robustness and Security  

Science Conference Proceedings (OSTI)

Border Gateway Protocol - Robustness and Security. Summary: This project focuses on Robustness, Security, and Scalability ...

2012-05-03T23:59:59.000Z

442

NIST Highlight about workshop on homeland security ...  

Science Conference Proceedings (OSTI)

Workshop on Homeland Security Standards. On ... Related Links: ANSI Homeland Security Standards Panel. Contact. General ...

2011-12-14T23:59:59.000Z

443

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Risks posters; National Security Agency Counterintelligence Awareness (301-688-6535); Native Intelligence, Inc. Rainbow ...

444

SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card  

E-Print Network (OSTI)

SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card Applying for a Social Security Card is easy AND it is FREE! If you DO NOT follow these instructions, we CANNOT process your and evidence to any Social Security office. Follow instructions below. HOW TO COMPLETE THE APPLICATION Most

Li, Mo

445

Safety and Security What do Safety/Security work with?  

E-Print Network (OSTI)

Safety and Security on campus #12;Agenda Β· What do Safety/Security work with? Β· If something happens Β· Opening hours Β· Remember Β· Website Β· How to find us #12;The Section for Safety and Security work with; Β· Security revolving work environment Β· Handle locks, keys, alarms, surveillance Β· Responsible

446

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY  

E-Print Network (OSTI)

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION Services #12;28 00 00 ELECTRONIC SAFETY AND SECURITY August 8, 2011 2 THE UNIVERSITY OF TEXAS AT AUSTIN ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION AND COMMISSIONING GUIDE PART 1 - GENERAL 1.1 NOTICE

Texas at Austin, University of

447

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY  

E-Print Network (OSTI)

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION Services #12;28 00 00 ELECTRONIC SAFETY AND SECURITY May 1, 2013 2 THE UNIVERSITY OF TEXAS AT AUSTIN ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION AND COMMISSIONING GUIDE PART 1 - GENERAL 1.1 NOTICE

Texas at Austin, University of

448

File:Mmpa.pdf | Open Energy Information  

Open Energy Info (EERE)

Mmpa.pdf Mmpa.pdf Jump to: navigation, search File File history File usage File:Mmpa.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Go to page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 Go! next page β†’ next page β†’ Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 581 KB, MIME type: application/pdf, 113 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment

449

File:Handbook.pdf | Open Energy Information  

Open Energy Info (EERE)

Handbook.pdf Handbook.pdf Jump to: navigation, search File File history File usage File:Handbook.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Go to page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 Go! next page β†’ next page β†’ Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 4.49 MB, MIME type: application/pdf, 93 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 12:57, 14 November 2012 Thumbnail for version as of 12:57, 14 November 2012 1,275 Γ— 1,650, 93 pages (4.49 MB) Dklein2012 (Talk | contribs)

450

Transportation and Energy Use Data Files  

U.S. Energy Information Administration (EIA) Indexed Site

Data Files Data Files Transportation and Energy Use Data Files Data from the last two Residential Transportation Energy Consumption Surveys are available on-line. These data include fuel consumption and expenditures, vehicle-miles traveled, vehicle characteristics, and household characteristics from national samples of over 3,000 households. To protect respondent confidentiality, these data files do not contain any information which could be used to identify individual households. The lowest level of geographic detail provided is the Census Division (a grouping of 3 to 5 States.) 1994 RTECS Public Use Data 1991 RTECS Public Use Data 1994 RTECS Public Use Data The data from the 1994 RTECS is distributed in dBase and ASCII formats. The data in each set has been compressed using PKZIP. After downloading either the ASCII or dBase set, place the downloaded file in a separate directory and expand it using pkunzip. If you don't have pkunzip.exe, you can download that package here. PKUNZIP.EXE is in PKZ204g.exe. PKUNZIP.EXE is the only file you need, but the developers of the product have asked that the entire package be distributed and not the individual files. You can however find pkunzip.exe on several other Internet sites. If you download PKZ204g.exe to a separate directory, type PKZ204g and press ENTER.

451

File:Consultants.pdf | Open Energy Information  

Open Energy Info (EERE)

Consultants.pdf Consultants.pdf Jump to: navigation, search File File history File usage File:Consultants.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Go to page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 Go! next page β†’ next page β†’ Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 454 KB, MIME type: application/pdf, 108 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 11:39, 20 November 2012 Thumbnail for version as of 11:39, 20 November 2012 1,275 Γ— 1,650, 108 pages (454 KB) Dklein2012 (Talk | contribs)

452

File:Primer.pdf | Open Energy Information  

Open Energy Info (EERE)

Primer.pdf Primer.pdf Jump to: navigation, search File File history File usage File:Primer.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Go to page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 Go! next page β†’ next page β†’ Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 5.11 MB, MIME type: application/pdf, 116 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment

453

File:Windyclassroom.pdf | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search File Edit History Facebook icon Twitter icon Β» File:Windyclassroom.pdf Jump to: navigation, search File File history File usage Metadata File:Windyclassroom.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Go to page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 Go! next page β†’ next page β†’ Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 21.47 MB, MIME type:

454

File:Marcelluswatermgmt.pdf | Open Energy Information  

Open Energy Info (EERE)

Marcelluswatermgmt.pdf Marcelluswatermgmt.pdf Jump to: navigation, search File File history File usage File:Marcelluswatermgmt.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Go to page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 Go! next page β†’ next page β†’ Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 1.91 MB, MIME type: application/pdf, 59 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 15:52, 9 February 2012 Thumbnail for version as of 15:52, 9 February 2012 1,275 Γ— 1,650, 59 pages (1.91 MB) Graham7781 (Talk | contribs)

455

T-577: Security Advisory for Adobe Flash Player, Adobe Reader and Acrobat |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Security Advisory for Adobe Flash Player, Adobe Reader and 7: Security Advisory for Adobe Flash Player, Adobe Reader and Acrobat T-577: Security Advisory for Adobe Flash Player, Adobe Reader and Acrobat March 14, 2011 - 4:05pm Addthis PROBLEM: There are reports that this vulnerability is being exploited in the wild in targeted attacks via a Flash (.swf) file embedded in a Microsoft Excel (.xls) file delivered as an email attachment. PLATFORM: Windows, Macintosh, Linux and Solaris ABSTRACT: A critical vulnerability exists in Adobe Flash Player 10.2.152.33 and earlier versions (Adobe Flash Player 10.2.154.13 and earlier for Chrome users) for Windows, Macintosh, Linux and Solaris operating systems, Adobe Flash Player 10.1.106.16 and earlier versions for Android, and the Authplay.dll component that ships with Adobe Reader and Acrobat X (10.0.1)

456

National Security Information Systems (NSIS) -National Security Systems &  

NLE Websites -- All DOE Office Websites (Extended Search)

NSSA: National Security Information Systems NSSA: National Security Information Systems Nonproliferation & National Security (NPNS) Overview Technical Nonproliferation Policy Support Strategic Trade Control Review of export license applications Multilateral Export Control Arrangements Interdiction Engagement & Training INECP INSEP GIPP Safeguards Concepts and Approaches Human Capital Development Additional Protocol Technical Assistance National Security Systems & Assessments National Security Information Systems Vulnerability Assessment Team (VAT) Radiation Detection & Response (RDR) Contact NPNS Other Major Programs Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE Division on Flickr Nonproliferation and National Security Program National Security Systems & Assessments

457

T-531: The WebVPN implementation on Cisco Adaptive Security Appliances  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-531: The WebVPN implementation on Cisco Adaptive Security T-531: The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 T-531: The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 January 10, 2011 - 8:33pm Addthis PROBLEM: The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.2(3) PLATFORM: Listed Vunerable Platform Details ABSTRACT: The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.2(3) permits the viewing of CIFS shares even when CIFS file browsing has been disabled, which allows remote authenticated users to bypass intended access restrictions via CIFS requests, aka Bug ID CSCsz80777. reference LINKS: CVE Vulnerability Details: CVE-2010-4680 NIST Vulnerability Summary for CVE-2010-4680

458

T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement  

NLE Websites -- All DOE Office Websites (Extended Search)

712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and 712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update September 8, 2011 - 10:30am Addthis PROBLEM: A flaw was discovered in Cumin where it would log broker authentication credentials to the Cumin log file. A vulnerability was reported in Red Hat Enterprise MRG Grid. A local user can access the broker password. PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 5) ABSTRACT: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update. reference LINKS: RHSA-2011:1249-1 SecurityTracker Alert ID: 1026021 CVE-2011-2925 IMPACT ASSESSMENT: Medium Discussion: A local user exploiting this flaw could connect to the broker outside of Cumin's control and perform certain operations such as scheduling jobs,

459

PSH-12-0103 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PSH-12-0103 - In the Matter of Personnel Security Hearing PSH-12-0103 - In the Matter of Personnel Security Hearing PSH-12-0103 - In the Matter of Personnel Security Hearing On November 5, 2012, an OHA Hearing Officer issued a decision in which he concluded that access authorization should not be granted to an individual. A Local Security Office denied access authorization to the individual because she demonstrated financial irresponsibility through (1) failing to file federal and state income taxes for seven years, Tax Year (TY) 2004 through TY 2010; (2) accruing unpaid federal tax liability of $37,619.37 and unpaid state tax liability of $6,885.00; and (3) claiming nine tax withholding allowances when she knew she should only claim one. Her behavior raised security concerns under Criterion L. After conducting a hearing and evaluating the

460

TSO-1108 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TSO-1108 - In the Matter of Personnel Security Hearing TSO-1108 - In the Matter of Personnel Security Hearing TSO-1108 - In the Matter of Personnel Security Hearing The individual is an employee of a DOE contractor and held an access authorization until it was recently suspended. During a routine reinvestigation of the individual, he informed an Office of Personnel Management (OPM) investigator on February 16, 2011, that he had not filed federal or state income tax returns for several years. Exhibit 6 at 13. A Local Security Office (LSO) summoned the individual for an interview (PSI) with a personnel security specialist on June 23, 2011. Exhibit 9. The LSO ultimately determined that derogatory information existed that cast into doubt the individual's eligibility for access authorization. The LSO informed the individual of this determination in a letter that set forth

Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

PSH-12-0123 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

23 - In the Matter of Personnel Security Hearing 23 - In the Matter of Personnel Security Hearing PSH-12-0123 - In the Matter of Personnel Security Hearing On February 15, 2013, an OHA Hearing Officer issued a decision in which he determined that the DOE should not restore an individual's access authorization. As security concerns under 10 CFR Part 710, a Local Security Office cited the individual's filing of a Chapter 7 bankruptcy petition in 2002, and the individual's more recent financial difficulties, including a number of delinquent debts, the largest of which was a $132,489 mortgage balance, payments on which were over 150 days past due. The Hearing Officer found that, while the individual had made some progress toward paying off his prior debts, significant debts remained unpaid, including his mortgage, and the individual had, in addition,

462

Information Security: Coordination of Federal Cyber Security Research and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security: Coordination of Federal Cyber Security Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft of this report, OMB stated that it would review the need for such guidance. Information Security: Coordination of Federal Cyber Security Research and Development More Documents & Publications Networking and Information Technology Research and Development Supplement to the President's Budget (February 2010)

463

Erera, Spring School 2004 Transportation Security  

E-Print Network (OSTI)

! Transportation security research: future #12;Erera, Spring School 2004 Outline ! Understanding transportationErera, Spring School 2004 Transportation Security Alan Erera and Chelsea C. White III Industrial transportation security ! Security regulations and programs ! Transportation security research: present

Erera, Alan

464

SSH - Secure Login Connections over the Internet  

E-Print Network (OSTI)

SSH provides secure login, file transfer, X11, and TCP/IP connections over an untrusted network. It uses cryptographic authentication, automatic session encryption, and integrity protection for transferred data. RSA is used for key exchange and authentication, and symmetric algorithms (e.g., IDEA or threekey triple-DES) for encrypting transferred data. SSH is intended as a replacement for the existing rsh, rlogin, rcp, rdist, and telnet protocols. SSH is currently (March 1996) being used at thousands of sites in at least 50 countries. Its users include top universities, research laboratories, many major corporations, and numerous smaller companies and individuals. The SSH protocol can also be used as a generic transport layer encryption mechanism, providing both host authentication and user authentication, together with privacy and integrity protection. 1 Introduction The Internet has become the most economical means for communication between two remote sites. Its uses include comm...

Tatu Ylonen Ssh; Tatu Ylonen; Tatu Ylonen

1996-01-01T23:59:59.000Z

465

SSH - Secure Login Connections over the Internet  

E-Print Network (OSTI)

SSH provides secure login, file transfer, X11, and TCP/IP connections over an untrusted network. It uses cryptographic authentication, automatic session encryption, and integrity protection for transferred data. RSA is used for key exchange and authentication, and symmetric algorithms (e.g., IDEA or threekey triple-DES) for encrypting transferred data. SSH is intended as a replacement for the existing rsh, rlogin, rcp, rdist, and telnet protocols. SSH is currently (March 1996) being used at thousands of sites in at least 50 countries. Its users include top universities, research laboratories, many major corporations, and numerous smaller companies and individuals. The SSH protocol can also be used as a generic transport layer encryption mechanism, providing both host authentication and user authentication, together with privacy and integrity protection. 1 Introduction The Internet has become the most economical means for communication between two remote sites. Its uses include commun...

Tatu Ylφnen

1996-01-01T23:59:59.000Z

466

Security/Disclaimer  

Office of Scientific and Technical Information (OSTI)

U.S. Department of Energy DOE Green Energy Home & Search About Contact Us Javascript Not Enabled OSTI Security Website Policies and Important Links Some links on this page may take...

467

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

AI~W~~l AI~W~~l 11Vl'~~4 National Nuclear Security Administration Department of Energy National Nuclear Security Administration Nevada Site Office P.O. Box 98518 Las Vegas, NV 89193-8518 JAN! 8 2013 Gregory H. Woods, General Counsel, DOE/HQ (GC-1) FORS NATIONAL NUCLEAR SECURITY ADMINISTRATION NEVADA SITE OFFICE (NNSA/NSO) NATIONAL ENVIRONMENTAL POLICY ACT (NEPA) ANNUAL SUMMARY In accordance with DOE Order 451.1B, National Environmental Policy Act Compliance Program, NNSA/NSO is submitting the enclosed Annual NEP A Planning Summary. The document provides a brief description of ongoing and planned NEP A actions for calendar year 2013. This summary provides information for completion of the Site- Wide Environmental Impact Statement for the Nevada National Security Site and Off-Site Locations in the State of Nevada.

468

National Security, Weapons Science  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security, Weapons Science National Security, Weapons Science /science-innovation/_assets/images/icon-science.jpg National Security, Weapons Science National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Dual-Axis Radiographic Hydrodynamic Test Facility (DARHT) The Dual-Axis Radiographic Hydrodynamic Test Facility at LANL is part of the DOE's stockpile stewardship program. It uses two large X-ray machines to record three-dimensional interior images of materials. In most experiments, materials (including plutonium) undergo hydrodynamic shock to simulate the implosion process in nuclear bombs and/or the effects of severe hydrodynamic stress. The tests are described as "full-scale mockups

469

Internet Security Glossary  

Science Conference Proceedings (OSTI)

This Glossary (191 pages of definitions and 13 pages of references) provides abbreviations, explanations, and recommendations for use of information system security terminology. The intent is to improve the comprehensibility of writing that deals with ...

R. Shirey

2000-05-01T23:59:59.000Z

470

Office of Security Enforcement  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

471

Office of Security Operations  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

472

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Nuclear Security Administration FY 2011 - FY 2015 Budget Outlook Managing the NNSA 4.0% Science, Technology & Engineering 14.5% Stockpile Support 17.9% Preventing the Spread of...

473

Wi-Fi security  

Science Conference Proceedings (OSTI)

"ALL [wireless security] mechanisms are completely in-effective" was the conclusion of a study by the Department of Computer Science at the University of Maryland. This discussion will systematically shed light on the inherent insecurities involved with ...

Paul Williams

2006-04-01T23:59:59.000Z

474

File:03UTCStateEncroachmentOverview.pdf | Open Energy Information  

Open Energy Info (EERE)

UTCStateEncroachmentOverview.pdf UTCStateEncroachmentOverview.pdf Jump to: navigation, search File File history File usage File:03UTCStateEncroachmentOverview.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 25 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 11:13, 30 August 2012 Thumbnail for version as of 11:13, 30 August 2012 1,275 Γ— 1,650 (25 KB) Jnorris (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following 2 pages link to this file: GRR/Flowcharts GRR/Section 3-UT-c - State Encroachment Overview

475

File:Notify98.pdf | Open Energy Information  

Open Energy Info (EERE)

Notify98.pdf Notify98.pdf Jump to: navigation, search File File history File usage File:Notify98.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Go to page 1 2 3 4 5 Go! next page β†’ next page β†’ Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 95 KB, MIME type: application/pdf, 5 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 17:18, 13 November 2012 Thumbnail for version as of 17:18, 13 November 2012 1,275 Γ— 1,650, 5 pages (95 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file. Retrieved from

476

File:3-200-71.pdf | Open Energy Information  

Open Energy Info (EERE)

71.pdf 71.pdf Jump to: navigation, search File File history File usage File:3-200-71.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Go to page 1 2 3 4 5 6 7 8 Go! next page β†’ next page β†’ Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 737 KB, MIME type: application/pdf, 8 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 17:18, 16 October 2012 Thumbnail for version as of 17:18, 16 October 2012 1,275 Γ— 1,650, 8 pages (737 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file. Retrieved from

477

File:06NVCDrinkingWaterPermit.pdf | Open Energy Information  

Open Energy Info (EERE)

6NVCDrinkingWaterPermit.pdf 6NVCDrinkingWaterPermit.pdf Jump to: navigation, search File File history File usage File:06NVCDrinkingWaterPermit.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 45 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 15:59, 15 October 2012 Thumbnail for version as of 15:59, 15 October 2012 1,275 Γ— 1,650 (45 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following page links to this file: GRR/Section 6-NV-c - Drinking Water Permit Retrieved from

478

File:06ORCDrinkingWaterPermit.pdf | Open Energy Information  

Open Energy Info (EERE)

6ORCDrinkingWaterPermit.pdf 6ORCDrinkingWaterPermit.pdf Jump to: navigation, search File File history File usage File:06ORCDrinkingWaterPermit.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 11 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 12:09, 28 September 2012 Thumbnail for version as of 12:09, 28 September 2012 1,275 Γ— 1,650 (11 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following page links to this file: GRR/Section 6-OR-c - Drinking Water Permit Retrieved from

479

File:AlaskaTitleVApplicationSubmittalInstructions.pdf | Open Energy  

Open Energy Info (EERE)

AlaskaTitleVApplicationSubmittalInstructions.pdf AlaskaTitleVApplicationSubmittalInstructions.pdf Jump to: navigation, search File File history File usage File:AlaskaTitleVApplicationSubmittalInstructions.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 20 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 11:34, 1 November 2012 Thumbnail for version as of 11:34, 1 November 2012 1,275 Γ— 1,650 (20 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file. Retrieved from

480

File:01MTALandUseConsiderations.pdf | Open Energy Information  

Open Energy Info (EERE)

MTALandUseConsiderations.pdf MTALandUseConsiderations.pdf Jump to: navigation, search File File history File usage File:01MTALandUseConsiderations.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 10 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 11:01, 1 October 2012 Thumbnail for version as of 11:01, 1 October 2012 1,275 Γ— 1,650 (10 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following 2 pages link to this file: GRR/Flowcharts GRR/Section 1-MT-a - Land Use Considerations

Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

File:03UTBStateEasementProcess.pdf | Open Energy Information  

Open Energy Info (EERE)

UTBStateEasementProcess.pdf UTBStateEasementProcess.pdf Jump to: navigation, search File File history File usage File:03UTBStateEasementProcess.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 27 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 12:13, 30 August 2012 Thumbnail for version as of 12:13, 30 August 2012 1,275 Γ— 1,650 (27 KB) Jnorris (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following 2 pages link to this file: GRR/Flowcharts GRR/Section 3-UT-b - State Easement Process

482

File:01ORALandUseConsiderations.pdf | Open Energy Information  

Open Energy Info (EERE)

1ORALandUseConsiderations.pdf 1ORALandUseConsiderations.pdf Jump to: navigation, search File File history File usage File:01ORALandUseConsiderations.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 11 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 11:52, 28 September 2012 Thumbnail for version as of 11:52, 28 September 2012 1,275 Γ— 1,650 (11 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following 2 pages link to this file: GRR/Flowcharts GRR/Section 1-OR-a - Land Use Considerations

483

File:01IDALandUseConsiderations.pdf | Open Energy Information  

Open Energy Info (EERE)

IDALandUseConsiderations.pdf IDALandUseConsiderations.pdf Jump to: navigation, search File File history File usage File:01IDALandUseConsiderations.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 25 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 17:23, 25 October 2012 Thumbnail for version as of 17:23, 25 October 2012 1,275 Γ— 1,650 (25 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following 2 pages link to this file: GRR/Flowcharts GRR/Section 1-ID-a - Land Use Considerations

484

File:Ors 358653 factsheet.pdf | Open Energy Information  

Open Energy Info (EERE)

Ors 358653 factsheet.pdf Ors 358653 factsheet.pdf Jump to: navigation, search File File history File usage File:Ors 358653 factsheet.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Go to page 1 2 Go! next page β†’ next page β†’ Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 25 KB, MIME type: application/pdf, 2 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 11:32, 20 November 2012 Thumbnail for version as of 11:32, 20 November 2012 1,275 Γ— 1,650, 2 pages (25 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file.

485

File:Utah Trans Siting.pdf | Open Energy Information  

Open Energy Info (EERE)

Trans Siting.pdf Trans Siting.pdf Jump to: navigation, search File File history File usage File:Utah Trans Siting.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Go to page 1 2 Go! next page β†’ next page β†’ Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 21 KB, MIME type: application/pdf, 2 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 15:20, 13 November 2012 Thumbnail for version as of 15:20, 13 November 2012 1,275 Γ— 1,650, 2 pages (21 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file.

486

File:Hrow-application-checklist.pdf | Open Energy Information  

Open Energy Info (EERE)

Hrow-application-checklist.pdf Hrow-application-checklist.pdf Jump to: navigation, search File File history File usage Metadata File:Hrow-application-checklist.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Go to page 1 2 Go! next page β†’ next page β†’ Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 106 KB, MIME type: application/pdf, 2 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 13:44, 13 June 2013 Thumbnail for version as of 13:44, 13 June 2013 1,275 Γ— 1,650, 2 pages (106 KB) Apalazzo (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file.

487

File:03MTEEncroachmentPermit.pdf | Open Energy Information  

Open Energy Info (EERE)

MTEEncroachmentPermit.pdf MTEEncroachmentPermit.pdf Jump to: navigation, search File File history File usage File:03MTEEncroachmentPermit.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 19 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 12:06, 1 October 2012 Thumbnail for version as of 12:06, 1 October 2012 1,275 Γ— 1,650 (19 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following 2 pages link to this file: GRR/Flowcharts GRR/Section 3-MT-e - Encroachment Permit

488

File:03NVBStateLandAccess.pdf | Open Energy Information  

Open Energy Info (EERE)

3NVBStateLandAccess.pdf 3NVBStateLandAccess.pdf Jump to: navigation, search File File history File usage File:03NVBStateLandAccess.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 11 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 12:11, 15 October 2012 Thumbnail for version as of 12:11, 15 October 2012 1,275 Γ— 1,650 (11 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following 2 pages link to this file: GRR/Flowcharts GRR/Section 3-NV-b - State Land Access Retrieved from

489

File:TCEQ-CoreDataForm.pdf | Open Energy Information  

Open Energy Info (EERE)

CoreDataForm.pdf CoreDataForm.pdf Jump to: navigation, search File File history File usage Metadata File:TCEQ-CoreDataForm.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Go to page 1 2 Go! next page β†’ next page β†’ Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 213 KB, MIME type: application/pdf, 2 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 10:12, 14 June 2013 Thumbnail for version as of 10:12, 14 June 2013 1,275 Γ— 1,650, 2 pages (213 KB) Apalazzo (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file.

490

File:App Geothermal PROSPECT.pdf | Open Energy Information  

Open Energy Info (EERE)

App Geothermal PROSPECT.pdf App Geothermal PROSPECT.pdf Jump to: navigation, search File File history File usage File:App Geothermal PROSPECT.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Go to page 1 2 3 Go! next page β†’ next page β†’ Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 124 KB, MIME type: application/pdf, 3 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 19:08, 16 November 2012 Thumbnail for version as of 19:08, 16 November 2012 1,275 Γ— 1,650, 3 pages (124 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file.

491

File:Proof1.pdf | Open Energy Information  

Open Energy Info (EERE)

Proof1.pdf Proof1.pdf Jump to: navigation, search File File history File usage File:Proof1.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Go to page 1 2 3 4 Go! next page β†’ next page β†’ Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 79 KB, MIME type: application/pdf, 4 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 12:16, 14 November 2012 Thumbnail for version as of 12:16, 14 November 2012 1,275 Γ— 1,650, 4 pages (79 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file. Retrieved from

492

File:40 CFR 143.pdf | Open Energy Information  

Open Energy Info (EERE)

pdf pdf Jump to: navigation, search File File history File usage File:40 CFR 143.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Go to page 1 2 3 4 5 Go! next page β†’ next page β†’ Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 166 KB, MIME type: application/pdf, 5 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 18:05, 29 October 2012 Thumbnail for version as of 18:05, 29 October 2012 1,275 Γ— 1,650, 5 pages (166 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file. Retrieved from

493

File:09IDAStateEnvironmentalProcess.pdf | Open Energy Information  

Open Energy Info (EERE)

09IDAStateEnvironmentalProcess.pdf 09IDAStateEnvironmentalProcess.pdf Jump to: navigation, search File File history File usage File:09IDAStateEnvironmentalProcess.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 13 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 14:19, 16 August 2012 Thumbnail for version as of 14:19, 16 August 2012 1,275 Γ— 1,650 (13 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following page links to this file: GRR/Section 9-ID-a - State Environmental Process

494

File:Mitigation report.pdf | Open Energy Information  

Open Energy Info (EERE)

report.pdf report.pdf Jump to: navigation, search File File history File usage File:Mitigation report.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Go to page 1 2 Go! next page β†’ next page β†’ Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 29 KB, MIME type: application/pdf, 2 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 15:25, 20 November 2012 Thumbnail for version as of 15:25, 20 November 2012 1,275 Γ— 1,650, 2 pages (29 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file. Retrieved from

495

File:Application procedures.pdf | Open Energy Information  

Open Energy Info (EERE)

procedures.pdf procedures.pdf Jump to: navigation, search File File history File usage File:Application procedures.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Go to page 1 2 Go! next page β†’ next page β†’ Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 27 KB, MIME type: application/pdf, 2 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 14:06, 15 November 2012 Thumbnail for version as of 14:06, 15 November 2012 1,275 Γ— 1,650, 2 pages (27 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file.

496

File:03CACEncroachmentPermit.pdf | Open Energy Information  

Open Energy Info (EERE)

CACEncroachmentPermit.pdf CACEncroachmentPermit.pdf Jump to: navigation, search File File history File usage File:03CACEncroachmentPermit.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 34 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 12:45, 19 November 2012 Thumbnail for version as of 12:45, 19 November 2012 1,275 Γ— 1,650 (34 KB) Alevine (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following 2 pages link to this file: GRR/Flowcharts GRR/Section 3-CA-c - Encroachment Permit

497

File:01AKALandUseConsiderations.pdf | Open Energy Information  

Open Energy Info (EERE)

01AKALandUseConsiderations.pdf 01AKALandUseConsiderations.pdf Jump to: navigation, search File File history File usage File:01AKALandUseConsiderations.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 10 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 09:46, 18 October 2012 Thumbnail for version as of 09:46, 18 October 2012 1,275 Γ— 1,650 (10 KB) Jnorris (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following 2 pages link to this file: GRR/Flowcharts GRR/Section 1-AK-a - Land Use Considerations

498

File:03UTFEncroachmentPermit.pdf | Open Energy Information  

Open Energy Info (EERE)

UTFEncroachmentPermit.pdf UTFEncroachmentPermit.pdf Jump to: navigation, search File File history File usage File:03UTFEncroachmentPermit.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 40 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 12:15, 30 August 2012 Thumbnail for version as of 12:15, 30 August 2012 1,275 Γ— 1,650 (40 KB) Jnorris (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following 2 pages link to this file: GRR/Flowcharts GRR/Section 3-UT-f - Encroachment Permit

499

File:(131112) Presentacion LAC LEDs.pdf | Open Energy Information  

Open Energy Info (EERE)

131112) Presentacion LAC LEDs.pdf 131112) Presentacion LAC LEDs.pdf Jump to: navigation, search File File history File usage File:(131112) Presentacion LAC LEDs.pdf Size of this preview: 800 Γ— 600 pixels. Go to page 1 2 3 4 5 6 7 8 9 10 Go! next page β†’ next page β†’ Full resolution β€Ž(1,500 Γ— 1,125 pixels, file size: 775 KB, MIME type: application/pdf, 10 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 14:15, 12 December 2012 Thumbnail for version as of 14:15, 12 December 2012 1,500 Γ— 1,125, 10 pages (775 KB) Gjones (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following page links to this file:

500

File:01HIALandUseConsiderations.pdf | Open Energy Information  

Open Energy Info (EERE)

HIALandUseConsiderations.pdf HIALandUseConsiderations.pdf Jump to: navigation, search File File history File usage File:01HIALandUseConsiderations.pdf Size of this preview: 463 Γ— 599 pixels. Other resolution: 464 Γ— 600 pixels. Full resolution β€Ž(1,275 Γ— 1,650 pixels, file size: 20 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 13:05, 23 October 2012 Thumbnail for version as of 13:05, 23 October 2012 1,275 Γ— 1,650 (20 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following 2 pages link to this file: GRR/Flowcharts GRR/Section 1-HI-a - Land Use Considerations