Sample records for adaptive security appliances

  1. T-531: The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500

    Broader source: Energy.gov [DOE]

    The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.2(3) permits the viewing of CIFS shares even when CIFS file browsing has been disabled, which allows remote authenticated users to bypass intended access restrictions via CIFS requests, aka Bug ID CSCsz80777.

  2. V-021: Cisco IronPort Web / Email Security Appliance Sophos Anti...

    Broader source: Energy.gov (indexed) [DOE]

    1: Cisco IronPort Web Email Security Appliance Sophos Anti-Virus Multiple Vulnerabilities V-021: Cisco IronPort Web Email Security Appliance Sophos Anti-Virus Multiple...

  3. T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    VPN client, which provides remote users with secure IPsec (IKEv2) or SSL Virtual Private Network (VPN) connections to Cisco 5500 Series Adaptive Security Appliances (ASA) and...

  4. U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability |

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO Overview OCHCOSystems Analysis Success| Department ofServicesPointsInjection1

  5. U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability |

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergyTransportation WorkDecemberInjury at FY6:Energy

  6. Adaptive security systems -- Combining expert systems with adaptive technologies

    SciTech Connect (OSTI)

    Argo, P.; Loveland, R.; Anderson, K. [and others

    1997-09-01T23:59:59.000Z

    The Adaptive Multisensor Integrated Security System (AMISS) uses a variety of computational intelligence techniques to reason from raw sensor data through an array of processing layers to arrive at an assessment for alarm/alert conditions based on human behavior within a secure facility. In this paper, the authors give an overview of the system and briefly describe some of the major components of the system. This system is currently under development and testing in a realistic facility setting.

  7. An Adaptive Policy for Improved Timeliness in Secure Database Systems

    E-Print Network [OSTI]

    Son, Sang H.

    An Adaptive Policy for Improved Timeliness in Secure Database Systems Sang H. Son * , Rasikan David. Multilevel security requirements introduce a new dimension to transaction processing in real­time database Timeliness, concurrency control, two­phase locking, non­interference, security, miss percentage 1

  8. Equivocal Blind Signatures and Adaptive UC-Security Aggelos Kiayias

    E-Print Network [OSTI]

    Equivocal Blind Signatures and Adaptive UC-Security Aggelos Kiayias Hong-Sheng Zhou April 12, 2007 Abstract We study the design of practical blind signatures in the universal composability (UC) setting against adaptive adversaries. We introduce a new property for blind signature schemes

  9. U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system.

  10. Adaptive Infrastructures Toward a Secure and

    E-Print Network [OSTI]

    Amin, S. Massoud

    concept important to the Electric Power Grid and Energy Infrastructure? A secure "architected" sensing of computer, communication, sensing and control technology which operates in parallel with an electric power grid for the purpose of enhancing the reliability of electric power delivery, minimizing the cost

  11. An Impact Assessment Model for Distributed Adaptive Security Situation Assessment*

    E-Print Network [OSTI]

    California at Davis, University of

    1 An Impact Assessment Model for Distributed Adaptive Security Situation Assessment* Mark Heckman mechanism is not simply to stop attacks, but to protect a computing resource so that the resource can continue to perform its function. A computing resource, however, is only a component of a larger system

  12. Securing Distributed Adaptation Jun Li Mark Yarvis Peter Reiher

    E-Print Network [OSTI]

    Li, Jun

    [22] allow adaptation to occur at nodes within the network. Unfortunately, this added flexibility Angeles AbstractOpen architecture networks provide applications with fine-grained control over network in conventional networks. One particular security requirement is the ability of applications to protect

  13. An intelligent appliance control

    SciTech Connect (OSTI)

    Maher, C.A. Jr. [Tridelta Industries, Inc., Mentor, OH (United States)] [Tridelta Industries, Inc., Mentor, OH (United States); McMahon, G. [Pitco Frialator, Inc., Concord, NH (United States)] [Pitco Frialator, Inc., Concord, NH (United States)

    1998-05-01T23:59:59.000Z

    This paper describes the use of a microcontroller to implement an adaptive form of an ON/OFF-type control system. The principal benefits that this technique offers are the ability to self adjust automatically to the dynamics of the appliance being controlled and to minimize the cyclic wear and tear on the final heat-control elements. This technique is best applied to those systems with at least one large energy storage element (e.g., thermal mass), not needing fine control of the controlled variable, and ones using ON/OFF (relay type) rather than continuous final control outputs. This profile encompasses a large number of potential applications, particularly in the appliance field.

  14. APPLIANCE STANDARDS

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032)8Li (59AJ76) (See theDoctoral20ALSNewstt^APPLIANCE STANDARDS How they

  15. UEA Water Security Research Centre Climate Change and Variability Adaptation and Vulnerability

    E-Print Network [OSTI]

    Everest, Graham R

    UEA Water Security Research Centre Climate Change and Variability Adaptation and Vulnerability Transboundary Cooperation Conflict Irrigation Performance and Policy River Basin Management Water Allocation Hydropolitics www.uea.ac.uk/watersecurity #12;The UEA Water Security Research Centre applies

  16. Arnold Schwarzenegger 2010 APPLIANCE

    E-Print Network [OSTI]

    : Appliance Efficiency Regulations, appliance standards, refrigerators, air conditioners, space heaters, water heaters, pool heaters, pool pumps, electric spas, pool pump motors, plumbing fittings, plumbing fixtures, showerheads, spray valves, faucets, tub spout diverters, water closets, urinals, ceiling fans, ceiling fan

  17. Appliance Efficiency Regulations

    Broader source: Energy.gov [DOE]

    Note: The federal government has imposed and updated appliance efficiency standards through several legislative acts,* and now has standards in place or under development for 30 classes of...

  18. Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions

    E-Print Network [OSTI]

    Keinan, Alon

    Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions Ran Canetti-up or public keys. Tel Aviv University, Email: Canetti@tau.ac.il Cornell University, E-Mail: huijia

  19. Securing Distributed Adaptation + Jun Li Mark Yarvis Peter Reiher

    E-Print Network [OSTI]

    California at Los Angeles, University of

    Angeles Abstract + Open architecture networks provide applications with finegrained control over network elements. With this control comes the risk of misuse and new challenges to security beyond those present in conventional networks. One particular security requirement is the ability of applications

  20. Security challenges and opportunities in adaptive and reconfigurable hardware

    E-Print Network [OSTI]

    Costan, Victor Marius

    We present a novel approach to building hardware support for providing strong security guarantees for computations running in the cloud (shared hardware in massive data centers), while maintaining the high performance and ...

  1. Adaptively Secure Broadcast Martin Hirt and Vassilis Zikas

    E-Print Network [OSTI]

    Hirt, Martin

    , and a simulation-based definition can be used. In this work, we show that the property-based definition of broadcast does not imply the simulation-based definition for the natural broadcast functionality. In fact, bidding, secure function evaluation, threshold key generation, multi-party computation, etc -- just

  2. Profile-based adaptive anomaly detection for network security.

    SciTech Connect (OSTI)

    Zhang, Pengchu C. (Sandia National Laboratories, Albuquerque, NM); Durgin, Nancy Ann

    2005-11-01T23:59:59.000Z

    As information systems become increasingly complex and pervasive, they become inextricably intertwined with the critical infrastructure of national, public, and private organizations. The problem of recognizing and evaluating threats against these complex, heterogeneous networks of cyber and physical components is a difficult one, yet a solution is vital to ensuring security. In this paper we investigate profile-based anomaly detection techniques that can be used to address this problem. We focus primarily on the area of network anomaly detection, but the approach could be extended to other problem domains. We investigate using several data analysis techniques to create profiles of network hosts and perform anomaly detection using those profiles. The ''profiles'' reduce multi-dimensional vectors representing ''normal behavior'' into fewer dimensions, thus allowing pattern and cluster discovery. New events are compared against the profiles, producing a quantitative measure of how ''anomalous'' the event is. Most network intrusion detection systems (IDSs) detect malicious behavior by searching for known patterns in the network traffic. This approach suffers from several weaknesses, including a lack of generalizability, an inability to detect stealthy or novel attacks, and lack of flexibility regarding alarm thresholds. Our research focuses on enhancing current IDS capabilities by addressing some of these shortcomings. We identify and evaluate promising techniques for data mining and machine-learning. The algorithms are ''trained'' by providing them with a series of data-points from ''normal'' network traffic. A successful algorithm can be trained automatically and efficiently, will have a low error rate (low false alarm and miss rates), and will be able to identify anomalies in ''pseudo real-time'' (i.e., while the intrusion is still in progress, rather than after the fact). We also build a prototype anomaly detection tool that demonstrates how the techniques might be integrated into an operational intrusion detection framework.

  3. Energy Efficiency Standards for Appliances

    Broader source: Energy.gov [DOE]

    '' Note: The federal government has imposed and updated appliance efficiency standards through several legislative acts,* and now has standards in place or under development for 30 classes of...

  4. Appliance and Equipment Efficiency Standards

    Broader source: Energy.gov [DOE]

    '' Note: The federal government has imposed and updated appliance efficiency standards through several legislative acts,* and now has standards in place or under development for 30 classes of...

  5. Streamlining ENERGY STAR Appliance Testing

    Broader source: Energy.gov [DOE]

    To save taxpayer dollars and help lower the costs of innovative energy-efficient technologies, the Energy Department is streamlining ENERGY STAR testing for appliances.

  6. Protection Over Asymmetric Channels, S-MATE: Secure Multipath Adaptive Traffic Engineering

    E-Print Network [OSTI]

    Aly, Salah A; Poor, H Vincent; Walid, Anwar I

    2010-01-01T23:59:59.000Z

    Several approaches have been proposed to the problem of provisioning traffic engineering between core network nodes in Internet Service Provider (ISP) networks. Such approaches aim to minimize network delay, increase capacity, and enhance security services between two core (relay) network nodes, an ingress node and an egress node. MATE (Multipath Adaptive Traffic Engineering) has been proposed for multipath adaptive traffic engineering between an ingress node (source) and an egress node (destination) to distribute the network flow among multiple disjoint paths. Its novel idea is to avoid network congestion and attacks that might exist in edge and node disjoint paths between two core network nodes. This paper proposes protection schemes over asymmetric channels. Precisely, the paper aims to develop an adaptive, robust, and reliable traffic engineering scheme to improve performance and reliability of communication networks. This scheme will also provision Quality of Server (QoS) and protection of traffic engine...

  7. Appliance and Equipment Standards

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: The Future of1Albuquerque,APPENDIX A: Technical Support DocumentAppliance and

  8. Appliances, Lighting, Electronics, and Miscellaneous Equipment Electricity Use in New Homes

    E-Print Network [OSTI]

    Brown, Richard E.; Rittelman, William; Parker, Danny; Homan, Gregory

    2007-01-01T23:59:59.000Z

    62440 Appliances, Lighting, Electronics, and Miscellaneousof California. Appliances, Lighting, Electronics, anduses (appliances, lighting, electronics, and miscellaneous

  9. Remote repair appliance

    DOE Patents [OSTI]

    Heumann, F.K.; Wilkinson, J.C.; Wooding, D.R.

    1997-12-16T23:59:59.000Z

    A remote appliance for supporting a tool for performing work at a work site on a substantially circular bore of a work piece and for providing video signals of the work site to a remote monitor comprises: a base plate having an inner face and an outer face; a plurality of rollers, wherein each roller is rotatably and adjustably attached to the inner face of the base plate and positioned to roll against the bore of the work piece when the base plate is positioned against the mouth of the bore such that the appliance may be rotated about the bore in a plane substantially parallel to the base plate; a tool holding means for supporting the tool, the tool holding means being adjustably attached to the outer face of the base plate such that the working end of the tool is positioned on the inner face side of the base plate; a camera for providing video signals of the work site to the remote monitor; and a camera holding means for supporting the camera on the inner face side of the base plate, the camera holding means being adjustably attached to the outer face of the base plate. In a preferred embodiment, roller guards are provided to protect the rollers from debris and a bore guard is provided to protect the bore from wear by the rollers and damage from debris. 5 figs.

  10. Remote repair appliance

    DOE Patents [OSTI]

    Heumann, Frederick K. (Ballston Spa, NY); Wilkinson, Jay C. (Ballston Spa, NY); Wooding, David R. (Saratoga Springs, NY)

    1997-01-01T23:59:59.000Z

    A remote appliance for supporting a tool for performing work at a worksite on a substantially circular bore of a workpiece and for providing video signals of the worksite to a remote monitor comprising: a baseplate having an inner face and an outer face; a plurality of rollers, wherein each roller is rotatably and adjustably attached to the inner face of the baseplate and positioned to roll against the bore of the workpiece when the baseplate is positioned against the mouth of the bore such that the appliance may be rotated about the bore in a plane substantially parallel to the baseplate; a tool holding means for supporting the tool, the tool holding means being adjustably attached to the outer face of the baseplate such that the working end of the tool is positioned on the inner face side of the baseplate; a camera for providing video signals of the worksite to the remote monitor; and a camera holding means for supporting the camera on the inner face side of the baseplate, the camera holding means being adjustably attached to the outer face of the baseplate. In a preferred embodiment, roller guards are provided to protect the rollers from debris and a bore guard is provided to protect the bore from wear by the rollers and damage from debris.

  11. Energy Star Appliances 1 Texas A&M AgriLife Extension Service ENERGY STAR Appliances

    E-Print Network [OSTI]

    Energy Star® Appliances 1 Texas A&M AgriLife Extension Service ENERGY STAR® Appliances ENERGY STAR®-labeled appliances save you money by using less electricity and water than other appliances. Better appliance energy efficiency comes from quality materials and technologically advanced materials. Although energy efficient

  12. Incorporating Experience Curves in Appliance Standards Analysis

    E-Print Network [OSTI]

    Desroches, Louis-Benoit

    2012-01-01T23:59:59.000Z

    appliance price projections than the assumption-basedrepresentative projection of future prices than the constant

  13. Adaptive load control of microgrids with non-dispatchable generation

    E-Print Network [OSTI]

    Brokish, Kevin Martin

    2009-01-01T23:59:59.000Z

    Intelligent appliances have a great potential to provide energy storage and load shedding for power grids. Microgrids are simulated with high levels of wind energy penetration. Frequency-adaptive intelligent appliances are ...

  14. GE Appliances: Order (2010-CE-2113)

    Broader source: Energy.gov [DOE]

    DOE issued an Order after entering into a Compromise Agreement with General Electric Appliances after finding GE Appliances had failed to certify that certain models of dehumidifiers comply with the applicable energy conservation standards.

  15. Catalog of DC Appliances and Power Systems

    E-Print Network [OSTI]

    Garbesi, Karina

    2012-01-01T23:59:59.000Z

    DC Conversion Loss Savings of Appliances Running on DirectConversion Loss Savings of Appliances Running on Direct DCrunning on AC and, in column B, the avoided AC-DC conversions losses

  16. Appliance Standards and Rulemaking Federal Advisory Committee...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Issuance Appliance Standards and Rulemaking Federal Advisory Committee (ASRAC) - Central Air Conditioner Regional Standards Enforcement Working Group; Notice of Open...

  17. Appliance Standards and Rulemaking Federal Advisory Committee...

    Energy Savers [EERE]

    of the National Energy Laboratories Buildings Home About Emerging Technologies Residential Buildings Commercial Buildings Appliance & Equipment Standards Building Energy Codes...

  18. Modeling of GE Appliances: Final Presentation

    SciTech Connect (OSTI)

    Fuller, Jason C.; Vyakaranam, Bharat; Leistritz, Sean M.; Parker, Graham B.

    2013-01-31T23:59:59.000Z

    This report is the final in a series of three reports funded by U.S. Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) in collaboration with GE Appliances through a Cooperative Research and Development Agreement (CRADA) to describe the potential of GE Appliances DR-enabled appliances to provide benefits to the utility grid.

  19. Appliances, Lighting, Electronics, and Miscellaneous Equipment Electricity Use in New Homes

    E-Print Network [OSTI]

    Brown, Richard E.; Rittelman, William; Parker, Danny; Homan, Gregory

    2007-01-01T23:59:59.000Z

    62440 Appliances, Lighting, Electronics, and MiscellaneousAppliances, Lighting, Electronics, and Miscellaneoususes (appliances, lighting, electronics, and miscellaneous

  20. Proceedings of Student-Faculty Research Day, CSIS, Pace University, May 3rd A Frame Problem Approach for Adaptive Cyber Security Design

    E-Print Network [OSTI]

    Tappert, Charles

    Problem Approach for Adaptive Cyber Security Design R. Shaikh, T. Bryla, and S. Ahmed Pace University entails the motivation and efforts to integrate the Frame Problem approach to the distributed cyber in the context of network security counteraction against cyber-attacks. A simple simulator is designed

  1. Distinctive Appliances: Proposed Penalty (2014-CE-23020)

    Broader source: Energy.gov [DOE]

    DOE alleged in a Notice of Proposed Civil Penalty that Distinctive Appliances Distributing Inc. failed to certify cooking products as compliant with the applicable energy conservation standards.

  2. Smart Domestic Appliances Provide Flexibility for Sustainable...

    Open Energy Info (EERE)

    benefits and difficulties associated with smart grid appliances. The presenter discusses demand response and load management and how users of smart grid can benefit renewable...

  3. Appliance and Equipment Energy Efficiency Standards

    Broader source: Energy.gov [DOE]

    '' Note: The federal government has imposed and updated appliance efficiency standards through several legislative acts,* and now has standards in place or under development for 30 classes of...

  4. Earthjustice, Appliance Standards Awareness Project, Natural...

    Energy Savers [EERE]

    Council - Comments in response to DOE solicitation of views on the implementation of test procedure waivers for large capacity clothes washers Earthjustice, Appliance Standards...

  5. GE Appliances: Proposed Penalty (2010-CE-2113)

    Broader source: Energy.gov [DOE]

    DOE alleged in a Notice of Proposed Civil Penalty that General Electric Appliances failed to certify a variety of dehumidifiers as compliant with the applicable energy conservation standards.

  6. Appliance remanufacturing and life cycle energy and economic savings

    E-Print Network [OSTI]

    Boustani, Avid

    In this paper we evaluate the energy and economic consequences of appliance remanufacturing relative to purchasing new. The appliances presented in this report constitute major residential appliances: refrigerator, dishwasher, ...

  7. State Energy Efficient Appliance Rebate Program (SEEARP) American...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    State Energy Efficient Appliance Rebate Program (SEEARP) American Recovery and Reinvestment Act (ARRA) Funding Opportunity Number: DE-FOA-0000119 State Energy Efficient Appliance...

  8. Sales Tax Holiday for Energy-Efficient Appliances

    Broader source: Energy.gov [DOE]

    In November 2007, Maryland enacted legislation creating a sales and use tax "holiday" for certain energy-efficient appliances, beginning in 2011. Under the law, qualifying appliances purchased...

  9. Secretary Chu Announces More Stringent Appliance Standards for...

    Energy Savers [EERE]

    Secretary Chu Announces More Stringent Appliance Standards for Home Water Heaters and Other Heating Products Secretary Chu Announces More Stringent Appliance Standards for Home...

  10. Four-County EMC- Residential Energy Efficiency Appliance Rebate Program

    Broader source: Energy.gov [DOE]

    Four-County EMC offers its customers $50 rebates for purchasing certain Energy Star appliances. Eligible appliances include refrigerators, dishwashers, clothes washers and freezers. The rebates are...

  11. MC Appliance: Order (2012-CE-1508)

    Broader source: Energy.gov [DOE]

    DOE ordered CNA International Inc. d/b/a MC Appliance Corporation to pay a $8,000 civil penalty after finding MC Appliance had failed to certify that certain models of room air conditioners comply with the applicable energy conservation standards.

  12. APPLIANCE EFFICIENCY REGULATIONS FOR REFRIGERATORS AND FREEZERS

    E-Print Network [OSTI]

    CENTRAL AIR CONDITIONERS GAS SPACE HEATERS WATER HEATERS PLUMBING FITTINGS FLUORESCENT LAMP BALLASTS LUMINAIRES GAS COOKING APPLIANCES AND GAS POOL HEATERS SEPTEMBER 1992 #12;TABLE OF CONTENTS APPLIANCE) Gas space heaters, excluding the following types: (1) gravity type central furnaces; (2) heaters

  13. How to construct multicast cryptosystems provably secure against adaptive chosen ciphertext attack

    E-Print Network [OSTI]

    Duan, Yitao; Canny, J

    2006-01-01T23:59:59.000Z

    adaptive chosen ciphertext attack. In: CRYPTO 1998. Volumeagainst chosen cipher- text attack. J. Cryptology 15 (2002)against chosen- ciphertext attacks. In: ASIACRYPT 2001.

  14. Retrospective Evaluation of Appliance Price Trends

    SciTech Connect (OSTI)

    Dale, Larry; Antinori, Camille; McNeil, Michael; McMahon, James E.; Fujita, K. Sydny

    2008-07-20T23:59:59.000Z

    Real prices of major appliances (refrigerators, dishwashers, heating and cooling equipment) have been falling since the late 1970s despite increases in appliance efficiency and other quality variables. This paper demonstrates that historic increases in efficiency over time, including those resulting from minimum efficiency standards, incur smaller price increases than were expected by Department of Energy (DOE) forecasts made in conjunction with standards. This effect can be explained by technological innovation, which lowers the cost of efficiency, and by market changes contributing to lower markups and economies of scale in production of higher efficiency units. We reach four principal conclusions about appliance trends and retail price setting: 1. For the past several decades, the retail price of appliances has been steadily falling while efficiency has been increasing. 2. Past retail price predictions made by DOE analyses of efficiency standards, assuming constant prices over time, have tended to overestimate retail prices. 3. The average incremental price to increase appliance efficiency has declined over time. DOE technical support documents have typically overestimated this incremental price and retail prices. 4. Changes in retail markups and economies of scale in production of more efficient appliances may have contributed to declines in prices of efficient appliances.

  15. West Virginia Consumers Have Appliance Rebate 'Trifecta'

    Broader source: Energy.gov [DOE]

    West Virginians didnt waste any time in taking advantage of the Energy Efficient Appliance Rebate Program. Only three months in, and almost half of the available $1.7 million is already spoken for.

  16. Catalog of DC Appliances and Power Systems

    E-Print Network [OSTI]

    Garbesi, Karina

    2012-01-01T23:59:59.000Z

    main conclusions about off-grid markets for DC appliances,and power systems. Mature Off-Grid Markets for DC Appliancesapplications include off-grid residential, telecom, remote

  17. 2009 CALIFORNIA RESIDENTIAL APPLIANCE SATURATION STUDY

    E-Print Network [OSTI]

    data, household energy consumption data and weather information to calculate average annual information on appliances, equipment, and general consumption patterns. Data collection was completed in early 2010. The study yielded energy consumption estimates for 27 electric and 10 natural gas

  18. Equator Appliance: ENERGY STAR Referral (EZ 3720)

    Broader source: Energy.gov [DOE]

    DOE referred Equator Appliance clothes washer EZ 3720 to EPA, brand manager of the ENERGY STAR program, for appropriate action after DOE testing revealed that the model does not meet ENERGY STAR requirements.

  19. Energy-Efficient Appliance Manufacturing Tax Credit

    Broader source: Energy.gov [DOE]

    '''''Note: This tax credit expired at the end of 2011. The American Taxpayer Relief Act of 2012 retroactively renewed this tax credit for certain appliances manufactured in 2012 and 2013. '''''

  20. MC Appliance: Proposed Penalty (2014-CE-20002)

    Broader source: Energy.gov [DOE]

    DOE alleged in a Notice of Proposed Civil Penalty that MC Appliance Corporation failed to certify residential clothes washers and residential clothes dryers as compliant with the applicable energy conservation standards.

  1. Pollutant Emission Factors from Residential Natural Gas Appliances: A Literature Review

    E-Print Network [OSTI]

    Traynor, G.W.

    2011-01-01T23:59:59.000Z

    distributions from residential natural gas appliances. CH 4ng/J) distribution from residential natural gas appliances.from Residential Natural Gas Appliances: A Literature Review

  2. Impact of Natural Gas Appliances on Pollutant Levels in California Homes

    E-Print Network [OSTI]

    Mullen, Nasim A.

    2014-01-01T23:59:59.000Z

    35): 5661-67. Impact of Natural Gas Appliances on PollutantO-. ! Natural Gas Appliances on PollutantA! =? >7! =::! Impact of Natural Gas Appliances on Pollutant

  3. State Appliance Standards (released in AEO2009)

    Reports and Publications (EIA)

    2009-01-01T23:59:59.000Z

    State appliance standards have existed for decades, starting with Californias enforcement of minimum efficiency requirements for refrigerators and several other products in 1979. In 1987, recognizing that different efficiency standards for the same products in different states could create problems for manufacturers, Congress enacted the National Appliance Energy Conservation Act (NAECA), which initially covered 12 products. The Energy Policy Act of 1992 (EPACT92), EPACT2005, and EISA2007 added additional residential and commercial products to the 12 products originally specified under NAECA.

  4. Non-intrusive appliance monitor apparatus

    DOE Patents [OSTI]

    Hart, George W. (Natick, MA); Kern, Jr., Edward C. (Lincoln, MA); Schweppe, Fred C. (Carlisle, MA)

    1989-08-15T23:59:59.000Z

    A non-intrusive monitor of energy consumption of residential appliances is described in which sensors, coupled to the power circuits entering a residence, supply analog voltage and current signals which are converted to digital format and processed to detect changes in certain residential load parameters, i.e., admittance. Cluster analysis techniques are employed to group change measurements into certain categories, and logic is applied to identify individual appliances and the energy consumed by each.

  5. Non-intrusive appliance monitor apparatus

    DOE Patents [OSTI]

    Hart, G.W.; Kern, E.C. Jr.; Schweppe, F.C.

    1989-08-15T23:59:59.000Z

    A non-intrusive monitor of energy consumption of residential appliances is described in which sensors, coupled to the power circuits entering a residence, supply analog voltage and current signals which are converted to digital format and processed to detect changes in certain residential load parameters, i.e., admittance. Cluster analysis techniques are employed to group change measurements into certain categories, and logic is applied to identify individual appliances and the energy consumed by each. 9 figs.

  6. Predicting Backdrafting and Spillage for Natural-Draft Gas Combustion Appliances: Validating VENT-II

    E-Print Network [OSTI]

    Rapp, Vi H.

    2014-01-01T23:59:59.000Z

    and Spillage for Natural-Draft Gas Combustion Appliances:and Spillage for Natural-Draft Gas Combustion Appliances: A

  7. Energy Efficient Appliance Sales Soar in North Carolina | Department...

    Broader source: Energy.gov (indexed) [DOE]

    Energy Efficient Appliance Sales Soar in North Carolina Energy Efficient Appliance Sales Soar in North Carolina July 23, 2010 - 11:00am Addthis Joshua DeLung What does this mean...

  8. Reading Municipal Light Department- Residential ENERGY STAR Appliance Rebate Program

    Broader source: Energy.gov [DOE]

    Reading Municipal Light Department (RMLD) offers rebates to residential customers who install Energy Star appliances in eligible homes. The offer is limited to one rebate per appliance or a maximum...

  9. 2012 APPLIANCE EFFICIENCY REGULATIONS Edmund G. Brown Jr., Governor

    E-Print Network [OSTI]

    : Appliance Efficiency Regulations, appliance standards, refrigerators, air conditioners, space heaters, water heaters, pool heaters, pool pumps, electric spas, pool pump motors, plumbing fittings, plumbing fixtures, showerheads, spray valves, faucets, tub spout diverters, water closets, urinals, ceiling fans, ceiling fan

  10. 2014-08-19 Issuance Appliance Standards and Rulemaking Federal...

    Energy Savers [EERE]

    Issuance Appliance Standards and Rulemaking Federal Advisory Committee (ASRAC) - Central Air Conditioner Regional Standards Enforcement Working Group; Notice of Open...

  11. Low-cost Appliance State Sensing for Energy Disaggregation

    E-Print Network [OSTI]

    Wu, Tianji

    2012-01-01T23:59:59.000Z

    and Steven B. Leeb. Non-intrusive electrical load monitor-in recent years, namely non-intrusive appliance load

  12. Assessment of Literature Related to Combustion Appliance Venting

    E-Print Network [OSTI]

    1 Assessment of Literature Related to Combustion Appliance Venting Systems V.H. Rapp, B.C. Singer., Assessment of Literature Related to Combustion Appliance Venting Systems. LBNL-5798E 3 ABSTRACT In many by concerns about related impacts on the safety of naturally vented combustion appliances. Tighter housing

  13. Results of the Grid Friendly Appliance Project

    SciTech Connect (OSTI)

    Hammerstrom, Donald J.

    2010-04-14T23:59:59.000Z

    As part of the Pacific Northwest GridWise Testbed Demonstration funded by the U.S. Department of Energy and others, Pacific Northwest National Laboratory (PNNL) collaborated with Whirlpool Corporation, Invensys Controls, the Bonneville Power Administration, PacifiCorp, Portland General Electric and several smaller utilities to install 150 new Sears Kenmore clothes dryers and to retrofit 50 existing electric water heaters in homes in Washington and Oregon. Each dryer and water heater was configured to respond to the Grid Friendly appliance controller, a small electronic circuit that sensed underfrequency grid conditions and requested that electric load be shed by the appliances. These controllers and appliances were observed for over a year in residences spread over a wide geographic area. The controllers were found to respond predictably and reliably despite their geographic separation. Over 350 minor underfrequency events were observed during the experiment. This paper presents the distributions of these events by season and by time of day. Based on measured load profiles for the dryers and water heaters, the average electrical load that can be shed by each of the two appliance types was estimated by time of day and by season. Battelle Memorial Institute and PNNL have been assembling a suite of grid-responsive functions and benefits that can be achieved through the control of relatively small, distributed loads and resources on a power grid. These controllers should eventually receive acceptance for the opportunities they offer for circuit protection, regulation services, facilitation of demand responsiveness, and even power quality.

  14. List of Major Information Systems,National Nuclear Security Administra...

    Energy Savers [EERE]

    List of Major Information Systems,National Nuclear Security Administration ADaPT Networked: List of Major Information Systems,National Nuclear Security Administration ADaPT...

  15. Appliances & Electronics | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuels Data Center HomeIdle ReductionOfficesActive SolarAnnualAppliances &

  16. Hydrophilic structures for condensation management in refrigerator appliances

    DOE Patents [OSTI]

    Kuehl, Steven John; Vonderhaar, John J; Wu, Guolian; Wu, Mianxue

    2014-10-21T23:59:59.000Z

    A refrigerator appliance that includes a freezer compartment having a freezer compartment door, and a refrigeration compartment having at least one refrigeration compartment door. The appliance further includes a mullion with an exterior surface. The mullion divides the compartments and the exterior surface directs condensation toward a transfer point. The appliance may also include a cabinet that houses the compartments and has two sides, each with an exterior surface. Further, at least one exterior surface directs condensation toward a transfer point.

  17. Measure Guideline: Combustion Safety for Natural Draft Appliances Through Appliance Zone Isolation

    SciTech Connect (OSTI)

    Fitzgerald, J.; Bohac, D.

    2014-04-01T23:59:59.000Z

    This measure guideline covers how to assess and carry out the isolation of natural draft combustion appliances from the conditioned space of low-rise residential buildings. It deals with combustion appliances located either within the living space in enclosed closets or side rooms or outside the living space in an adjacent area like an attic or garage. This subset of houses does not require comprehensive combustion safety tests and simplified prescriptive procedures can be used to address safety concerns. This allows residential energy retrofit contractors inexperienced in advanced combustion safety testing to effectively address combustion safety issues and allow energy retrofits including tightening and changes to distribution and ventilation systems to proceed.

  18. appliances current situation: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    for copies of this document are available from: Public Reference Action Final Rule 66 Smart Meter Deployment Optimization for Efficient Electrical Appliance State Monitoring...

  19. appliance ownership survey: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    day's events and weather. The system stores information on the user Takahashi, Shin 87 Smart Meter Deployment Optimization for Efficient Electrical Appliance State Monitoring...

  20. appliance labeling rule: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    day's events and weather. The system stores information on the user Takahashi, Shin 54 Smart Meter Deployment Optimization for Efficient Electrical Appliance State Monitoring...

  1. appliances maeleudstyr og: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    day's events and weather. The system stores information on the user Takahashi, Shin 129 Smart Meter Deployment Optimization for Efficient Electrical Appliance State Monitoring...

  2. appliance markettransformation program: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    day's events and weather. The system stores information on the user Takahashi, Shin 42 Smart Meter Deployment Optimization for Efficient Electrical Appliance State Monitoring...

  3. ISSUANCE 2015-06-30: Appliance Standards and Rulemaking Federal...

    Energy Savers [EERE]

    Standards and Rulemaking Federal Advisory Committee: Notice of Intent to Establish the Central Air Conditioners and Heat Pumps Working Group ISSUANCE 2015-06-30: Appliance...

  4. HVAC, Water Heating, and Appliances Overview - 2015 BTO Peer...

    Office of Environmental Management (EM)

    HVAC, Water Heater and Appliance R&D - 2014 BTO Peer Review Research & Development Roadmap: Emerging HVAC Technologies This thermoelastic system provides a promising...

  5. appliance efficiency program: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of California eScholarship Repository Summary: 2002. Commercial Cooking Appliance Technology Assessment.technology costs reported in Table 1 are not included in these plots...

  6. Appliance Standards Program Schedule - CCE Overview and Update...

    Broader source: Energy.gov (indexed) [DOE]

    Meeting CCE Overview and Update Presenation, dated April 13, 2011 NEMA Distribution Transformers, CCE Overview and Update presentation, dated 05242011 Appliance Standards Program...

  7. Orange and Rockland Utilities (Electric)- Residential Appliance Recycling Program

    Broader source: Energy.gov [DOE]

    Orange and Rockland Utilities provides rebates for residential customers for recycling older, inefficient refrigerators and freezers. All appliances must meet the program requirements listed on the...

  8. appliances walking sticks: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    themselves and adolescents, children and adolescents have not provided any substantial data. (more) Walton, Daniel K. 2010-01-01 23 Appliance remanufacturing and life cycle...

  9. Kitchen Appliance Upgrades Improve Water Efficiency at DOD Exchange...

    Broader source: Energy.gov (indexed) [DOE]

    Kitchen Appliance Upgrades Improve Water Efficiency at DOD Exchange Facilities Case study details the U.S. Department of Defense (DOD) Exchange (formerly the Army and Air Force...

  10. Webinar: Appliance Standards and Rulemaking Federal Advisory Committee

    Broader source: Energy.gov [DOE]

    DOE is conducting a public meeting and webinar regarding the Appliance Standards and Rulemaking Federal Advisory Committee (ASRAC). For more information, please visit the ASRAC page.

  11. State Energy Efficient Appliance Rebate Program (SEEARP) reports...

    Open Energy Info (EERE)

    The successes and challenges of SEEARP provide valuable lessons for designing and running a consumer-focused appliance rebate program. In addition to the SEEARP reports...

  12. BSH Home Appliances: Proposed Penalty (2014-CE-23013)

    Broader source: Energy.gov [DOE]

    DOE alleged in a Notice of Proposed Civil Penalty that BSH Home Appliances Corporation failed to certify cooking products as compliant with the applicable energy conservation standards.

  13. T-588: HP Virtual SAN Appliance Stack Overflow

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in HP StorageWorks P4000 Virtual SAN Appliance Software, which can be exploited by malicious people to compromise a vulnerable system.

  14. Microwave vs. Electric Kettle: Which Appliance Is in Hot Water...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    is more efficient? Tell Us Addthis Microwave or electric kettle, which appliance should win the honor of heating your water? | Graphic by Stacy Buchanan, National Renewable Energy...

  15. Buying an Appliance this Holiday Season? ENERGY STAR Products...

    Office of Environmental Management (EM)

    Freezers Room air conditioners Televisions Clothes washers Dishwashers Battery chargers Water heaters Fluorescent lamp ballasts Incandescent reflector lamps If your appliance has...

  16. Information Security Governance: When Compliance Becomes more Important than Security

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    Information Security Governance: When Compliance Becomes more Important than Security Terence Tan1 information security must adapt to changing conditions by extending security governance to middle management for implementing information security are more interested in complying with organizational standards and policies

  17. 9th Semi-Annual Report to Congress on Appliance Energy Efficiency...

    Office of Environmental Management (EM)

    to Congress on Appliance Energy Efficiency Rulemakings - Implementation Report: Energy Conservation Standards Activities 9th Semi-Annual Report to Congress on Appliance Energy...

  18. 3rd Semi-Annual Report to Congress on Appliance Energy-Efficiency...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    to Congress on Appliance Energy-Efficiency Rulemakings - Implementation Report: Energy Conservation Standards Activities 3rd Semi-Annual Report to Congress on Appliance...

  19. 17TH SEMI-ANNUAL REPORT TO CONGRESS ON APPLIANCE ENERGY EFFICIENCY...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    TO CONGRESS ON APPLIANCE ENERGY EFFICIENCY RULEMAKINGS - IMPLEMENTATION REPORT: ENERGY CONSERVATION STANDARDS ACTIVITIES 17TH SEMI-ANNUAL REPORT TO CONGRESS ON APPLIANCE ENERGY...

  20. 16th Semi-Annual Report to Congress on Appliance Energy Efficiency...

    Office of Environmental Management (EM)

    to Congress on Appliance Energy Efficiency Rulemakings - Implementation Report: Energy Conservation Standards Activities 16th Semi-Annual Report to Congress on Appliance Energy...

  1. 5th Semi-Annual Report to Congress on Appliance Energy-Efficiency...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    to Congress on Appliance Energy-Efficiency Rulemakings - Implementation Report: Energy Conservation Standards Activities 5th Semi-Annual Report to Congress on Appliance...

  2. 7th Semi-Annual Report to Congress on Appliance Energy Efficiency...

    Office of Environmental Management (EM)

    to Congress on Appliance Energy Efficiency Rulemakings - Implementation Report: Energy Conservation Standards Activities 7th Semi-Annual Report to Congress on Appliance Energy...

  3. 14th Semi-Annual Report to Congress on Appliance Energy Efficiency...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    to Congress on Appliance Energy Efficiency Rulemakings Implementation Report: Energy Conservation Standards Activities 14th Semi-Annual Report to Congress on Appliance Energy...

  4. Predicting Backdrafting and Spillage for Natural-Draft Gas Combustion Appliances: Validating VENT-II

    E-Print Network [OSTI]

    Rapp, Vi H.

    2014-01-01T23:59:59.000Z

    for Natural-Draft Gas Combustion Appliances: Validatingfor Natural-Draft Gas Combustion Appliances: A Validation ofs ability to predict combustion gas spillage events due to

  5. Data Availability in Appliance Standards and Labeling Program Development and Evaluation

    E-Print Network [OSTI]

    Romankiewicz, John

    2014-01-01T23:59:59.000Z

    by design option) Data Availability and Use InternationallyData Availability in Appliance Standards and Labelingemployer. Data Availability in Appliance Standards and

  6. Trends in the cost of efficiency for appliances and consumer electronics

    E-Print Network [OSTI]

    Desroches, Louis-Benoit

    2013-01-01T23:59:59.000Z

    appliances and consumer electronics Louis-Benoit Desroches,appliances and consumer electronics have decreased in realappliances and consumer electronics are likely to diminish

  7. U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass...

    Broader source: Energy.gov (indexed) [DOE]

    7: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative Access U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass...

  8. Tips: Shopping for Appliances | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov. Are you sure you want toworldPower 2010 1 TNews &Appliances Tips: Shopping for

  9. Tips: Smart Appliances | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov. Are you sure you want toworldPower 2010 1 TNews &Appliances Tips:

  10. Appliance Standards Awareness Project | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov. Are you0 ARRA NewslettersPartnership of the Americasfor a Clean EnergyAppliance

  11. Appliance Equipment Standards Northwest Impact Study

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProductsAlternative FuelsSanta3 TableimpurityAppeals8I.1,,AttachmentAppliance

  12. Appliances and Commercial Equipment Standards: Guidance

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProductsAlternative FuelsSanta3Appliance and Equipment Standards Fact

  13. appliance energy testing: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    appliance energy testing First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Energy Star Appliances 1 Texas...

  14. Utility Rebates for ENERGY STAR Appliances: Are They Effective?

    E-Print Network [OSTI]

    cost. The World Energy Outlook 2009, published by the International Energy Agency (IEA), highlightsUtility Rebates for ENERGY STAR Appliances: Are They Effective? Souvik Datta Sumeet Gulati CEPE;UTILITY REBATES FOR ENERGY STAR APPLIANCES: ARE THEY EFFECTIVE? SOUVIK DATTA ETH Zurich SUMEET GULATI

  15. Introducing a digital library reading appliance into a reading group

    E-Print Network [OSTI]

    Marshall, Cathy

    Introducing a digital library reading appliance into a reading group Catherine C. Marshall, Morgan will we read digital library materials? This paper describes the reading practices of an on-going reading group, and how these practices changed when we introduced XLibris, a digital library reading appliance

  16. Load Component Database of Household Appliances and Small Office Equipment

    SciTech Connect (OSTI)

    Lu, Ning; Xie, YuLong; Huang, Zhenyu; Puyleart, Francis; Yang, Steve

    2008-07-24T23:59:59.000Z

    This paper discusses the development of a load component database for household appliances and office equipment. To develop more accurate load models at both transmission and distribution level, a better understanding on the individual behaviors of home appliances and office equipment under power system voltage and frequency variations becomes more and more critical. Bonneville Power Administration (BPA) has begun a series of voltage and frequency tests against home appliances and office equipments since 2005. Since 2006, Researchers at Pacific Northwest National Laboratory has collaborated with BPA personnel and developed a load component database based on these appliance testing results to facilitate the load model validation work for the Western Electricity Coordinating Council (WECC). In this paper, the testing procedure and testing results are first presented. The load model parameters are then derived and grouped. Recommendations are given for aggregating the individual appliance models to feeder level, the models of which are used for distribution and transmission level studies.

  17. Waste water heat recovery appliance. Final report

    SciTech Connect (OSTI)

    Chapin, H.D.; Armstrong, P.R.; Chapin, F.A.W.

    1983-11-21T23:59:59.000Z

    An efficient convective waste heat recovery heat exchanger was designed and tested. The prototype appliance was designed for use in laundromats and other small commercial operations which use large amounts of hot water. Information on general characteristics of the coin-op laundry business, energy use in laundromats, energy saving resources already in use, and the potential market for energy saving devices in laundromats was collected through a literature search and interviews with local laundromat operators in Fort Collins, Colorado. A brief survey of time-use patterns in two local laundromats was conducted. The results were used, with additional information from interviews with owners, as the basis for the statistical model developed. Mathematical models for the advanced and conventional types were developed and the resulting computer program listed. Computer simulations were made using a variety of parameters; for example, different load profiles, hold-up volumes, wall resistances, and wall areas. The computer simulation results are discussed with regard to the overall conclusions. Various materials were explored for use in fabricating the appliance. Resistance to corrosion, workability, and overall suitability for laundromat installations were considered for each material.

  18. Incorporating Experience Curves in Appliance Standards Analysis

    SciTech Connect (OSTI)

    Garbesi, Karina; Chan, Peter; Greenblatt, Jeffery; Kantner, Colleen; Lekov, Alex; Meyers, Stephen; Rosenquist, Gregory; Buskirk, Robert Van; Yang, Hung-Chia; Desroches, Louis-Benoit

    2011-10-31T23:59:59.000Z

    The technical analyses in support of U.S. energy conservation standards for residential appliances and commercial equipment have typically assumed that manufacturing costs and retail prices remain constant during the projected 30-year analysis period. There is, however, considerable evidence that this assumption does not reflect real market prices. Costs and prices generally fall in relation to cumulative production, a phenomenon known as experience and modeled by a fairly robust empirical experience curve. Using price data from the Bureau of Labor Statistics, and shipment data obtained as part of the standards analysis process, we present U.S. experience curves for room air conditioners, clothes dryers, central air conditioners, furnaces, and refrigerators and freezers. These allow us to develop more representative appliance price projections than the assumption-based approach of constant prices. These experience curves were incorporated into recent energy conservation standards for these products. The impact on the national modeling can be significant, often increasing the net present value of potential standard levels in the analysis. In some cases a previously cost-negative potential standard level demonstrates a benefit when incorporating experience. These results imply that past energy conservation standards analyses may have undervalued the economic benefits of potential standard levels.

  19. Catalog of DC Appliances and Power Systems

    E-Print Network [OSTI]

    Garbesi, Karina

    2012-01-01T23:59:59.000Z

    Other Electric Water Heaters Solar Water Heaters ColorSecurity Systems Solar Water Heaters Spas See standby/lowGeothermal Heat Pumps Solar Water Heaters Electric Heat

  20. Catalog of DC Appliances and Power Systems

    E-Print Network [OSTI]

    Garbesi, Karina

    2012-01-01T23:59:59.000Z

    Electric Water Heaters Solar Water Heaters Color TelevisionsSecurity Systems Solar Water Heaters Spas See standby/lowGeothermal Heat Pumps Solar Water Heaters Electric Heat

  1. Using Hidden Markov Models for Iterative Non-intrusive Appliance Monitoring

    E-Print Network [OSTI]

    Southampton, University of

    Using Hidden Markov Models for Iterative Non-intrusive Appliance Monitoring Oliver Parson, Hampshire, SO17 1BJ, UK {op106,sg2,mjw,acr}@ecs.soton.ac.uk Abstract Non-intrusive appliance load monitoring appliances. 1 Introduction Non-intrusive appliance load monitoring (NIALM), or energy disaggregation, aims

  2. Nebraska Appliance Rebate Program opens | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Appliance Rebate Program opens July 12, 2010 - 4:00pm Addthis Lindsay Gsell Nearly 500 people lined up outside of Omaha's Nebraska Furniture Mart on July 6, waiting to get ENERGY...

  3. Innovative Concept Appliances: Proposed Penalty (2010-CE-03/0415)

    Broader source: Energy.gov [DOE]

    DOE alleged in a Notice of Proposed Civil Penalty that Innovative Concept Appliances, LLC, failed to certify a variety of residential clothes washers and clothes dryers as compliant with the applicable energy conservation standards.

  4. ASKO Appliances: Proposed Penalty (2010-CE-04/0614)

    Broader source: Energy.gov [DOE]

    DOE alleged in a Notice of Proposed Civil Penalty that ASKO Appliances, Inc. failed to certify a variety of residential dishwashers and clothes dryers as compliant with the applicable energy conservation standards.

  5. Midea Washing Appliance: Proposed Penalty (2011-CE-1903)

    Broader source: Energy.gov [DOE]

    DOE alleged in a Notice of Proposed Civil Penalty that Midea Washing Appliances Mfg. Co., Ltd. failed to certify a variety of dishwashers as compliant with the applicable water and energy conservation standards.

  6. Sales Tax Holiday for Energy-Efficient Appliances

    Broader source: Energy.gov [DOE]

    The state of Missouri offers consumers a seven-day ''exemption from state sales taxes'' on certain Energy Star certified new appliances. The state sales tax holiday, known as the "Show-Me Green...

  7. Detailed Modeling and Response of Demand Response Enabled Appliances

    SciTech Connect (OSTI)

    Vyakaranam, Bharat; Fuller, Jason C.

    2014-04-14T23:59:59.000Z

    Proper modeling of end use loads is very important in order to predict their behavior, and how they interact with the power system, including voltage and temperature dependencies, power system and load control functions, and the complex interactions that occur between devices in such an interconnected system. This paper develops multi-state time variant residential appliance models with demand response enabled capabilities in the GridLAB-DTM simulation environment. These models represent not only the baseline instantaneous power demand and energy consumption, but the control systems developed by GE Appliances to enable response to demand response signals and the change in behavior of the appliance in response to the signal. These DR enabled appliances are simulated to estimate their capability to reduce peak demand and energy consumption.

  8. Modeling diffusion of electrical appliances in the residential sector

    SciTech Connect (OSTI)

    McNeil, Michael A.; Letschert, Virginie E.

    2009-11-22T23:59:59.000Z

    This paper presents a methodology for modeling residential appliance uptake as a function of root macroeconomic drivers. The analysis concentrates on four major energy end uses in the residential sector: refrigerators, washing machines, televisions and air conditioners. The model employs linear regression analysis to parameterize appliance ownership in terms of household income, urbanization and electrification rates according to a standard binary choice (logistic) function. The underlying household appliance ownership data are gathered from a variety of sources including energy consumption and more general standard of living surveys. These data span a wide range of countries, including many developing countries for which appliance ownership is currently low, but likely to grow significantly over the next decades as a result of economic development. The result is a 'global' parameterization of appliance ownership rates as a function of widely available macroeconomic variables for the four appliances studied, which provides a reliable basis for interpolation where data are not available, and forecasting of ownership rates on a global scale. The main value of this method is to form the foundation of bottom-up energy demand forecasts, project energy-related greenhouse gas emissions, and allow for the construction of detailed emissions mitigation scenarios.

  9. Electrical appliance energy consumption control methods and electrical energy consumption systems

    DOE Patents [OSTI]

    Donnelly, Matthew K. (Kennewick, WA); Chassin, David P. (Pasco, WA); Dagle, Jeffery E. (Richland, WA); Kintner-Meyer, Michael (Richland, WA); Winiarski, David W. (Kennewick, WA); Pratt, Robert G. (Kennewick, WA); Boberly-Bartis, Anne Marie (Alexandria, VA)

    2008-09-02T23:59:59.000Z

    Electrical appliance energy consumption control methods and electrical energy consumption systems are described. In one aspect, an electrical appliance energy consumption control method includes providing an electrical appliance coupled with a power distribution system, receiving electrical energy within the appliance from the power distribution system, consuming the received electrical energy using a plurality of loads of the appliance, monitoring electrical energy of the power distribution system, and adjusting an amount of consumption of the received electrical energy via one of the loads of the appliance from an initial level of consumption to an other level of consumption different than the initial level of consumption responsive to the monitoring.

  10. Electrical appliance energy consumption control methods and electrical energy consumption systems

    DOE Patents [OSTI]

    Donnelly, Matthew K. (Kennewick, WA); Chassin, David P. (Pasco, WA); Dagle, Jeffery E. (Richland, WA); Kintner-Meyer, Michael (Richland, WA); Winiarski, David W. (Kennewick, WA); Pratt, Robert G. (Kennewick, WA); Boberly-Bartis, Anne Marie (Alexandria, VA)

    2006-03-07T23:59:59.000Z

    Electrical appliance energy consumption control methods and electrical energy consumption systems are described. In one aspect, an electrical appliance energy consumption control method includes providing an electrical appliance coupled with a power distribution system, receiving electrical energy within the appliance from the power distribution system, consuming the received electrical energy using a plurality of loads of the appliance, monitoring electrical energy of the power distribution system, and adjusting an amount of consumption of the received electrical energy via one of the loads of the appliance from an initial level of consumption to an other level of consumption different than the initial level of consumption responsive to the monitoring.

  11. Apartment Hunting Checklist FURNITURE AND APPLIANCES

    E-Print Network [OSTI]

    Kravets, Robin

    ), close and lock? Hallway & outdoor lighting sufficient? STATE OF REPAIR Doors & windows fit securely light fixture covers broken or missing? Covers on light switches & electrical outlets? Electrical to be replaced? Cleaned? Enough light in each room? Need lamps? DON'T FORGET TO CHECK Enough electrical outlets

  12. Predicting Backdrafting and Spillage for Natural-Draft Gas Combustion Appliances: Validating VENT-II

    E-Print Network [OSTI]

    1 Predicting Backdrafting and Spillage for Natural-Draft Gas Combustion Appliances: Validating VENT. "Predicting Backdrafting and Spillage for Natural-Draft Gas Combustion Appliances: A Validation of VENT

  13. Data port security lock

    DOE Patents [OSTI]

    Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

    2008-06-24T23:59:59.000Z

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  14. Impacts of China's Current Appliance Standards and Labeling Program to 2020

    E-Print Network [OSTI]

    Fridley, David; Aden, Nathaniel; Zhou, Nan; Lin, Jiang

    2007-01-01T23:59:59.000Z

    coal-fired electricity generation in China, appliance standards and labeling programs also help to mitigate air-pollution

  15. 11th Semi-Annual Report to Congress on Appliance Energy Efficiency...

    Office of Environmental Management (EM)

    Energy Conservation Standards Activities Buildings Home About Emerging Technologies Residential Buildings Commercial Buildings Appliance & Equipment Standards Building Energy Codes...

  16. Comment submitted by BSH Home Appliances Corporation regarding the Energy Star Verification Testing Program

    Broader source: Energy.gov [DOE]

    This document is a comment submitted by BSH Home Appliances Corporation regarding the Energy Star Verification Testing Program

  17. Filing Information: April 2009, IDC #217829, Volume: 1 Secure Content and Threat Management Products: Vendor Profile

    E-Print Network [OSTI]

    of major vendors, such as IBM, can expect to thrive and diversify their portfolio within this market's security solutions portfolio, which already includes a broad range of solutions spanning a variety solutions into the Tivoli portfolio and introduced an all- in-one low-cost security appliance for small

  18. COMPRESSIVE SAMPLING FOR NON-INTRUSIVE APPLIANCE LOAD MONITORING (NALM) USING CURRENT WAVEFORMS

    E-Print Network [OSTI]

    Leus, Geert

    COMPRESSIVE SAMPLING FOR NON-INTRUSIVE APPLIANCE LOAD MONITORING (NALM) USING CURRENT WAVEFORMS advanced services like dynamic electricity pricing. The non-intrusive appliance load monitoring (NALM) [1/off status of each appliance from the compressed measurement as if the original non-compressed measurement

  19. Nonserial Dynamic Programming with Applications in Smart Home Appliances Scheduling Part I: Precedence Graph Simplification

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    Nonserial Dynamic Programming with Applications in Smart Home Appliances Scheduling Part I-- In this and a companion paper a dynamic pro- gramming (DP) approach to solve a smart home appliances scheduling problem to the smart home appliances scheduling problem considered in [1], [2]. The problem seeks to determine

  20. Appliance Efficiency Standards and Price Discrimination

    SciTech Connect (OSTI)

    Spurlock, Cecily Anna

    2013-05-08T23:59:59.000Z

    I explore the effects of two simultaneous changes in minimum energy efficiency and ENERGY STAR standards for clothes washers. Adapting the Mussa and Rosen (1978) and Ronnen (1991) second-degree price discrimination model, I demonstrate that clothes washer prices and menus adjusted to the new standards in patterns consistent with a market in which firms had been price discriminating. In particular, I show evidence of discontinuous price drops at the time the standards were imposed, driven largely by mid-low efficiency segments of the market. The price discrimination model predicts this result. On the other hand, in a perfectly competition market, prices should increase for these market segments. Additionally, new models proliferated in the highest efficiency market segment following the standard changes. Finally, I show that firms appeared to use different adaptation strategies at the two instances of the standards changing.

  1. COOKING APPLIANCE USE IN CALIFORNIA HOMES--DATA

    E-Print Network [OSTI]

    COOKING APPLIANCE USE IN CALIFORNIA HOMES--DATA COLLECTED FROM A WEB-BASED SURVEY Victoria L. Klug, Agnes B. Lobscheid, and Brett C. Singer Environmental Energy Technologies Division August 2011 LBNL-5028 FROM A WEB-BASED SURVEY Victoria L. Klug, Agnes B. Lobscheid, and Brett C. Singer Indoor Environment

  2. Smart Meter Deployment Optimization for Efficient Electrical Appliance State Monitoring

    E-Print Network [OSTI]

    Wang, Yongcai

    appliances in buildings has attracted great attentions for smart, green and sustainable living. Traditional hard, greedy algorithm, approxi- mation ratio, smart building, sensor network I. INTRODUCTION in such buildings, researches in the field of smart building and smart grid are exploring an efficient energy

  3. Monitoring Massive Appliances by a Minimal Number of Smart Meters

    E-Print Network [OSTI]

    Wang, Yongcai

    56 Monitoring Massive Appliances by a Minimal Number of Smart Meters YONGCAI WANG, XIAOHONG HAO. This article presents a framework for deploying a minimal number of smart meters to accurately track the ON of required smart meters is studied by an entropy-based approach, which qualifies the impact of meter

  4. Leveraging smart meter data to recognize home appliances Markus Weiss+#

    E-Print Network [OSTI]

    Leveraging smart meter data to recognize home appliances Markus Weiss+# , Adrian Helfenstein -- The worldwide adoption of smart meters that measure and communicate residential electricity consumption gives demand. In this paper we present an infrastructure and a set of algorithms that make use of smart meters

  5. Rebound Effect in Energy Efficient Appliance Adopting Households

    E-Print Network [OSTI]

    Glenn, Jacob Matthew

    2014-12-10T23:59:59.000Z

    This paper uses data from smart meter technology to estimate the occurrence of energy rebound, a substitution and income effect where the price-per-use of an appliance falls relative to its energy efficiency. This causes households to have more...

  6. Combustion Safety for Appliances Using Indoor Air (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2014-05-01T23:59:59.000Z

    This measure guideline covers how to assess and carry out the combustion safety procedures for appliances and heating equipment that uses indoor air for combustion in low-rise residential buildings. Only appliances installed in the living space, or in an area freely communicating with the living space, vented alone or in tandem with another appliance are considered here. A separate measure guideline addresses combustion appliances located either within the living space in enclosed closets or side rooms or outside the living space in an adjacent area like an attic or garage that use outdoor air for combustion. This document is for inspectors, auditors, and technicians working in homes where energy upgrades are being conducted whether or not air infiltration control is included in the package of measures being applied. In the indoor combustion air case, guidelines summarized here are based on language provided in several of the codes to establish minimum requirements for the space using simplified prescriptive measures. In addition, building performance testing procedures are provided by testing agencies. The codes in combination with the test procedures offer comprehensive combustion safety coverage to address safety concerns, allowing inexperienced residential energy retrofit inspectors to effectively address combustion safety issues and allow energy retrofits to proceed.

  7. ISSUANCE 2015-06-08: Solicitation of Nominations for Membership on the Appliance Standards and Rulemaking Federal Advisory Committee

    Broader source: Energy.gov [DOE]

    Solicitation of Nominations for Membership on the Appliance Standards and Rulemaking Federal Advisory Committee

  8. A System for Smart Home Control of Appliances based on Timer and Speech Interaction

    E-Print Network [OSTI]

    Haque, S M Anamul; Islam, Md Ashraful

    2010-01-01T23:59:59.000Z

    The main objective of this work is to design and construct a microcomputer based system: to control electric appliances such as light, fan, heater, washing machine, motor, TV, etc. The paper discusses two major approaches to control home appliances. The first involves controlling home appliances using timer option. The second approach is to control home appliances using voice command. Moreover, it is also possible to control appliances using Graphical User Interface. The parallel port is used to transfer data from computer to the particular device to be controlled. An interface box is designed to connect the high power loads to the parallel port. This system will play an important role for the elderly and physically disable people to control their home appliances in intuitive and flexible way. We have developed a system, which is able to control eight electric appliances properly in these three modes.

  9. Modeling of GE Appliances: Cost Benefit Study of Smart Appliances in Wholesale Energy, Frequency Regulation, and Spinning Reserve Markets

    SciTech Connect (OSTI)

    Fuller, Jason C.; Parker, Graham B.

    2012-12-31T23:59:59.000Z

    This report is the second in a series of three reports describing the potential of GEs DR-enabled appliances to provide benefits to the utility grid. The first report described the modeling methodology used to represent the GE appliances in the GridLAB-D simulation environment and the estimated potential for peak demand reduction at various deployment levels. The third report will explore the technical capability of aggregated group actions to positively impact grid stability, including frequency and voltage regulation and spinning reserves, and the impacts on distribution feeder voltage regulation, including mitigation of fluctuations caused by high penetration of photovoltaic distributed generation. In this report, a series of analytical methods were presented to estimate the potential cost benefit of smart appliances while utilizing demand response. Previous work estimated the potential technical benefit (i.e., peak reduction) of smart appliances, while this report focuses on the monetary value of that participation. The effects on wholesale energy cost and possible additional revenue available by participating in frequency regulation and spinning reserve markets were explored.

  10. Delegating Network Security with More Information

    E-Print Network [OSTI]

    Naous, Jad

    Network security is gravitating towards more centralized control. Strong centralization places a heavy burden on the administrator who has to manage complex security policies and be able to adapt to users' requests. To be ...

  11. Design Considerations for Frequency Responsive Grid Friendly Appliances

    SciTech Connect (OSTI)

    Lu, Ning; Hammerstrom, Donald J.

    2006-05-24T23:59:59.000Z

    The paper addresses design considerations for frequency responsive Grid FriendlyTM appliances (FR-GFAs). Case studies have been done based on the frequency data collected in 2003 in Western Electricity Coordinating Council (WECC) systems. An FR-GFA can turn on/off based on frequency signals and make selective low-frequency load shedding possible at appliance level. FR-GFAs can also be treated as an spinning reserve to maintain a load-to-generation balance under power system normal operation states. The triggering frequency and duration of the FR-GFA device with different frequency setting schemes are simulated. Design considerations of the FR-GFA are then discussed based on simulation results.

  12. Progress toward Producing Demand-Response-Ready Appliances

    SciTech Connect (OSTI)

    Hammerstrom, Donald J.; Sastry, Chellury

    2009-12-01T23:59:59.000Z

    This report summarizes several historical and ongoing efforts to make small electrical demand-side devices like home appliances more responsive to the dynamic needs of electric power grids. Whereas the utility community often reserves the word demand response for infrequent 2 to 6 hour curtailments that reduce total electrical system peak load, other beneficial responses and ancillary services that may be provided by responsive electrical demand are of interest. Historically, demand responses from the demand side have been obtained by applying external, retrofitted, controlled switches to existing electrical demand. This report is directed instead toward those manufactured products, including appliances, that are able to provide demand responses as soon as they are purchased and that require few, or no, after-market modifications to make them responsive to needs of power grids. Efforts to be summarized include Open Automated Demand Response, the Association of Home Appliance Manufacturer standard CHA 1, a simple interface being developed by the U-SNAP Alliance, various emerging autonomous responses, and the recent PinBus interface that was developed at Pacific Northwest National Laboratory.

  13. Laboratory Testing of Demand-Response Enabled Household Appliances

    SciTech Connect (OSTI)

    Sparn, B.; Jin, X.; Earle, L.

    2013-10-01T23:59:59.000Z

    With the advent of the Advanced Metering Infrastructure (AMI) systems capable of two-way communications between the utility's grid and the building, there has been significant effort in the Automated Home Energy Management (AHEM) industry to develop capabilities that allow residential building systems to respond to utility demand events by temporarily reducing their electricity usage. Major appliance manufacturers are following suit by developing Home Area Network (HAN)-tied appliance suites that can take signals from the home's 'smart meter,' a.k.a. AMI meter, and adjust their run cycles accordingly. There are numerous strategies that can be employed by household appliances to respond to demand-side management opportunities, and they could result in substantial reductions in electricity bills for the residents depending on the pricing structures used by the utilities to incent these types of responses.The first step to quantifying these end effects is to test these systems and their responses in simulated demand-response (DR) conditions while monitoring energy use and overall system performance.

  14. An Analysis of the Price Elasticity of Demand for Household Appliances

    SciTech Connect (OSTI)

    Fujita, Kimberly; Dale, Larry; Fujita, K. Sydny

    2008-01-25T23:59:59.000Z

    This report summarizes our study of the price elasticity of demand for home appliances, including refrigerators, clothes washers, and dishwashers. In the context of increasingly stringent appliance standards, we are interested in what kind of impact the increased manufacturing costs caused by higher efficiency requirements will have on appliance sales. We begin with a review of existing economics literature describing the impact of economic variables on the sale of durable goods.We then describe the market for home appliances and changes in this market over the past 20 years, performing regression analysis on the shipments of home appliances and relevant economic variables including changes to operating cost and household income. Based on our analysis, we conclude that the demand for home appliances is price inelastic.

  15. Pacific Northwest GridWise Testbed Demonstration Projects; Part II. Grid Friendly Appliance Project

    SciTech Connect (OSTI)

    Hammerstrom, Donald J.; Brous, Jerry; Chassin, David P.; Horst, Gale R.; Kajfasz, Robert; Michie, Preston; Oliver, Terry V.; Carlon, Teresa A.; Eustis, Conrad; Jarvegren, Olof M.; Marek, W.; Munson, Ryan L.; Pratt, Robert G.

    2007-10-01T23:59:59.000Z

    Fifty residential electric water heaters and 150 new residential clothes dryers were modified to respond to signals received from underfrequency, load-shedding appliance controllers. Each controller monitored the power-grid voltage signal and requested that electrical load be shed by its appliance whenever electric power-grid frequency fell below 59.95 Hz. The controllers and their appliances were installed and monitored for more than a year at residential sites at three locations in Washington and Oregon. The controllers and their appliances responded reliably to each shallow underfrequency eventan average of one event per dayand shed their loads for the durations of these events. Appliance owners reported that the appliance responses were unnoticed and caused little or no inconvenience for the homes occupants.

  16. Load control in low voltage level of the electricity grid using CHP appliances

    E-Print Network [OSTI]

    Al Hanbali, Ahmad

    1 Load control in low voltage level of the electricity grid using µCHP appliances M.G.C. Bosman, V.g.c.bosman@utwente.nl Abstract--The introduction of µCHP (Combined Heat and Power) appliances and other means of distributed on the transformers and, thus, on the grid. In this work we study the influence of introducing µCHP appliances

  17. Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

  18. 6th Semi-Annual Report to Congress on Appliance Energy Efficiency...

    Broader source: Energy.gov (indexed) [DOE]

    to Congress on Appliance Energy Efficiency Rulemakings - Implementation Report: Energy Conservation Standards Activities, as issued by the Assistant Secretary on February 2009....

  19. 8th Semi-Annual Report to Congress on Appliance Energy Efficiency...

    Broader source: Energy.gov (indexed) [DOE]

    to Congress on Appliance Energy Efficiency Rulemakings - Implementation Report: Energy Conservation Standards Activities, as issued by the Deputy Assistant Secretary on February...

  20. 2nd Semi-Annual Report to Congress on Appliance Energy-Efficiency...

    Broader source: Energy.gov (indexed) [DOE]

    to Congress on Appliance Energy-Efficiency Rulemakings - Implementation Report: Energy Conservation Standards Activities, as issued by the Assistant Secretary on February 2007....

  1. 15th Semi-Annual Report to Congress on Appliance Energy Efficiency...

    Broader source: Energy.gov (indexed) [DOE]

    Congress on Appliance Energy Efficiency Rulemakings - Implementation Report: Energy Conservation Standards Activities, as issued by the Assistant Secretary on February 2014....

  2. 4th Semi-Annual Report to Congress on Appliance Energy-Efficiency...

    Broader source: Energy.gov (indexed) [DOE]

    to Congress on Appliance Energy-Efficiency Rulemakings - Implementation Report: Energy Conservation Standards Activities, as issued by the Assistant Secretary on February 2008....

  3. 10th Semi-Annual Report to Congress on Appliance Energy Efficiency...

    Broader source: Energy.gov (indexed) [DOE]

    to Congress on Appliance Energy Efficiency Rulemakings - Implementation Report: Energy Conservation Standards Activities, as issued by the Assistant Secretary on August 2011....

  4. 1st Semi-Annual Report to Congress on Appliance Energy-Efficiency...

    Broader source: Energy.gov (indexed) [DOE]

    to Congress on Appliance Energy-Efficiency Rulemakings - Implementation Report: Energy Conservation Standards Activities, as issued by the Assistant Secretary on August 2006....

  5. Pollutant Emission Factors from Residential Natural Gas Appliances: A Literature Review

    E-Print Network [OSTI]

    Traynor, G.W.

    2011-01-01T23:59:59.000Z

    journals related to natural gas combustion and air pollutionemitted from natural gas combustion are predominately lessNatural Gas- fired Appliances," Proceedings: How Significant Are Residential Combustion

  6. Impacts of Imported Liquefied Natural Gas on Residential Appliance Components: Literature Review

    E-Print Network [OSTI]

    Lekov, Alex

    2010-01-01T23:59:59.000Z

    Fundamentals of Gas Combustion. 2001: Washington, DC. 131Components A gas appliance combustion system accomplishestransfers energy from hot combustion gases to water or air

  7. Pollutant Emission Factors from Residential Natural Gas Appliances: A Literature Review

    E-Print Network [OSTI]

    Traynor, G.W.

    2011-01-01T23:59:59.000Z

    related to natural gas combustion and air pollution wereemitted from natural gas combustion are predominately lessGas- fired Appliances," Proceedings: How Significant Are Residential Combustion

  8. Impacts of Imported Liquefied Natural Gas on Residential Appliance Components: Literature Review

    E-Print Network [OSTI]

    Lekov, Alex

    2010-01-01T23:59:59.000Z

    which, in the case of home heating appliances, could resultHeaters, Direct Heating Equipment, Mobile Home Furnaces,Heaters, Direct Heating Equipment, Mobile Home Furnaces,

  9. Database Security: A Historical Perspective

    E-Print Network [OSTI]

    Lesov, Paul

    2010-01-01T23:59:59.000Z

    The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

  10. New energy test procedures for refrigerators and other appliances

    SciTech Connect (OSTI)

    Meier, Alan; Ernebrant, Stefan; Kawamoto, Kaoru; Wihlborg, Mats

    1999-04-01T23:59:59.000Z

    Many innovations in refrigerator design rely on microprocessors, sensors, and algorithms to control automatic defrost, variable speed,and other features. Even though these features strongly influence energy consumption, the major energy test procedures presently test only a refrigerator's mechanical efficiency and ignore the ''software'' aspects. We describe a new test procedure where both ''hardware'' and ''software'' tests are fed into a dynamic simulation model. A wide range of conditions can be tested and simulated. This approach promotes international harmonization because the simulation model can also be programmed to estimate energy use for the ISO, DOE, or JIS test. The approach outlined for refrigerators can also be applied to other appliances.

  11. Appliance energy efficiency in new home construction. Final report

    SciTech Connect (OSTI)

    Not Available

    1980-11-30T23:59:59.000Z

    A survey of 224 builders was conducted to which 160 builders responded. Each respondent completed between one and seven separate questionnaires. Each of the seven questionnaires were designed to collect information about one type of equipment or major appliance. These are: heat pump; heating system; air conditioner; domestic water heater; dishwasher; range; and refrigerator. Analysis of the resulting 406 questionnaires indicated that builders were primarily responsible for brand selection. These choices were made primarily without regard for the energy efficiency of the product. A similar apparent lack of consideration of energy efficiency during brand and model selection was found among home buyers and specialized subcontractors.

  12. A State-Queueing Model of Thermostatically Controlled Appliances

    SciTech Connect (OSTI)

    Lu, Ning; Chassin, David P.

    2004-08-01T23:59:59.000Z

    This paper develops a new method to analyze the price response of aggregated loads consisting of thermostatically controlled appliances (TCAs). Assuming a perfectly diversified load before the price response, we show that TCA setpoint changes in response to the market price will result in a redistribution of TCAs in on/off states and therefore change the probabilities for a unit to reside in each state. A randomly distributed load can be partially synchronized and the aggregated diversity lost. The lost of the load diversity can then create unexpected dynamics in the aggregated load profile. Raising issues such as restoring load diversity and damping the peak loads are also addressed in the paper.

  13. GE Appliances: Order (2012-SE-1403) | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO2: FinalOffers3.pdf0-45.pdf0 Budget Fossil EnergyFull Text ManagementDOEGE Appliances: Order

  14. DOE Issues Final Appliance Test Procedure Rule | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 111 1,613PortsmouthBartlesvilleAbout »Department of2 DOE F 1300.2Million) GoDOEMedicalAppliance

  15. Appliance and Equipment Standards Program | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov. Are you sure you want toworldPower 2010 1A PotentialAllison CaseyAnnualAppliance and

  16. Research & Development Roadmap: Next-Generation Appliances | Department of

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_CostNSAR -Department ofEMSpent NuclearEnergy Appliances Research

  17. Save Energy on Appliances this Holiday Season | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol HomeFacebook Twitter Principal InvestigatorsSave Energy on Appliances this

  18. Estimating Appliance and Home Electronic Energy Use | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the YouTube|6721 FederalTexas EnergyofIdaho | Department of EnergyEstimating Appliance

  19. Appliance Rebates: Frequently Asked Questions | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO Overview OCHCOSystemsProgram OverviewAdvocate -AmirAnnual ReportAppliance Rebates:

  20. Recently a lot of multimedia applications are emerging on portable appliances. They require both the flexibility of

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    Abstract Recently a lot of multimedia applications are emerging on portable appliances and not only prototypes. Reconfigurable FPGA's are particularly suited for multimedia applications on portable appliances. In fact, tomorrow's multimedia applications will require both the flexibility of upgradeable

  1. "Table HC15.10 Home Appliances Usage Indicators by Four Most...

    U.S. Energy Information Administration (EIA) Indexed Site

    AppliancesTools",56.2,5,3.4,4.3,6.2 "Other Appliances Used" "Auto BlockEngineBattery Heater",0.8,"Q","N","N","N" "Hot Tub or Spa",6.7,"Q",0.7,0.5,1.2 "Swimming Pool with...

  2. "Table HC11.10 Home Appliances Usage Indicators by Northeast...

    U.S. Energy Information Administration (EIA) Indexed Site

    AppliancesTools",56.2,12.2,9.4,2.8 "Other Appliances Used" "Auto BlockEngineBattery Heater",0.8,"Q","Q","Q" "Hot Tub or Spa",6.7,1,0.8,0.2 "Swimming Pool with...

  3. "Table HC12.10 Home Appliances Usage Indicators by Midwest Census...

    U.S. Energy Information Administration (EIA) Indexed Site

    AppliancesTools",56.2,12,9,3.1 "Other Appliances Used" "Auto BlockEngineBattery Heater",0.8,0.4,"Q","Q" "Hot Tub or Spa",6.7,1.3,0.9,0.4 "Swimming Pool with...

  4. "Table HC14.10 Home Appliances Usage Indicators by West Census...

    U.S. Energy Information Administration (EIA) Indexed Site

    AppliancesTools",56.2,11.6,3.3,8.2 "Other Appliances Used" "Auto BlockEngineBattery Heater",0.8,0.2,"Q",0.1 "Hot Tub or Spa",6.7,2.2,0.6,1.7 "Swimming Pool with...

  5. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    SciTech Connect (OSTI)

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01T23:59:59.000Z

    Battelles National Security & Defense objective is, applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratorys (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

  6. Cal Poly, San Luis Obispo | University Housing Update to Appliance and Electronic Device Guidelines for Residence Halls

    E-Print Network [OSTI]

    Sze, Lawrence

    Cal Poly, San Luis Obispo | University Housing Update to Appliance and Electronic Device Guidelines guidelines. This guideline notice serves as a campus update to the Appliance and Electronic Device Community appliances and personal care devices being used in the rooms. Often these items are not energy efficient

  7. The Demand Reduction Potential of Smart Appliances in U.S. Homes

    SciTech Connect (OSTI)

    Makhmalbaf, Atefe; Srivastava, Viraj; Parker, Graham B.

    2013-08-14T23:59:59.000Z

    The widespread deployment of demand respond (DR) enabled home appliances is expected to have significant reduction in the demand of electricity during peak hours. The work documented in this paper focuses on estimating the energy shift resulting from the installation of DR enabled smart appliances in the U.S. This estimation is based on analyzing the market for smart appliances and calculating the total energy demand that can potentially be shifted by DR control in appliances. Appliance operation is examined by considering their sub components individually to identify their energy consumptions and savings resulting from interrupting and shifting their load, e.g., by delaying the refrigerator defrost cycle. In addition to major residential appliances, residential pool pumps are also included in this study given their energy consumption profiles that make them favorable for DR applications. In the market analysis study documented in this paper, the U.S. Energy Information Administration's (EIA) Residential Energy Consumption Survey (RECS) and National Association of Home Builders (NAHB) databases are used to examine the expected life of an appliance, the number of appliances installed in homes constructed in 10 year intervals after 1940 and home owner income. Conclusions about the effectiveness of the smart appliances in reducing electrical demand have been drawn and a ranking of appliances in terms of their contribution to load shift is presented. E.g., it was concluded that DR enabled water heaters result in the maximum load shift; whereas, dishwashers have the highest user elasticity and hence the highest potential for load shifting through DR. This work is part of a larger effort to bring novel home energy management concepts and technologies to reduce energy consumption, reduce peak electricity demand, integrate renewables and storage technology, and change homeowner behavior to manage and consume less energy and potentially save consumer energy costs.

  8. Adaptive SSL: Design, Implementation and Overhead Analysis submission for Work-in-Progress/Application Paper track.

    E-Print Network [OSTI]

    Newcastle upon Tyne, University of

    Adaptive SSL: Design, Implementation and Overhead Analysis submission for Work an adaptation controller for SSL (Secure Socket Layer), called Adaptive SSL. 1 Introduction Applications adaptation of the Secure Socket Layer (SSL) protocol [3]. Adaptive SSL (ASSL) aims to provide appropriate se

  9. Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule

    E-Print Network [OSTI]

    Chen, Ing-Ray

    . Intrusion detection systems (IDSs) are security appliances that review audit data to identify cyber attacks is of the utmost importance. An IDS audits UAVs in a distributed system to determine if the UAVs are functioning and opportunistic attacker behaviors (modes which many historical cyber attacks have used) on the effectiveness

  10. Cyber Security

    Energy Savers [EERE]

    Associate CIO for Cyber Security (IM-30) Rod Turk Deputy Associate CIO for Cyber Security (IM-30) Michael Maraya Incident Management Division (IM-32) Rob Ciochon Director Policy,...

  11. information security

    E-Print Network [OSTI]

    Faculty listing for "information security" ... 1167; Phone: +1 765 49-46022; Email: wagstaff@purdue.edu; Research Interests: number theory, information security.

  12. Issues in federal preemption of state appliance energy efficiency regulations

    SciTech Connect (OSTI)

    Fang, J.M.; Balistocky, S.; Schaefler, A.M.

    1982-12-01T23:59:59.000Z

    The findings and conclusions of the analysis of the various issues involved in the federal preemption of state regulations for the DOE no standard rule on covered appliances are summarized. The covered products are: refrigerators, refrigerator-freezers, freezers, clothes dryers, kitchen ranges and ovens, water heaters (excluding heat pump water heaters), room air conditioners, central air conditioners (excluding heat pumps), and furnaces. A detailed discussion of the rationale for the positions of groups offering comment for the record is presneted. The pertinent categories of state and local regulations and programs are explained, then detailed analysis is conducted on the covered products and regulations. Issues relating to the timing of preemption of state regulations are discussed, as well as issues relating to burden of proof, contents of petitions for exemptions from preemption, criteria for evaluating petitions, and procedural and other issues. (LEW)

  13. Efficiency of appliance models on the market before and after DOE standards

    SciTech Connect (OSTI)

    Meyers, Stephen

    2004-06-15T23:59:59.000Z

    Energy efficiency standards for appliances mandate that appliance manufacturers not manufacture or import models that have a test energy efficiency below a specified level after the standard effective date. Thus, appliance standards set a floor for energy efficiency. But do they also induce more significant changes in the efficiencies that manufacturers offer after the standard becomes effective? To address this question, we undertook an examination of before-standard and after-standard efficiency of models on the market for three products: (1) Refrigerators (1990, 1993, and 2001 standards); (2) Room air conditioners (1990 and 2000 standards); and (3) Gas furnaces (1992 standard).

  14. Tom Harper receives cyber security award

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening a solidSynthesisAppliances Tips:Harper receives cyber security

  15. Mitigating Carbon Emissions: the Potential of Improving Efficiency of Household Appliances in China

    E-Print Network [OSTI]

    Lin, Jiang

    2006-01-01T23:59:59.000Z

    in the next 20-30 years as China builds large quantity ofof power generation in China from 0.230 in 2003 to 0.164 kgHousehold Appliances in China Jiang Lin Environmental Energy

  16. Impacts of China's Current Appliance Standards and Labeling Program to 2020

    E-Print Network [OSTI]

    Fridley, David; Aden, Nathaniel; Zhou, Nan; Lin, Jiang

    2007-01-01T23:59:59.000Z

    58: Historical and Forecast China Average Household Size,P ROGRAM Impacts of Chinas Current Appliance Standards and68 Implications for Chinas Current Energy Policy and

  17. Impacts of Imported Liquefied Natural Gas on Residential Appliance Components: Literature Review

    SciTech Connect (OSTI)

    Lekov, Alex; Sturges, Andy; Wong-Parodi, Gabrielle

    2009-12-09T23:59:59.000Z

    An increasing share of natural gas supplies distributed to residential appliances in the U.S. may come from liquefied natural gas (LNG) imports. The imported gas will be of a higher Wobbe number than domestic gas, and there is concern that it could produce more pollutant emissions at the point of use. This report will review recently undertaken studies, some of which have observed substantial effects on various appliances when operated on different mixtures of imported LNG. While we will summarize findings of major studies, we will not try to characterize broad effects of LNG, but describe how different components of the appliance itself will be affected by imported LNG. This paper considers how the operation of each major component of the gas appliances may be impacted by a switch to LNG, and how this local impact may affect overall safety, performance and pollutant emissions.

  18. 0 + 0 = 1 : the appliance model of selling software bundled with hardware

    E-Print Network [OSTI]

    Hein, Bettina

    2007-01-01T23:59:59.000Z

    The business model of selling software bundled with hardware is called the appliance model. As hardware becomes less and less expensive and open source software is being offered for free, the traditional business model of ...

  19. Table HC15.10 Home Appliances Usage Indicators by Four Most...

    Gasoline and Diesel Fuel Update (EIA)

    Tools... 56.2 5.0 3.4 4.3 6.2 Other Appliances Used Auto BlockEngineBattery Heater... 0.8 Q N N N Hot Tub or Spa......

  20. "Table HC9.10 Home Appliances Usage Indicators by Climate Zone...

    U.S. Energy Information Administration (EIA) Indexed Site

    0 Home Appliances Usage Indicators by Climate Zone, 2005" " Million U.S. Housing Units" ,,"Climate Zone1" ,,"Less than 2,000 CDD and --",,,,"2,000 CDD or More and Less than 4,000...

  1. Estimation of the Energy and Capacity Savings in Texas from Appliance Efficiency Standards

    E-Print Network [OSTI]

    Verdict, M.

    1986-01-01T23:59:59.000Z

    The purpose of this presentation will be to assess the technical potential for energy and capacity savings in Texas by the year 2006 by the statewide adoption of minimum appliance efficiency standards equivalent to those recently adopted...

  2. Evaluation of advanced technologies for residential appliances and residential and commercial lighting

    SciTech Connect (OSTI)

    Turiel, I.; Atkinson, B.; Boghosian, S.; Chan, P.; Jennings, J.; Lutz, J.; McMahon, J.; Rosenquist, G.

    1995-01-01T23:59:59.000Z

    Section 127 of the Energy Policy Act requires that the Department of Energy (DOE) prepare a report to Congress on the potential for the development and commercialization of appliances that substantially exceed the present federal or state efficiency standards. Candidate high-efficiency appliances must meet several criteria including: the potential exists for substantial improvement (beyond the minimum established in law) of the appliance`s energy efficiency; electric, water, or gas utilities are prepared to support and promote the commercialization of such appliances; manufacturers are unlikely to undertake development and commercialization of such appliances on their own, or development and production would be substantially accelerated by support to manufacturers. This report describes options to improve the efficiency of residential appliances, including water heaters, clothes washers and dryers, refrigerator/freezers, dishwashers, space heating and cooling devices, as well as residential and commercial lighting products. Data from this report (particularly Appendix 1)were used to prepare the report to Congress mentioned previously. For the residential sector, national energy savings are calculated using the LBL Residential Energy Model. This model projects the number of households and appliance saturations over time. First, end-use consumption is calculated for a base case where models that only meet the standard replace existing models as these reach the end of their lifetime. Second, models with efficiencies equal to the technology under consideration replace existing models that reach the end of their lifetime. For the commercial sector, the COMMEND model was utilized to project national energy savings from new technologies. In this report, energy savings are shown for the period 1988 to 2015.

  3. Use of Residential Smart Appliances for Peak Load Shifting & Spinning Reserves: Cost Benefit Analysis

    SciTech Connect (OSTI)

    Sastry, Chellury; Pratt, Robert G.

    2010-12-01T23:59:59.000Z

    Abstract In this paper, we present the results of an analytical cost-benefit study of residential smart appliances in support of a joint stakeholder petition to the EPA and DOE to provide a 5% credit to meet ENERGY STAR eligibility criteria for products that meet the definition of a smart appliance. The underlying hypothesis is that smart appliances can play a critical role in addressing some of the challenges associated with increased electricity demand, and increased penetration of renewable sources of power. Our analytical model utilizes current annual appliance electricity consumption data, and estimates what the wholesale grid operating cost savings would be if some percentage of appliance loads were shifted away from peak hours to run during off-peak hours, and appliance loads serve power system balancing needs such as spinning reserves that would otherwise have to be provided by generators. Historical wholesale market clearing prices (location marginal and spinning reserve) from major wholesale power markets in the United States are used to estimate savings. The savings are then compared with the five percent credit, to determine if the savings in grid operating costs (benefits) are at least as high as the credit (cost) if not higher.

  4. Information Security: Coordination of Federal Cyber Security...

    Office of Environmental Management (EM)

    Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

  5. Author: Duncan Woodhouse, Assistant Registrar for Information Security, Risk Management and Business Continuity Date Version Author Comments

    E-Print Network [OSTI]

    Davies, Christopher

    Author: Duncan Woodhouse, Assistant Registrar for Information Security, Risk Management Information Security Policy 2004 09/2008 D01 Duncan Woodhouse Adaption and consolidation of best practices Registrar for Information Security, Risk Management and Business Continuity 2 University of Warwick

  6. Comment submitted by the Association of Home Appliance Manufacturers (AHAM) regarding the Energy Star Verification Testing Program

    Broader source: Energy.gov [DOE]

    This document is a comment submitted by the Association of Home Appliance Manufacturers (AHAM) regarding the Energy Star Verification Testing Program

  7. What can we learn from high-frequency appliance-level energy metering? Results from a field experiment

    E-Print Network [OSTI]

    Chen, VL; Delmas, MA; Kaiser, WJ; Locke, SL

    2015-01-01T23:59:59.000Z

    Newborough, M. , 2003. Dynamic energy-consumption indicatorsbehaviour and design. Energy Build. 35 (8), Please cite thisfrequency appliance-level energy metering? Results from a ?

  8. Material World: Forecasting Household Appliance Ownership in a Growing Global Economy

    SciTech Connect (OSTI)

    Letschert, Virginie; McNeil, Michael A.

    2009-03-23T23:59:59.000Z

    Over the past years the Lawrence Berkeley National Laboratory (LBNL) has developed an econometric model that predicts appliance ownership at the household level based on macroeconomic variables such as household income (corrected for purchase power parity), electrification, urbanization and climate variables. Hundreds of data points from around the world were collected in order to understand trends in acquisition of new appliances by households, especially in developing countries. The appliances covered by this model are refrigerators, lighting fixtures, air conditioners, washing machines and televisions. The approach followed allows the modeler to construct a bottom-up analysis based at the end use and the household level. It captures the appliance uptake and the saturation effect which will affect the energy demand growth in the residential sector. With this approach, the modeler can also account for stock changes in technology and efficiency as a function of time. This serves two important functions with regard to evaluation of the impact of energy efficiency policies. First, it provides insight into which end uses will be responsible for the largest share of demand growth, and therefore should be policy priorities. Second, it provides a characterization of the rate at which policies affecting new equipment penetrate the appliance stock. Over the past 3 years, this method has been used to support the development of energy demand forecasts at the country, region or global level.

  9. Recovery and separation of high-value plastics from discarded household appliances

    SciTech Connect (OSTI)

    Karvelas, D.E.; Jody, B.J.; Poykala, J.A. Jr.; Daniels, E.J. [Argonne National Lab., IL (United States). Energy Systems Div.; Arman, B. [Argonne National Lab., IL (United States). Energy Systems Div.]|[Praxair, Inc., Tarrytown, NY (United States)

    1996-03-01T23:59:59.000Z

    Argonne National Laboratory is conducting research to develop a cost- effective and environmentally acceptable process for the separation of high-value plastics from discarded household appliances. The process under development has separated individual high purity (greater than 99.5%) acrylonitrile-butadiene-styrene (ABS) and high- impact polystyrene (HIPS) from commingled plastics generated by appliance-shredding and metal-recovery operations. The process consists of size-reduction steps for the commingled plastics, followed by a series of gravity-separation techniques to separate plastic materials of different densities. Individual plastics of similar densities, such as ABS and HIPS, are further separated by using a chemical solution. By controlling the surface tension, the density, and the temperature of the chemical solution we are able to selectively float/separate plastics that have different surface energies. This separation technique has proven to be highly effective in recovering high-purity plastics materials from discarded household appliances. A conceptual design of a continuous process to recover high-value plastics from discarded appliances is also discussed. In addition to plastics separation research, Argonne National Laboratory is conducting research to develop cost-effective techniques for improving the mechanical properties of plastics recovered from appliances.

  10. Supervised start system for microprocessor based appliance controls

    SciTech Connect (OSTI)

    Fowler, D.L.; Kadwell, B.J.

    1986-12-09T23:59:59.000Z

    A supervisory start system is described for an appliance control that includes a microprocessor, manually actuatable keyboard switch means, and first and second relay means; the microprocessor including first, second and third input means and first, second and third output means and being conditioned to generate control signals at the output means upon receipt of electrical signals at the input means; the supervisory start circuit comprising, in combination, first, second and third transistors each having a base, an emitter and a collector. The first transistor means controls energization of the first relay means and is controlled by the manually actuatable switch means; the manually actuatable switch means being electrically connected to the first output means of the microprocessor and the base of the first transistor; the base of the second transistor being connected to the second output means of the microprocessor, the emitter of the second transistor being connected to a source of potential, the collector of the second transistor being connected to the emitter of the first transistor; the collector of the first transistor being connected to the first relay means; the second transistor being operable to connect the emitter of the first transistor to the source of potential when a signal from the second output means of the microprocessor is applied to the base of the second transistor; the microprocessor being conditioned to emit a signal at the second output means upon receipt of a signal at the first input means; means for latching the first transistor in a conducting condition upon being energized; and means for applying an electrical signal to the second input means when the first transistor means is in a conducting condition.

  11. Abstract-In this paper we evaluate the energy and economic consequences of appliance remanufacturing relative to purchasing

    E-Print Network [OSTI]

    Gutowski, Timothy

    Abstract- In this paper we evaluate the energy and economic consequences of appliance that economic incentives can be an influential driver for consumers to remanufacture and re-use old appliances washer. There is considerable amount of literature regarding policy, economics, and efficiency impacts

  12. Building Storage Appliances for the Grid and Beyond John Bent, Andrea Arpaci-Dusseau, Remzi Arpaci-Dusseau, Miron Livny

    E-Print Network [OSTI]

    Wisconsin at Madison, University of

    Building Storage Appliances for the Grid and Beyond John Bent, Andrea Arpaci-Dusseau, Remzi Arpaci,dusseau,remzi,miron@cs.wisc.edu Abstract Current storage appliances have been traditionally de- signed to meet either the storage demands challenges to storage ap- pliances that would be used on the grid. NeST is a user-level software-only storage

  13. Building Storage Appliances for the Grid and Beyond John Bent, Andrea ArpaciDusseau, Remzi ArpaciDusseau, Miron Livny

    E-Print Network [OSTI]

    Wisconsin at Madison, University of

    Building Storage Appliances for the Grid and Beyond John Bent, Andrea ArpaciDusseau, Remzi Arpaci,dusseau,remzi,miron@cs.wisc.edu Abstract Current storage appliances have been traditionally de signed to meet either the storage demands challenges to storage ap pliances that would be used on the grid. NeST is a userlevel softwareonly storage

  14. Mitigating Carbon Emissions: the Potential of Improving Efficiencyof Household Appliances in China

    SciTech Connect (OSTI)

    Lin, Jiang

    2006-07-10T23:59:59.000Z

    China is already the second's largest energy consumer in the world after the United States, and its demand for energy is expected to continue to grow rapidly in the foreseeable future, due to its fast economic growth and its low level of energy use per capita. From 2001 to 2005, the growth rate of energy consumption in China has exceeded the growth rate of its economy (NBS, 2006), raising serious concerns about the consequences of such energy use on local environment and global climate. It is widely expected that China is likely to overtake the US in energy consumption and greenhouse gas (GHG) emissions during the first half of the 21st century. Therefore, there is considerable interest in the international community in searching for options that may help China slow down its growth in energy consumption and GHG emissions through improving energy efficiency and adopting more environmentally friendly fuel supplies such as renewable energy. This study examines the energy saving potential of three major residential energy end uses: household refrigeration, air-conditioning, and water heating. China is already the largest consumer market in the world for household appliances, and increasingly the global production base for consumer appliances. Sales of household refrigerators, room air-conditioners, and water heaters are growing rapidly due to rising incomes and booming housing market. At the same time, the energy use of Chinese appliances is relatively inefficient compared to similar products in the developed economies. Therefore, the potential for energy savings through improving appliance efficiency is substantial. This study focuses particularly on the impact of more stringent energy efficiency standards for household appliances, given that such policies are found to be very effective in improving the efficiency of household appliances, and are well established both in China and around world (CLASP, 2006).

  15. Modeling of GE Appliances in GridLAB-D: Peak Demand Reduction

    SciTech Connect (OSTI)

    Fuller, Jason C.; Vyakaranam, Bharat GNVSR; Prakash Kumar, Nirupama; Leistritz, Sean M.; Parker, Graham B.

    2012-04-29T23:59:59.000Z

    The widespread adoption of demand response enabled appliances and thermostats can result in significant reduction to peak electrical demand and provide potential grid stabilization benefits. GE has developed a line of appliances that will have the capability of offering several levels of demand reduction actions based on information from the utility grid, often in the form of price. However due to a number of factors, including the number of demand response enabled appliances available at any given time, the reduction of diversity factor due to the synchronizing control signal, and the percentage of consumers who may override the utility signal, it can be difficult to predict the aggregate response of a large number of residences. The effects of these behaviors can be modeled and simulated in open-source software, GridLAB-D, including evaluation of appliance controls, improvement to current algorithms, and development of aggregate control methodologies. This report is the first in a series of three reports describing the potential of GE's demand response enabled appliances to provide benefits to the utility grid. The first report will describe the modeling methodology used to represent the GE appliances in the GridLAB-D simulation environment and the estimated potential for peak demand reduction at various deployment levels. The second and third reports will explore the potential of aggregated group actions to positively impact grid stability, including frequency and voltage regulation and spinning reserves, and the impacts on distribution feeder voltage regulation, including mitigation of fluctuations caused by high penetration of photovoltaic distributed generation and the effects on volt-var control schemes.

  16. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14T23:59:59.000Z

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  17. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15T23:59:59.000Z

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  18. Electrical Appliances Students may use clocks, sound equipment, computers, electric razors, hair dryers,

    E-Print Network [OSTI]

    Aalberts, Daniel P.

    with a heating coil *Torchiere type lamps with a halogen bulb, and other lamps with a halogen bulb greater than there is specific UL approval for a higher wattage. Violators of any of the above policies will be charged $50, Prohibited Appliances, and Halogen Torchiere Lamps 1st offense: $50.00 fine and the student will be called

  19. Tracking States of Massive Electrical Appliances by Lightweight Metering and Sequence Decoding

    E-Print Network [OSTI]

    Wang, Yongcai

    to track the on/off states of N appliances by deploying only m smart meters on the power load tree, where m demonstrate some interesting structures of the problem. Keywords Energy auditing, Smart meter, Deployment smart meter networks, and thus suffer from the high deploy- ment, maintenance and data collection costs

  20. Less Watts, More Performance: An Intelligent Storage Engine for Data Appliances

    E-Print Network [OSTI]

    Teubner, Jens

    how Ibex reduces data movement, CPU usage, and overall energy consumption in database appliances27, 2013, New York, New York, USA. Copyright 2013 ACM 978-1-4503-2037-5/13/06 ...$10.00. MySQL Server M y- proves performance and also reduces energy consumption. Query processing in relational databases may

  1. @scale: Insights from a Large, Long-Lived Appliance Stephen Dawson-Haggerty

    E-Print Network [OSTI]

    Culler, David E.

    Design, Measurement, Performance Keywords Energy, Audit, Building, Power, Wireless, Sensor Network 1@scale: Insights from a Large, Long-Lived Appliance Energy WSN Stephen Dawson-Haggerty , Steven Lanzisera , Jay Taneja , Richard Brown , and David Culler Computer Science Division Environmental Energy

  2. Design Techniques for Sensor Appliances: Foundations and Light Compass Case Study

    E-Print Network [OSTI]

    Potkonjak, Miodrag

    sensors of the appliance, and (2) error minimization-based sensor data interpretation middleware. We have University of California, Los Angeles jwong@cs.ucla.edu Seapahn Megerian University of California, Los Angeles seapahn@cs.ucla.edu Miodrag Potkonjak University of California, Los Angeles miodrag

  3. Energy-Harvesting Thermoelectric Sensing for Unobtrusive Water and Appliance Metering

    E-Print Network [OSTI]

    Dutta, Prabal

    Energy-Harvesting Thermoelectric Sensing for Unobtrusive Water and Appliance Metering Bradford that meters using the same thermoelectric generator with which it powers itself. In short, the rate at which be harvested with a thermoelectric generator (TEG) to power a sensor node. TEGs utilize the Seebeck effect

  4. Energy and CO2 efficient scheduling of smart appliances in active houses equipped with batteries

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    Energy and CO2 efficient scheduling of smart appliances in active houses equipped with batteries the electricity bill and the CO2 emissions. Mathematically, the scheduling problem is posed as a multi that the new formulation can decrease both the CO2 emissions and the electricity bill. Furthermore, a survey

  5. A Texas Study of the Effects of the National Appliance Energy Conservation Act of 1987

    E-Print Network [OSTI]

    Bachmeier, R.

    1987-01-01T23:59:59.000Z

    on the amount of energy which can be consumed by major new household appliances. The efficiency standards mandated by the NAECA will be phased in between 1988 and 1993 and will focus on space heating equipment, air conditioners, water heaters, refrigerators...

  6. Impact of domestic woodburning appliances on indoor air quality Corinne Mandin1

    E-Print Network [OSTI]

    Boyer, Edmond

    air pollution study (CITEPA), France * Corresponding email: Eva.Leoz@ineris.fr SUMMARY Data pollutants in ambient air. Consequently our study aims at describing both emission factors and inerisImpact of domestic woodburning appliances on indoor air quality Corinne Mandin1 , Jacques Ribron2

  7. "Table HC13.10 Home Appliances Usage Indicators by South Census...

    U.S. Energy Information Administration (EIA) Indexed Site

    Tools",56.2,20.5,10.8,3.6,6.1 "Other Appliances Used" "Auto BlockEngineBattery Heater",0.8,"N","N","N","N" "Hot Tub or Spa",6.7,2.1,1.2,0.2,0.7 "Swimming Pool with...

  8. "Table HC4.10 Home Appliances Usage Indicators by Renter-Occupied...

    U.S. Energy Information Administration (EIA) Indexed Site

    Tools",56.2,23.6,4.4,2.4,4.6,11.3,0.8 "Other Appliances Used" "Auto BlockEngineBattery Heater",0.8,"Q","Q","Q","Q","N","N" "Hot Tub or Spa",6.7,"Q","Q","Q","N","N","Q" "Swimming...

  9. "Table HC3.10 Home Appliances Usage Indicators by Owner-Occupied...

    U.S. Energy Information Administration (EIA) Indexed Site

    Tools",56.2,32.6,25,2.2,1.1,1.5,2.8 "Other Appliances Used" "Auto BlockEngineBattery Heater",0.8,0.7,0.7,"N","Q","N","Q" "Hot Tub or Spa",6.7,6.5,6.2,"Q","N","N","Q" "Swimming...

  10. "Table HC8.10 Home Appliances Usage Indicators by Urban/Rural...

    U.S. Energy Information Administration (EIA) Indexed Site

    Tools",56.2,27.2,10.6,9.3,9.2 "Other Appliances Used" "Auto BlockEngineBattery Heater",0.8,"Q","Q","Q",0.4 "Hot Tub or Spa",6.7,1.7,1.2,2.2,1.6 "Swimming Pool with...

  11. Table HC6.10 Home Appliances Usage Indicators by Number of Household...

    Annual Energy Outlook 2013 [U.S. Energy Information Administration (EIA)]

    Tools..... 56.2 20.1 14.4 8.6 6.9 6.2 Other Appliances Used Auto BlockEngineBattery Heater... 0.8 Q 0.4 Q Q Q Hot Tub or Spa......

  12. "Table HC10.10 Home Appliances Usage Indicators by U.S. Census...

    U.S. Energy Information Administration (EIA) Indexed Site

    Tools",56.2,12.2,12,20.5,11.6 "Other Appliances Used" "Auto BlockEngineBattery Heater",0.8,"Q",0.4,"N",0.2 "Hot Tub or Spa",6.7,1,1.3,2.1,2.2 "Swimming Pool with...

  13. Measure Guideline: Combustion Safety for Natural Draft Appliances Using Indoor Air

    SciTech Connect (OSTI)

    Brand, L.

    2014-04-01T23:59:59.000Z

    This measure guideline covers how to assess and carry out the combustion safety procedures for appliances and heating equipment that uses indoor air for combustion in low-rise residential buildings. Only appliances installed in the living space, or in an area freely communicating with the living space, vented alone or in tandem with another appliance are considered here. A separate measure guideline addresses combustion appliances located either within the living space in enclosed closets or side rooms or outside the living space in an adjacent area like an attic or garage that use outdoor air for combustion. This document is for inspectors, auditors, and technicians working in homes where energy upgrades are being conducted whether or not air infiltration control is included in the package of measures being applied. In the indoor combustion air case, guidelines summarized here are based on language provided in several of the codes to establish minimum requirements for the space using simplified prescriptive measures. In addition, building performance testing procedures are provided by testing agencies. The codes in combination with the test procedures offer comprehensive combustion safety coverage to address safety concerns, allowing inexperienced residential energy retrofit inspectors to effectively address combustion safety issues and allow energy retrofits to proceed.

  14. An Appliance-driven Approach to Detection of Corrupted Load Curve Data

    E-Print Network [OSTI]

    Pei, Jian

    An Appliance-driven Approach to Detection of Corrupted Load Curve Data Guoming Tang1,3 , Kui Wu1@sfu.ca, jiuyang_tang@nudt.edu.cn, jshlei@shiep.edu.cn ABSTRACT Load curve data in power systems refers to users discov- ered in the data. Load curve data, however, usually suffers from corruptions caused by various

  15. A Communication-Based Appliance Scheduling Scheme for Consumer-Premise Energy Management Systems

    E-Print Network [OSTI]

    Snyder, Larry

    of electricity prices and distributed wind power uncertainty. We model the evolution of the protocol as a two is an energy management controller that incorporates prices and user preferences to providA Communication-Based Appliance Scheduling Scheme for Consumer-Premise Energy Management Systems

  16. 2014-06-06 Appliance Standards and Rulemaking Federal Advisory Committee; Preliminary Agenda

    Broader source: Energy.gov [DOE]

    This document is a preliminary agenda for the Appliance Standards and Rulemaking Federal Advisory Committee open meeting being held on June 6, 2014 from 1:00 p.m.-5:00 p.m. (EST) at the U.S. Department of Energy, Forrestal Building, Room 8E-089, 1000 Independence Avenue SW., Washington, DC 20585.

  17. Experience from Building Industry Strength Agent-Based Appliances Leon Sterling

    E-Print Network [OSTI]

    Taveter, Kuldar

    Experience from Building Industry Strength Agent-Based Appliances Leon Sterling The University of Melbourne Department of Computer Science and Software Engineering Victoria, 3010, Australia leon@cs.mu.oz.au Kuldar Taveter The University of Melbourne Department of Computer Science and Software Engineering

  18. Standby and off-mode power demand of new appliances in the Anbal de Almeida

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    Standby and off-mode power demand of new appliances in the market Anbal de Almeida ISR regulation to limit the standby and off-mode power consumption of non-networked household electronic involved in the project. Standby and off-mode values by product categories are analyzed and compared

  19. Secure Information Exchange Gateway for Electric Grid Operations

    SciTech Connect (OSTI)

    Robertson, F.; Carroll, J.; Sanders, William; Yardley, Timothy; Heine, Erich; Hadley, Mark; McKinnon, David; Motteler, Barbara; Giri, Jay; Walker, William; McCartha, Esrick

    2014-09-30T23:59:59.000Z

    The major objectives of the SIEGate project were to improve the security posture and minimize the cyber-attack surface of electric utility control centers and to reduce the cost of maintaining control-room-to-control-room information exchange. Major project goals included the design, development, testing, and commercialization of a single security-hardened appliance that could meet industry needs for resisting cyber-attacks while protecting the confidentiality and integrity of a growing volume of real-time information needed to ensure the reliability of the bulk electric system and interoperating with existing data formats and networking technologies. The SIEGate project has achieved its goals and objectives. The SIEGate Design Document, issued in March 2012, presented SIEGate use cases, provided SIEGate requirements, established SIEGate design principles, and prescribed design functionality of SIEGate as well as the components that make up SIEGate. SIEGate Release Version 1.0 was posted in January 2014. Release Version 1.0.83, which was posted on March 28, 2014, fixed many issues discovered by early adopters and added several new features. Release Candidate 1.1, which added additional improvements and bug fixes, was posted in June 2014. SIEGate executables have been downloaded more than 300 times. SIEGate has been tested at PJM, Entergy, TVA, and Southern. Security testing and analysis of SIEGate has been conducted at PNNL and PJM. Alstom has provided a summary of recommended steps for commercialization of the SIEGate Appliance and identified two deployment models with immediate commercial application.

  20. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  1. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    Information Security Group IY5512 Computer Security Part 7b: Windows securityPart 7b: Windows security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security Group) of Windows machines. 2 Information Security Group Objectives II Focus on Active Directory, authentication

  2. Transportation Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

  3. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08T23:59:59.000Z

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  4. Security Specialist

    Broader source: Energy.gov [DOE]

    The position is located in the Office of Environmental Management (EM),Office of Safeguards, Security and Emergency Preparedness (EM-44). The mission of EM-44 is to develop and oversee the...

  5. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  6. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27T23:59:59.000Z

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  7. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20T23:59:59.000Z

    The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  8. July 11 Public Meeting: Physical Characterization of Grid-Connected Commercial And Residential Building End-Use Equipment And Appliances

    Broader source: Energy.gov [DOE]

    These documents contain the three slide decks presented at the public meeting on the Physical Characterization of Grid-Connected Commercial and Residential Buildings End-Use Equipment and Appliances, held on July 11, 2014 in Washington, DC.

  9. Use of Residential Smart Appliances for Peak-Load Shifting and Spinning Reserves Cost/Benefit Analysis

    SciTech Connect (OSTI)

    Sastry, Chellury; Pratt, Robert G.; Srivastava, Viraj; Li, Shun

    2010-12-01T23:59:59.000Z

    In this report, we present the results of an analytical cost/benefit study of residential smart appliances from a utility/grid perspective in support of a joint stakeholder petition to the ENERGY STAR program within the Environmental Protection Agency (EPA) and Department of Energy (DOE). The goal of the petition is in part to provide appliance manufacturers incentives to hasten the production of smart appliances. The underlying hypothesis is that smart appliances can play a critical role in addressing some of the societal challenges, such as anthropogenic global warming, associated with increased electricity demand, and facilitate increased penetration of renewable sources of power. The appliances we consider include refrigerator/freezers, clothes washers, clothes dryers, room air-conditioners, and dishwashers. The petition requests the recognition that providing an appliance with smart grid capability, i.e., products that meet the definition of a smart appliance, is at least equivalent to a corresponding five percent in operational machine efficiencies. It is then expected that given sufficient incentives and value propositions, and suitable automation capabilities built into smart appliances, residential consumers will be adopting these smart appliances and will be willing participants in addressing the aforementioned societal challenges by more effectively managing their home electricity consumption. The analytical model we utilize in our cost/benefit analysis consists of a set of user-definable assumptions such as the definition of on-peak (hours of day, days of week, months of year), the expected percentage of normal consumer electricity consumption (also referred to as appliance loads) that can shifted from peak hours to off-peak hours, the average power rating of each appliance, etc. Based on these assumptions, we then formulate what the wholesale grid operating-cost savings, or benefits, would be if the smart capabilities of appliances were invoked, and some percentage of appliance loads were shifted away from peak hours to run during off-peak hours, and appliance loads served power-system balancing needs such as spinning reserves that would otherwise have to be provided by generators. The rationale is that appliance loads can be curtailed for about ten minutes or less in response to a grid contingency without any diminution in the quality of service to the consumer. We then estimate the wholesale grid operating-cost savings based on historical wholesale-market clearing prices (location marginal and spinning reserve) from major wholesale power markets in the United States. The savings derived from the smart grid capabilities of an appliance are then compared to the savings derived from a five percent increase in traditional operational machine efficiencies, referred to as cost in this report, to determine whether the savings in grid operating costs (benefits) are at least as high as or higher than the operational machine efficiency credit (cost).

  10. Taxation and Social Security

    E-Print Network [OSTI]

    Kaplow, Louis

    2006-01-01T23:59:59.000Z

    Re: Taxation and Social Security Attached is draft chapter11 TAXATION AND SOCIAL SECURITY A substantial fraction ofaspects of social security schemes in a setting in which

  11. Security and Elections

    E-Print Network [OSTI]

    Bishop, Matt; Peisert, Sean

    2012-01-01T23:59:59.000Z

    World Conf. Information Security Education, 2007, pp. 1724;Security andElections IEEE Security & Privacy, 10(5):6467, Sept. -

  12. CAMPUS SECURITY REPORT 2009

    E-Print Network [OSTI]

    CAMPUS SECURITY REPORT 2009 San Francisco State University University Police Department 1600 & Procedure Concerning Security, Access & Maintenance of Campus Facilities & Weapons Policies........................................................... 6 g. Safety & Security

  13. New analysis techniques for estimating impacts of federal appliance efficiency standards

    SciTech Connect (OSTI)

    McMahon, James E.

    2003-06-24T23:59:59.000Z

    Impacts of U.S. appliance and equipment standards have been described previously. Since 2000, the U.S. Department of Energy (DOE) has updated standards for clothes washers, water heaters, and residential central air conditioners and heat pumps. A revised estimate of the aggregate impacts of all the residential appliance standards in the United States shows that existing standards will reduce residential primary energy consumption and associated carbon dioxide (CO{sub 2}) emissions by 89 percent in 2020 compared to the levels expected without any standards. Studies of possible new standards are underway for residential furnaces and boilers, as well as a number of products in the commercial (tertiary) sector, such as distribution transformers and unitary air conditioners. The analysis of standards has evolved in response to critiques and in an attempt to develop more precise estimates of costs and benefits of these regulations. The newer analysis elements include: (1) valuing energy savings by using marginal (rather than average) energy prices specific to an end-use; (2) simulating the impacts of energy efficiency increases over a sample population of consumers to quantify the proportion of households having net benefits or net costs over the life of the appliance; and (3) calculating marginal markups in distribution channels to derive the incremental change in retail prices associated with increased manufacturing costs for improving energy efficiency.

  14. Tag: Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Tag: Security Displaying 1 - 6 of 6... Category: Security Sheltering in Place If you are advised to shelter-in-place by local news or our website, please follow these...

  15. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29T23:59:59.000Z

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  16. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  17. Security Rulemaking

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergy SmallImplementingSecurity SymposiumSecuring the Nation's509Department2

  18. Faculty Information Security Guide

    E-Print Network [OSTI]

    Myers, Lawrence C.

    Faculty Information Security Guide Dartmouth Your information is vitally important to your teaching protect your information. THE DARTMOUTH INFORMATION SECURITY COMMITTEE The Dartmouth Information Security Committee (DISC) meets monthly to assess vulnerabilities of information security, and to develop and revise

  19. SELECTING INFORMATION TECHNOLOGY SECURITY

    E-Print Network [OSTI]

    April 2004 SELECTING INFORMATION TECHNOLOGY SECURITY PRODUCTS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Information technology security prod ucts are essential to better secure infor mation technology (IT) systems

  20. Towards a Security Engineering Process Model for Electronic Business Processes

    E-Print Network [OSTI]

    Eichler, Jrn

    2012-01-01T23:59:59.000Z

    Business process management (BPM) and accompanying systems aim at enabling enterprises to become adaptive. In spite of the dependency of enterprises on secure business processes, BPM languages and techniques provide only little support for security. Several complementary approaches have been proposed for security in the domain of BPM. Nevertheless, support for a systematic procedure for the development of secure electronic business processes is still missing. In this paper, we pinpoint the need for a security engineering process model in the domain of BPM and identify key requirements for such process model.

  1. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    FROM: SUBJECT: USIUK Memorandum of Understanding between National Nuclear Security Administration's (NNSA) Associate Administrator for Defense Nuclear Security (AADNS)...

  2. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27T23:59:59.000Z

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  3. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29T23:59:59.000Z

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Admin Chg 2, dated 5-15-15, cancels Admin Chg 1.

  4. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18T23:59:59.000Z

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  5. Agenda for Public Meeting on the Physical Characterization of Grid-Connected Commercial and Residential Buildings End-Use Equipment and Appliances

    Broader source: Energy.gov [DOE]

    Download the agenda below for the July 11 Public Meeting on the Physical Characterization of Grid-Connected Commercial and Residential Buildings End-Use Equipment and Appliances.

  6. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security's IT Security Procedures require that non-public University information, including social security numbers and professional information in a secure and appropriate manner. #12;

  7. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  8. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  9. Security Procedures Caltech Campus Security Dispatch

    E-Print Network [OSTI]

    Goddard III, William A.

    Security Procedures Caltech Campus Security Dispatch: 5000 (from any Caltech phone) or (626) 395-5000 (from any phone) When emergencies arise, contact Caltech Campus Security MEDICAL If someone experiences a medical emergency: Remain calm Notify Campus Security Dispatch Do NOT move victim EARTHQUAKE When

  10. Security rules versus Security properties Mathieu Jaume

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    Security rules versus Security properties Mathieu Jaume SPI LIP6 University Pierre & Marie components of security policies can be expressed, and we identify their role in the de- scription of a policy, of a system and of a secure system. In this setting, we formally describe two approaches to define policies

  11. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Energy Savers [EERE]

    92: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System...

  12. Using Operational Security (OPSEC) to Support a Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

  13. V-186: Drupal Login Security Module Security Bypass and Denial...

    Office of Environmental Management (EM)

    186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability V-186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability June...

  14. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W. (Albuquerque, NM)

    1985-01-01T23:59:59.000Z

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  15. Sandia Energy - Installation Energy Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Installation Energy Security Home Stationary Power Grid Modernization Resilient Electric Infrastructures Military Installation Energy Security Installation Energy SecurityTara...

  16. U-027: RSA Key Manager Appliance Session Logout Bug Fails to...

    Broader source: Energy.gov (indexed) [DOE]

    the 2.7.1.6 hotfix, since this hotfix addresses security related fixes, hot fix roll ups, and bug fixes. To obtain the latest RSA product downloads, log on at RSA SecurCare....

  17. Electronic security device

    DOE Patents [OSTI]

    Eschbach, Eugene A. (Richland, WA); LeBlanc, Edward J. (Kennewick, WA); Griffin, Jeffrey W. (Kennewick, WA)

    1992-01-01T23:59:59.000Z

    The present invention relates to a security device having a control box (12) containing an electronic system (50) and a communications loop (14) over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system (50) and a detection module (72) capable of registering changes in the voltage and phase of the signal transmitted over the loop.

  18. Electronic security device

    DOE Patents [OSTI]

    Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

    1992-03-17T23:59:59.000Z

    The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.

  19. Max Tech and Beyond: Maximizing Appliance and Equipment Efficiency by Design

    SciTech Connect (OSTI)

    Desroches, Louis-Benoit; Garbesi, Karina

    2011-07-20T23:59:59.000Z

    It is well established that energy efficiency is most often the lowest cost approach to reducing national energy use and minimizing carbon emissions. National investments in energy efficiency to date have been highly cost-effective. The cumulative impacts (out to 2050) of residential energy efficiency standards are expected to have a benefit-to-cost ratio of 2.71:1. This project examined energy end-uses in the residential, commercial, and in some cases the industrial sectors. The scope is limited to appliances and equipment, and does not include building materials, building envelopes, and system designs. This scope is consistent with the scope of DOE's appliance standards program, although many products considered here are not currently subject to energy efficiency standards. How much energy could the United States save if the most efficient design options currently feasible were adopted universally? What design features could produce those savings? How would the savings from various technologies compare? With an eye toward identifying promising candidates and strategies for potential energy efficiency standards, the Max Tech and Beyond project aims to answer these questions. The analysis attempts to consolidate, in one document, the energy savings potential and design characteristics of best-on-market products, best-engineered products (i.e., hypothetical products produced using best-on-market components and technologies), and emerging technologies in research & development. As defined here, emerging technologies are fundamentally new and are as yet unproven in the market, although laboratory studies and/or emerging niche applications offer persuasive evidence of major energy-savings potential. The term 'max tech' is used to describe both best-engineered and emerging technologies (whichever appears to offer larger savings). Few best-on-market products currently qualify as max tech, since few apply all available best practices and components. The three primary analyses presented in this report are: Nevertheless, it is important to analyze best-on-market products, since data on truly max tech technologies are limited. (1) an analysis of the cross-cutting strategies most promising for reducing appliance and equipment energy use in the U.S.; (2) a macro-analysis of the U.S. energy-saving potential inherent in promising ultra-efficient appliance technologies; and (3) a product-level analysis of the energy-saving potential.

  20. "Table HC12.9 Home Appliances Characteristics by Midwest Census Region, 2005"

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells,1 U.S. Department of Energygasoline4 Space2.9 Home Appliances

  1. "Table HC13.9 Home Appliances Characteristics by South Census Region, 2005"

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells,1 U.S. Department of Energygasoline4 Space2.9 Home Appliances78 Water3.9

  2. "Table HC14.9 Home Appliances Characteristics by West Census Region, 2005"

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells,1 U.S. Department of Energygasoline4 Space2.9 Home Appliances7835

  3. A CHALLENGING BUT FEASIBLE BLOCKWISE-ADAPTIVE CHOSEN-PLAINTEXT ATTACK ON SSL

    E-Print Network [OSTI]

    A CHALLENGING BUT FEASIBLE BLOCKWISE-ADAPTIVE CHOSEN-PLAINTEXT ATTACK ON SSL Gregory V. Bard.bard@ieee.org Keywords: Blockwise Adaptive, Chosen Plaintext Attack (CPA), Secure Sockets Layer (SSL), Transport Layer). Abstract: This paper introduces a chosen-plaintext vulnerability in the Secure Sockets Layer (SSL

  4. Performance study of a COTS Distributed DBMS adapted for

    E-Print Network [OSTI]

    Dent, Alexander W.

    Performance study of a COTS Distributed DBMS adapted for multilevel security Moses Garuba Technical://www.rhul.ac.uk/mathematics/techreports #12;Abstract Multilevel secure database management system (MLS/DBMS) products no longer enjoy direct commercial-off-the-shelf (COTS) support. Meanwhile, existing users of these MLS/DBMS products continue

  5. Security Perimeter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol HomeFacebook TwitterSearch-Comments Sign InNuclear SecurityUnder Budget

  6. Safety, Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Scienceand Requirements RecentlyElectronicResourcesjobsJuly throughR EMaterialsSafety, Security

  7. Computer Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMForms AboutRESEARCHHydrosilylationComputer Security All JLF

  8. Climate Change and National Security

    SciTech Connect (OSTI)

    Malone, Elizabeth L.

    2013-02-01T23:59:59.000Z

    Climate change is increasingly recognized as having national security implications, which has prompted dialogue between the climate change and national security communities with resultant advantages and differences. Climate change research has proven useful to the national security community sponsors in several ways. It has opened security discussions to consider climate as well as political factors in studies of the future. It has encouraged factoring in the stresses placed on societies by climate changes (of any kind) to help assess the potential for state stability. And it has shown that, changes such as increased heat, more intense storms, longer periods without rain, and earlier spring onset call for building climate resilience as part of building stability. For the climate change research community, studies from a national security point of view have revealed research lacunae, for example, such as the lack of usable migration studies. This has also pushed the research community to consider second- and third-order impacts of climate change, such as migration and state stability, which broadens discussion of future impacts beyond temperature increases, severe storms, and sea level rise; and affirms the importance of governance in responding to these changes. The increasing emphasis in climate change science toward research in vulnerability, resilience, and adaptation also frames what the intelligence and defense communities need to know, including where there are dependencies and weaknesses that may allow climate change impacts to result in security threats and where social and economic interventions can prevent climate change impacts and other stressors from resulting in social and political instability or collapse.

  9. EPA ENERGY STAR: Tackling Growth in Home Electronics and Small Appliances

    SciTech Connect (OSTI)

    Sanchez, Marla Christine; Brown, Richard; Homan, Gregory

    2008-11-17T23:59:59.000Z

    Over a decade ago, the electricity consumption associated with home electronics and other small appliances emerged onto the global energy policy landscape as one of the fastest growing residential end uses with the opportunity to deliver significant energy savings. As our knowledge of this end use matures, it is essential to step back and evaluate the degree to which energy efficiency programs have successfully realized energy savings and where savings opportunities have been missed.For the past fifteen years, we have quantified energy, utility bill, and carbon savings for US EPA?s ENERGY STAR voluntary product labeling program. In this paper, we present a unique look into the US residential program savings claimed to date for EPA?s ENERGY STAR office equipment, consumer electronics, and other small household appliances as well as EPA?s projected program savings over the next five years. We present a top-level discussion identifying program areas where EPA?s ENERGY STAR efforts have succeeded and program areas where ENERGY STAR efforts did not successfully address underlying market factors, technology issues and/or consumer behavior. We end by presenting the magnitude of ?overlooked? savings.

  10. Appliances, Lighting, Electronics, and Miscellaneous EquipmentElectricity Use in New Homes

    SciTech Connect (OSTI)

    Brown, Richard E.; Rittelman, William; Parker, Danny; Homan,Gregory

    2007-02-28T23:59:59.000Z

    The "Other" end-uses (appliances, lighting, electronics, andmiscellaneous equipment) continue to grow. This is particularly true innew homes, where increasing floor area and amenities are leading tohigher saturation of these types of devices. This paper combines thefindings of several field studies to assess the current state ofknowledge about the "Other" end-uses in new homes. The field studiesinclude sub-metered measurements of occupied houses in Arizona, Florida,and Colorado, as well as device-level surveys and power measurements inunoccupied new homes. We find that appliances, lighting, electronics, andmiscellaneous equipment can consume from 46 percent to 88 percent ofwhole-house electricity use in current low-energy homes. Moreover, theannual consumption for the "Other" end-uses is not significantly lower innew homes (even those designed for low energy use) compared to existinghomes. The device-level surveys show that builder-installed equipment isa significant contributor to annual electricity consumption, and certaindevices that are becoming more common in new homes, such as structuredwiring systems, contribute significantly to this power consumption. Thesefindings suggest that energy consumption by these "Other" end uses isstill too large to allow cost-effective zero-energy homes.

  11. INFRASTRUCTURE SECURITY & ENERGY

    E-Print Network [OSTI]

    Schrijver, Karel

    INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Delivery and Energy Reliability #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY Federal agencies to support waivers and specific response legal authorities #12;INFRASTRUCTURE SECURITY

  12. CAMPUS SECURITY CARD REQUISITION

    E-Print Network [OSTI]

    CAMPUS SECURITY CARD REQUISITION DEPARTMENT LAST NAME GIVEN NAME(S) SFU ID NUMBER CARD NUMBER CAMPUS SECURITY OFFICE USE ONLY SERVICE CHARGE: ___________________________ DEPOSIT be reported or returned to Campus Security TC 050 (291-5448). CARDHOLDER SIGNATURE DATE: #12;

  13. Designing security into software

    E-Print Network [OSTI]

    Zhang, Chang Tony

    2006-01-01T23:59:59.000Z

    When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

  14. Adaptation Plan

    E-Print Network [OSTI]

    Durnbaugh, A.

    2011-01-01T23:59:59.000Z

    ? Built Environment ? Natural Environment ? People FIVE STRATEGIES Copyright 2011, City of Chicago ADAPTATION ESL-KT-11-11-16 9 CCAP Adaptation Evolution 2007 2008 2009 2010 ? Understood the climate science: Assess climate impacts... E xi st in g Tr un k Existing on Rogers Rogers Ave CIP Stormwater management: Chicago?s comprehensive sewer model Climate impacts Example actions to prepare the built environment Copyright 2011, City of Chicago ESL-KT-11-11-16 13 CCAP...

  15. Cyber Security | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power Administration would likeConstitution4Customer-Comments Sign In About |Cyber SecurityCyber

  16. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25T23:59:59.000Z

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  17. Security & Privacy | EMSL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security & Privacy Security & Privacy Privacy Notice We collect no personal information about you without your knowledge when you visit this site, although you may choose to...

  18. Advancing Global Nuclear Security

    Broader source: Energy.gov [DOE]

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  19. APPLIANCE STANDARDS

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Fan Light Kits External Power Supplies Walk-in Coolers & Freezers Commercial Refrigeration Equipment Refrigerators & Freezers Water Heaters CAC HP CAC HP Furnaces &...

  20. Security tasks are highly interdependent.

    E-Print Network [OSTI]

    Motivation Security tasks are highly interdependent. To improve security tools, we need to understand how security practitioners collaborate in their organizations. Security practitioners in context Exchange of Information Develop security tools that: Integrate information from different communication

  1. Security Policies Dr. Ahmad Almulhem

    E-Print Network [OSTI]

    Almulhem, Ahmad

    Security Policies Dr. Ahmad Almulhem Computer Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 51 #12;Security Policies Types of Security Policies Trust Types of Access Control Summary Part I Overview Ahmad Almulhem - Network Security Engineering

  2. IBM Software Data Sheet IBM adaptive threat

    E-Print Network [OSTI]

    IBM Software Data Sheet IBM adaptive threat protection Stay ahead of security threats with a state-of-the-art network protection engine Highlights Identify high-risk threats and zero-day attacks with protocol-based, behavioral anomaly detection Protect end users against the latest web-based threats, such as SQL injection

  3. Residential Appliance Data, Assumptions and Methodology for End-Use Forecasting with EPRI-REEPS 2.1

    E-Print Network [OSTI]

    was developed by the Electric Power Research Institute (McMenamin et al. 1992). In this modeling framework the modeling framework of the Residential End-Use Energy Planning System (REEPS) developed for the Electric provided by the Appliance Model in the Residential End-Use Energy Planning System (REEPS), which

  4. Energy-efficiency labels and standards: A guidebook for appliances, equipment and lighting

    SciTech Connect (OSTI)

    McMahon, James E.; Wiel, Stephen

    2001-02-16T23:59:59.000Z

    Energy-performance improvements in consumer products are an essential element in any government's portfolio of energy-efficiency and climate change mitigation programs. Governments need to develop balanced programs, both voluntary and regulatory, that remove cost-ineffective, energy-wasting products from the marketplace and stimulate the development of cost-effective, energy-efficient technology. Energy-efficiency labels and standards for appliances, equipment, and lighting products deserve to be among the first policy tools considered by a country's energy policy makers. The U.S. Agency for International Development (USAID) and the United Nations Foundation (UNF) recognize the need to support policy makers in their efforts to implement energy-efficiency standards and labeling programs and have developed this guidebook, together with the Collaborative Labeling and Appliance Standards Program (CLASP), as a primary reference. This guidebook was prepared over the course of the past year with significant contribution from the authors and reviewers mentioned previously. Their diligent participation has made this the international guidance tool it was intended to be. The lead authors would also like to thank the following individuals for their support in the development, production, and distribution of the guidebook: Marcy Beck, Elisa Derby, Diana Dhunke, Ted Gartner, and Julie Osborn of Lawrence Berkeley National Laboratory as well as Anthony Ma of Bevilacqua-Knight, Inc. This guidebook is designed as a manual for government officials and others around the world responsible for developing, implementing, enforcing, monitoring, and maintaining labeling and standards-setting programs. It discusses the pros and cons of adopting energy-efficiency labels and standards and describes the data, facilities, and institutional and human resources needed for these programs. It provides guidance on the design, development, implementation, maintenance, and evaluation of the programs and on the design of the labels and standards themselves. In addition, it directs the reader to references and other resources likely to be useful in conducting the activities described and includes a chapter on energy policies and programs that complement appliance efficiency labels and standards. This guidebook attempts to reflect the essential framework of labeling and standards programs. It is the intent of the authors and sponsors to distribute copies of this book worldwide at no charge for the general public benefit. The guidebook is also available on the web at www.CLASPonline.org and can be downloaded to be used intact or piecemeal for whatever beneficial purposes readers may conceive.

  5. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22T23:59:59.000Z

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  6. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16T23:59:59.000Z

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  7. Office of Security Assistance

    Broader source: Energy.gov [DOE]

    The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

  8. Evaluation of Waste Heat Recovery and Utilization from Residential Appliances and Fixtures

    SciTech Connect (OSTI)

    Tomlinson, John J [ORNL; Christian, Jeff [Oak Ridge National Laboratory (ORNL); Gehl, Anthony C [ORNL

    2012-09-01T23:59:59.000Z

    Executive Summary In every home irrespective of its size, location, age, or efficiency, heat in the form of drainwater or dryer exhaust is wasted. Although from a waste stream, this energy has the potential for being captured, possibly stored, and then reused for preheating hot water or air thereby saving operating costs to the homeowner. In applications such as a shower and possibly a dryer, waste heat is produced at the same time as energy is used, so that a heat exchanger to capture the waste energy and return it to the supply is all that is needed. In other applications such as capturing the energy in drainwater from a tub, dishwasher, or washing machine, the availability of waste heat might not coincide with an immediate use for energy, and consequently a heat exchanger system with heat storage capacity (i.e. a regenerator) would be necessary. This study describes a two-house experimental evaluation of a system designed to capture waste heat from the shower, dishwasher clothes washer and dryer, and to use this waste heat to offset some of the hot water energy needs of the house. Although each house was unoccupied, they were fitted with equipment that would completely simulate the heat loads and behavior of human occupants including operating the appliances and fixtures on a demand schedule identical to Building American protocol (Hendron, 2009). The heat recovery system combined (1) a gravity-film heat exchanger (GFX) installed in a vertical section of drainline, (2) a heat exchanger for capturing dryer exhaust heat, (3) a preheat tank for storing the captured heat, and (4) a small recirculation pump and controls, so that the system could be operated anytime that waste heat from the shower, dishwasher, clothes washer and dryer, and in any combination was produced. The study found capturing energy from the dishwasher and clothes washer to be a challenge since those two appliances dump waste water over a short time interval. Controls based on the status of the dump valve on these two appliances would have eliminated uncertainty in knowing when waste water was flowing and the recovery system operated. The study also suggested that capture of dryer exhaust heat to heat incoming air to the dryer should be examined as an alternative to using drying exhaust energy for water heating. The study found that over a 6-week test period, the system in each house was able to recover on average approximately 3000 W-h of waste heat daily from these appliance and showers with slightly less on simulated weekdays and slightly more on simulated weekends which were heavy wash/dry days. Most of these energy savings were due to the shower/GFX operation, and the least savings were for the dishwasher/GFX operation. Overall, the value of the 3000 W-h of displaced energy would have been $0.27/day based on an electricity price of $.09/kWh. Although small for today s convention house, these savings are significant for a home designed to approach maximum affordable efficiency where daily operating costs for the whole house are less than a dollar per day. In 2010 the actual measured cost of energy in one of the simulated occupancy houses which waste heat recovery testing was undertaken was $0.77/day.

  9. The Data and Application Security and Privacy (DASPY) Challenge

    E-Print Network [OSTI]

    Sandhu, Ravi

    Computer security Information security = Computer security + Communications security Information Computer security Information security = Computer security + Communications security Information Cyber security (defensive) goals have evolved Computer security Information security = Computer

  10. MasteringWeb Services Security MasteringWeb Services Security

    E-Print Network [OSTI]

    Preview of MasteringWeb Services Security Preview of MasteringWeb Services Security Konstantin introduction Highlights of the book Web Services security problem XML Security WS-Security Security mechanisms for ASP.NET Web Services Planning and building secure Web Service systems Architectural and policy

  11. COOKING APPLIANCE USE IN CALIFORNIA HOMES DATA COLLECTED FROM A WEB-BASED SURVEY

    SciTech Connect (OSTI)

    Klug, Victoria; Lobscheid, Agnes; Singer, Brett

    2011-08-01T23:59:59.000Z

    Cooking of food and use of natural gas cooking burners generate pollutants that can have substantial impacts on residential indoor air quality. The extent of these impacts depends on cooking frequency, duration and specific food preparation activities in addition to the extent to which exhaust fans or other ventilation measures (e.g. windows) are used during cooking. With the intent of improving our understanding of indoor air quality impacts of cooking-related pollutants, we created, posted and advertised a web-based survey about cooking activities in residences. The survey included questions similar to those in California's Residential Appliance Saturation Survey (RASS), relating to home, household and cooking appliance characteristics and weekly patterns of meals cooked. Other questions targeted the following information not captured in the RASS: (1) oven vs. cooktop use, the number of cooktop burners used and the duration of burner use when cooking occurs, (2) specific cooking activities, (3) the use of range hood or window to increase ventilation during cooking, and (4) occupancy during cooking. Specific cooking activity questions were asked about the prior 24 hours with the assumption that most people are able to recollect activities over this time period. We examined inter-relationships among cooking activities and patterns and relationships of cooking activities to household demographics. We did not seek to obtain a sample of respondents that is demographically representative of the California population but rather to inexpensively gather information from homes spanning ranges of relevant characteristics including the number of residents and presence or absence of children. This report presents the survey, the responses obtained, and limited analysis of the results.

  12. University of Newcastle upon Tyne Adaptive SSL: Design, Implementation and Overhead Analysis

    E-Print Network [OSTI]

    Newcastle upon Tyne, University of

    University of Newcastle upon Tyne COMPUTING SCIENCE Adaptive SSL: Design, Implementation NEWCASTLE UN IVERSITY OF #12;TECHNICAL REPORT SERIES No. CS-TR-1008 March, 2007 Adaptive SSL: Design-server interactions. To that end, we design and implement an adaptation controller for SSL (Secure Socket Layer

  13. IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 15, NO. 3, AUGUST 2000 1137 A Fast Voltage Security Assessment

    E-Print Network [OSTI]

    Venkatasubramanian, Mani V.

    IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 15, NO. 3, AUGUST 2000 1137 A Fast Voltage Security--This paper presents a fast method for use in on-line voltage security assessment. The objective here from Static Security Analysis (SSA). Index Terms--Adaptive bounding, electrical distance, power flow

  14. Sandia Energy - Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessment Home Climate & Earth Systems WaterEnergy Nexus Water Monitoring & Treatment Technology Security Risk Assessment Security Risk Assessmentcwdd2015-05-04T21:...

  15. Sandia National Laboratories: Climate Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    MonitoringClimate Security Climate Security Climate Security Global reductions in greenhouse gases will eventually be motivated by an international climate treaty and will entail...

  16. 2014-04-30 Public Meeting Agenda: Physical Characterization of Smart and Grid-Connected Commercial and Residential Buildings End-Use Equipment and Appliances

    Broader source: Energy.gov [DOE]

    This document is the agenda for the Physical Characterization of Smart and Grid-Connected Commercial and Residential Buildings End-Use Equipment and Appliances public meeting being held on April 30, 2014.

  17. 2014-04-30 Public Meeting Presentation Slides: Physical Characterization of Smart and Grid-Connected Commercial and Residential Buildings End-Use Equipment and Appliances

    Broader source: Energy.gov [DOE]

    These documents contain slide decks presented at the Physical Characterization of Smart and Grid-Connected Commercial and Residential Buildings End-Use Equipment and Appliances public meeting held on April 30, 2014.

  18. Adaptation Plan

    E-Print Network [OSTI]

    Durnbaugh, A.

    2011-01-01T23:59:59.000Z

    /pest introduction. Buildings Fa?ade & structural damage. Higher peak electricity demand. Lake Michigan Decreased lake ice in winter & lower lake levels. Greater stress on water resources in times of need. Homes Increased cooling costs & energy... of Chicago ? 2011 ESL-KT-11-11-16 3 Chicago River Promote & incentivize green infrastructure to manage stormwater. Monitor threat of aquatic invasive species. RESILIENCY Adaptation will help reduce the impact of the changes that can be expected...

  19. SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS

    E-Print Network [OSTI]

    SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology The selection and implementation of security controls are critical decisions for protecting

  20. Campus Security Report 1 Campus seCurity

    E-Print Network [OSTI]

    Wilmers, Chris

    Campus Security Report 1 Campus seCurity and Fire saFety report UC Santa Cruz 2010 #12;Campus Security Report 2 UC Santa Cruz Geography ........................................................ 8 Security and Access to Campus Buildings and Grounds ........................................ 8

  1. Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES

    E-Print Network [OSTI]

    Newby, Gregory B.

    Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES Gregory B. Newby School an active role in information security. INTRODUCTION By most accounts, the proliferation of the Internet of information security, making concrete recommendations for safeguarding information and information access

  2. ANNUAL SECURITY FIRE SAFETY REPORT

    E-Print Network [OSTI]

    ANNUAL SECURITY AND FIRE SAFETY REPORT OCTOBER 1, 2013 DARTMOUTH COLLEGE http://www.dartmouth.edu/~security/ #12;1 Table of Contents MESSAGE FROM THE DIRECTOR OF SAFETY AND SECURITY................................................................................................................................................................... 7 ANNUAL SECURITY REPORT

  3. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01T23:59:59.000Z

    of climate change, energy security and economic stability.DoD is improving U.S. energy security and national security.www.greenpacks.org Energy Security & Climate Change:

  4. Analysis of Potential Energy Saving and CO2 Emission Reduction of Home Appliances and Commercial Equipments in China

    SciTech Connect (OSTI)

    Zhou, Nan; Fridley, David; McNeill, Michael; Zheng, Nina; Letschert, Virginie; Ke, Jing; Saheb, Yamina

    2010-06-07T23:59:59.000Z

    China is now the world's largest producer and consumer of household appliances and commercial equipment. To address the growth of electricity use of the appliances, China has implemented a series of minimum energy performance standards (MEPS) for 30 appliances, and voluntary energy efficiency label for 40 products. Further, in 2005, China started a mandatory energy information label that covers 19 products to date. However, the impact of these standard and labeling programs and their savings potential has not been evaluated on a consistent basis. This research involved modeling to estimate the energy saving and CO{sub 2} emission reduction potential of the appliances standard and labeling program for products for which standards are currently in place, or under development and those proposed for development in 2010. Two scenarios that have been developed differ primarily in the pace and stringency of MEPS development. The 'Continued Improvement Scenario' (CIS) reflects the likely pace of post-2009 MEPS revisions, and the likely improvement at each revision step considering the technical limitation of the technology. The 'Best Practice Scenario' (BPS) examined the potential of an achievement of international best practice MEPS in 2014. This paper concludes that under the 'CIS' of regularly scheduled MEPS revisions to 2030, cumulative electricity consumption could be reduced by 9503 TWh, and annual CO{sub 2} emissions would be 16% lower than in the frozen efficiency scenario. Under a 'BPS' scenario for a subset of products, cumulative electricity savings would be 5450 TWh and annual CO{sub 2} emissions reduction would be 35% lower than in the frozen scenario.

  5. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  6. Office of Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  7. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    for process that controls interactions between users and resources. · Access control system implements Information Security Group Agenda · Access control basics · ACLs and capabilities · Information flow policies· Information flow policies · Bell-LaPadula Model · Role-Based Access Control · Resources 3 Information Security

  8. Security system signal supervision

    SciTech Connect (OSTI)

    Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

    1991-09-01T23:59:59.000Z

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  9. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12T23:59:59.000Z

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  10. Analysis of Potential Energy Saving and CO2 Emission Reduction of Home Appliances and Commercial Equipments in China

    SciTech Connect (OSTI)

    Zhou, Nan; Fridley, David; McNeil, Michael; Zheng, Nina; Letschert, Virginie; Ke, Jing

    2011-04-01T23:59:59.000Z

    China has implemented a series of minimum energy performance standards (MEPS) for over 30 appliances, voluntary energy efficiency label for 40 products and a mandatory energy information label that covers 19 products to date. However, the impact of these programs and their savings potential has not been evaluated on a consistent basis. This paper uses modeling to estimate the energy saving and CO{sub 2} emission reduction potential of the appliances standard and labeling program for products for which standards are currently in place, under development or those proposed for development in 2010 under three scenarios that differ in the pace and stringency of MEPS development. In addition to a baseline 'Frozen Efficiency' scenario at 2009 MEPS level, the 'Continued Improvement Scenario' (CIS) reflects the likely pace of post-2009 MEPS revisions, and the likely improvement at each revision step. The 'Best Practice Scenario' (BPS) examined the potential of an achievement of international best practice efficiency in broad commercial use today in 2014. This paper concludes that under 'CIS', cumulative electricity consumption could be reduced by 9503 TWh, and annual CO{sub 2} emissions of energy used for all 37 products would be 16% lower than in the frozen efficiency scenario. Under a 'BPS' scenario for a subset of products, cumulative electricity savings would be 5450 TWh and annual CO{sub 2} emissions reduction of energy used for 11 appliances would be 35% lower.

  11. NATURAL GAS VARIABILITY IN CALIFORNIA: ENVIRONMENTAL IMPACTS AND DEVICE PERFORMANCE EXPERIMENTAL EVALUATION OF POLLUTANT EMISSIONS FROM RESIDENTIAL APPLIANCES

    SciTech Connect (OSTI)

    Singer, Brett C.; Apte, Michael G.; Black, Douglas R.; Hotchi, Toshifumi; Lucas, Donald; Lunden, Melissa M.; Mirer, Anna G.; Spears, Michael; Sullivan, Douglas P.

    2009-12-01T23:59:59.000Z

    The effect of liquefied natural gas on pollutant emissions was evaluated experimentally with used and new appliances in the laboratory and with appliances installed in residences, targeting information gaps from previous studies. Burner selection targeted available technologies that are projected to comprise the majority of installed appliances over the next decade. Experiments were conducted on 13 cooktop sets, 12 ovens, 5 broiler burners, 5 storage water heaters, 4 forced air furnaces, 1 wall furnace, and 6 tankless water heaters. Air-free concentrations and fuel-based emission factors were determined for carbon monoxide, nitrogen oxides, nitrogen dioxide, and the number of (predominantly ultrafine) particles over complete burns?including transient effects (device warm-up and intermittent firing of burners) following ignition--and during more stable end-of-burn conditions. Formaldehyde was measured over multi-burn cycles. The baseline fuel was Northern California line gas with Wobbe number (a measure of fuel energy delivery rate) of 1320-1340; test fuels had Wobbe numbers of roughly 1390 and 1420, and in some cases 1360. No ignition or operational problems were observed during test fuel use. Baseline emissions varied widely across and within burner groups and with burner operational mode. Statistically significant emissions changes were observed for some pollutants on some burners.

  12. SECURITY AND FIRE SAFETY

    E-Print Network [OSTI]

    Barrash, Warren

    ANNUAL SECURITY AND FIRE SAFETY REPORT 2014 #12;2 Boise State University 2014 Annual Security and Fire Safety Report From the Vice President for Campus Operations and General Counsel At Boise State University, we are committed to providing a safe and secure environment for students, staff

  13. UNIVERSITY POLICE ANNUAL SECURITY

    E-Print Network [OSTI]

    Kulp, Mark

    UNIVERSITY POLICE 2013 ANNUAL SECURITY AND FIRE SAFETY GUIDE In compliance with the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act The University of New Orleans. Please take a moment to read the following information. #12;ANNUAL SECURITY AND FIRE SAFETY GUIDE 2013

  14. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1846P CustomTraining Sandia providesPRAsandhowtheycanbemanaged to increase levels of safety and security. Like othertrainings,Sandiaexpertsdesigncoursesto beasbroadorin

  15. Secure Core Contact Information

    E-Print Network [OSTI]

    Secure Core Contact Information C. E. Irvine irvine@nps.edu 831-656-2461 Department of Computer for the secure management of local and/or remote information in multiple contexts. The SecureCore project Science Graduate School of Operations and Information Sciences www.cisr.nps.edu Project Description

  16. Information Security Guide

    E-Print Network [OSTI]

    Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

  17. CS2SAT: THE CONTROL SYSTEMS CYBER SECURITY SELF-ASSESSMENT TOOL

    SciTech Connect (OSTI)

    Kathleen A. Lee

    2008-01-01T23:59:59.000Z

    The Department of Homeland Security National Cyber Security Division has developed the Control System Cyber Security Self-Assessment Tool (CS2SAT) that provides users with a systematic and repeatable approach for assessing the cyber-security posture of their industrial control system networks. The CS2SAT was developed by cyber security experts from Department of Energy National Laboratories and with assistance from the National Institute of Standards and Technology. The CS2SAT is a desktop software tool that guides users through a step-by-step process to collect facility-specific control system information and then makes appropriate recommendations for improving the systems cyber-security posture. The CS2SAT provides recommendations from a database of industry available cyber-security practices, which have been adapted specifically for application to industry control system networks and components. Each recommendation is linked to a set of actions that can be applied to remediate-specific security vulnerabilities.

  18. TOWARD HIGHLY SECURE AND AUTONOMIC COMPUTING SYSTEMS: A HIERARCHICAL APPROACH

    SciTech Connect (OSTI)

    Lee, Hsien-Hsin S

    2010-05-11T23:59:59.000Z

    The overall objective of this research project is to develop novel architectural techniques as well as system software to achieve a highly secure and intrusion-tolerant computing system. Such system will be autonomous, self-adapting, introspective, with self-healing capability under the circumstances of improper operations, abnormal workloads, and malicious attacks. The scope of this research includes: (1) System-wide, unified introspection techniques for autonomic systems, (2) Secure information-flow microarchitecture, (3) Memory-centric security architecture, (4) Authentication control and its implication to security, (5) Digital right management, (5) Microarchitectural denial-of-service attacks on shared resources. During the period of the project, we developed several architectural techniques and system software for achieving a robust, secure, and reliable computing system toward our goal.

  19. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05T23:59:59.000Z

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  20. Impacts of China's Current Appliance Standards and LabelingProgram to 2020

    SciTech Connect (OSTI)

    Fridley, David; Aden, Nathaniel; Zhou, Nan; Lin, Jiang

    2007-03-03T23:59:59.000Z

    The report summarizes the history and nature of China sstandardsand labeling program in the Introduction in Section 1. Trends indomestic production, exports, penetration rates, unit energy consumptionand the history of S&L technical levels by product are discussed ingreat detail in Section 2. The national energy impactsanalysis found inSection 3 concludes that overall China s standards and labeling programsreduce total electricity consumption in 2020 by an annual 106 TWh, or 16percent of what would otherwise been expected in that year in the absenceof standards and labeling programs.In total, the report concludes thatthe S&L programs currently in place in China are expected to save acumulative 1143 TWh by 2020, or 9 percent of the cumulative consumptionof residential electricity to that year. In 2020 alone, annual savingsare expected to be equivalent to 11 percent of residential electricityuse. In average generation terms, this is equivalent to 27 1-GW coalfired plants that would have required around 75 million tonnes of coal tooperate.In comparison, savings from the US appliance standards programalone is expected to save 10 percent of residential electricityconsumption in 2020.

  1. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W. [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2014-10-15T23:59:59.000Z

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  2. A new secure process for steganography: CI2 Stego-security and topological-security

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    A new secure process for steganography: CI2 Stego-security and topological-security Nicolas Friot1- formation hiding security fields. We show that the proposed scheme is stego-secure, which is the highest level of security in a well defined and studied category of attack called "watermark-only attack

  3. Information SecurityInformation Security--Applications andApplications and

    E-Print Network [OSTI]

    Ahmed, Farid

    Information SecurityInformation Security-- Applications andApplications and Techniques about? InformationInformation SecuritySecurity Information SecurityInformation Security What?What? Why of Information SecuritySecurity Network SecurityNetwork Security PGP, SSL,PGP, SSL, IPsecIPsec Data Security

  4. Securing Internet Routing Securing Internet Routing

    E-Print Network [OSTI]

    Goldberg, Sharon

    Plane (Routing protocols): S h b d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc Set up paths between nodes [Kent Lynn Seo 00] Listen-Whisper, etc., Data Plane: Given d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc Set up paths

  5. Security as a Dimension of Quality of Service in Active Service Environments Cynthia Irvine, Tim Levin, Evie Spyropoulou and Bruce Allen

    E-Print Network [OSTI]

    Security as a Dimension of Quality of Service in Active Service Environments Cynthia Irvine, Tim; supporting user requirements for performance and security; and providing support for tasks to adapt.g. total throughput. The notion of security variability has been discussed before. A Quality of Protection

  6. National Security Technology Incubation Strategic Plan

    SciTech Connect (OSTI)

    None

    2007-01-01T23:59:59.000Z

    This strategic plan contains information on the vision, mission, business and technology environment, goals, objectives, and incubation process of the National Security Technology Incubation Program (NSTI) at Arrowhead Center. The development of the NSTI is a key goal of the National Security Preparedness Project (NSPP). Objectives to achieve this goal include developing incubator plans (strategic, business, action, and operations), creating an incubator environment, creating a support and mentor network for companies in the incubator program, attracting security technology businesses to the region, encouraging existing business to expand, initiating business start-ups, evaluating products and processes of the incubator program, and achieving sustainability of the incubator program. With the events of 9/11, the global community faces ever increasing and emerging threats from hostile groups determined to rule by terror. According to the National Nuclear Security Administration (NNSA) Strategic Plan, the United States must be able to quickly respond and adapt to unanticipated situations as they relate to protection of our homeland and national security. Technology plays a key role in a strong national security position, and the private business community, along with the national laboratories, academia, defense and homeland security organizations, provide this technology. Fostering innovative ideas, translated into relevant technologies answering the needs of NNSA, is the purpose of the NSTI. Arrowhead Center of New Mexico State University is the operator and manager of the NSTI. To develop the NSTI, Arrowhead Center must meet the planning, development, execution, evaluation, and sustainability activities for the program and identify and incubate new technologies to assist the NNSA in meeting its mission and goals. Technology alone does not give a competitive advantage to the country, but the creativity and speed with which it is employed does. For a company to succeed, it must have sustainable competitive advantages in seven key areas: geography, products and businesses, distribution, sales and service culture, efficiency, brand, and most important, people. The four strategic goals of the plan are to: 1. Identify and recruit small businesses with technology applications for national security. 2. Design and implement a national security incubator program that provides incubator services and physical space for the targeted businesses. 3. Provide business assistance and technical leadership to NSTI clients to assist in bringing their products to market. 4. Construct a new multi-tenant facility with dedicated physical space for businesses with technology applications for national security.

  7. SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2013)

    E-Print Network [OSTI]

    2013-01-01T23:59:59.000Z

    SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2013) Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/sec.819 SPECIAL ISSUE PAPER Integrating security mechanisms, must be protected against security threats. Due to the security and also resource constraint concerns

  8. Using Security and Domain ontologies for Security Requirements Analysis

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    Using Security and Domain ontologies for Security Requirements Analysis Amina Souag, Camille.Mouratidis@uel.ac.uk Abstract-- Recent research has argued about the importance of considering security during Requirements that security being a multi-faceted problem, a single security ontology is not enough to guide SR Engineering

  9. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security.cuny.edu Published: November 2014 Holiday Season Phishing Scams and Malware Campaigns CUNY/CIS Information Security.cuny.edu under "CUNY Issued Security Advisories" Visit the Federal Trade Commission's Consumer Information page

  10. INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY

    E-Print Network [OSTI]

    Subramanian, Sriram

    - 1 INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable INFORMATION SECURITY POLICY.doc Introduction Why Information Security? The access, availability

  11. Opportunities for regional harmonization of appliance standards and l abeling program

    SciTech Connect (OSTI)

    McNeil, Michael A.

    2003-09-01T23:59:59.000Z

    The South Asian Regional Initiative for Energy (SARI/Energy) calls for a series of activities to promote Energy Efficiency Standards and Labeling (EES&L) of end use appliances in the region. In pursuit of this goal, the project supports several seminars and meetings that bring together policymakers and stakeholders from throughout the region. The purpose of these gatherings is to encourage a dialogue among participants as to the benefits and barriers associated with EES&L programs. In addition, it is the role of the program organizers to provide participants with the technical details necessary to make progress towards effective efficiency programs. One component of the initiative is to encourage the harmonization (alignment) of existing program components, and the pursuit of new programs coordinated at the regional level. In support of this goal, the report provides information aimed at motivating and enabling cooperative activities which will provide concrete benefits to programs in each country, whether well developed, or still in the initial planning stage. It should be emphasized that the underlying objective of the harmonization component of the SARI/Energy project is to increase the potential for success of EES&L programs of all countries involved, and to reduce burdens on manufacturers, exporters and importers in each country. Harmonization ''for it's own sake'' is not desirable, nor is it suggested that policymakers should bring their programs in line with international norms if doing so would present a disadvantage to their own efficiency programs, or to commercial interests within their country. If there is no such disadvantage, however, the program encourages alignment of policies and provides a forum at which this alignment can be pursued. The report covers several main topics, with varying emphasis. First, a general discussion of the motivation for an explicit policy of regional harmonization is given. Next, the current status of existing programs in the region are discussed in some detail. The section that follows covers the harmonization of efficiency test procedures. Special attention is given to this component of an EES&L program because it is the most critical element in terms of harmonization--having incompatible test procedures between trade partners can greatly impact the effectiveness of a program, and it can also unduly impact trade. Currently, policymakers in India and Sri Lanka are collaborating with the goal of aligning refrigerator test procedures used in their respective programs. For this reason, the section on test procedures of refrigerators goes into a significant amount of technical detail, in order to provide the clearest possible articulation of issues to be resolved in bringing the procedures into alignment. Following the discussion of test procedures, the report contains a section each on harmonization of efficiency rating levels, development of label designs, and enforcement issues. The report is organized such that the sections covering current programs and test procedures are subdivided by target appliance. These sections are further divided by country, where applicable. Each section is concluded with recommendations.

  12. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01T23:59:59.000Z

    Information and communication systems securityTrust: An Element of Information Security, in Security andInternational Journal of Information Security, vol. 4, pp.

  13. Adapter plate assembly for adjustable mounting of objects

    DOE Patents [OSTI]

    Blackburn, R.S.

    1986-05-02T23:59:59.000Z

    An adapter plate and two locking discs are together affixed to an optic table with machine screws or bolts threaded into a fixed array of internally threaded holes provided in the table surface. The adapter plate preferably has two, and preferably parallel, elongated locating slots each freely receiving a portion of one of the locking discs for secure affixation of the adapter plate to the optic table. A plurality of threaded apertures provided in the adapter plate are available to attach optical mounts or other devices onto the adapter plate in an orientation not limited by the disposition of the array of threaded holes in the table surface. An axially aligned but radially offset hole through each locking disc receives a screw that tightens onto the table, such that prior to tightening of the screw the locking disc may rotate and translate within each locating slot of the adapter plate for maximum flexibility of the orientation thereof.

  14. Adapter plate assembly for adjustable mounting of objects

    DOE Patents [OSTI]

    Blackburn, Robert S. (Albuquerque, NM)

    1987-01-01T23:59:59.000Z

    An adapter plate and two locking discs are together affixed to an optic table with machine screws or bolts threaded into a fixed array of internally threaded holes provided in the table surface. The adapter plate preferably has two, and preferably parallel, elongated locating slots each freely receiving a portion of one of the locking discs for secure affixation of the adapter plate to the optic table. A plurality of threaded apertures provided in the adapter plate are available to attach optical mounts or other devices onto the adapter plate in an orientation not limited by the disposition of the array of threaded holes in the table surface. An axially aligned but radially offset hole through each locking disc receives a screw that tightens onto the table, such that prior to tightening of the screw the locking disc may rotate and translate within each locating slot of the adapter plate for maximum flexibility of the orientation thereof.

  15. Accelerating the Adoption of Second-Tier Reach Standards forApplicable Appliance Products in China

    SciTech Connect (OSTI)

    Lin, Jiang; Fridley, David

    2007-03-01T23:59:59.000Z

    The minimum energy efficiency standards program for household appliances in China was initiated in 1989. Since 1996, CLASP and its implementing partner, LBNL, have assisted China in developing 11 minimum energy performance standards (MEPS) for 9 products and endorsement labels for 11 products including: refrigerators; air conditioners; clothes washers; televisions; printers; computers; monitors; fax machines; copiers; DVD/VCD players; external power supplies; and set-top boxes (under development). Before 2003, China's traditional approach to standards development involved small increases in efficiency requirements for implementation within 6 months of a standard's approval. Since 2003, China has adopted a new approach in setting MEPS. This new approach involves the development of two tiers of standards--one for initial implementation and a second tier at a more aggressive level of energy efficiency for implementation three to five years later. The second-tier standard is also referred to as a 'reach standard'. Reach standards have now been developed in China for: color TVs; refrigerators; air conditioners; and external power supplies. This report is presented in five sections. After the introduction in Section 1, Section 2 analyzes the distribution of the efficiency of refrigerators and air-conditioners in China based on data collected by the China Energy Label Center for the mandatory energy information label program. The results provide an assessment of the adoption of reach standards for these two products. Section 3 summarizes on-going collaborations with Shanghai related to early local adoption of reach standards, and presents both the impact and an analysis of barriers to the local adoption of reach standard for air-conditioners. Section 4 offers suggestions for local governments on how to move forward in adopting reach standards in their localities and concludes with a summary of the results and a plan for developing local capacity in order to achieve success in adopting reach standards.

  16. Max Tech Appliance Design: Potential for Maximizing U.S. Energy Savings through Standards

    SciTech Connect (OSTI)

    Garbesi, Karina; Desroches, Louis-Benoit; Bolduc, Christopher; Burch, Gabriel; Hosseinzadeh, Griffin; Saltiel, Seth

    2011-05-06T23:59:59.000Z

    This study surveyed the technical potential for efficiency improvements in 150 categories of appliances and equipment representing 33 quads of primary energy use across the US economy in 2010 and (1) documented efficient product designs, (2) identified the most promising cross-cutting strategies, and (3) ranked national energy savings potential by end use. Savings were estimated using a method modeled after US Department of Energy priority-setting reports - simplified versions of the full technical and economic analyses performed for rulemakings. This study demonstrates that large savings are possible by replacing products at the end-of-life with ultra-efficient models that use existing technology. Replacing the 50 top energy-saving end-uses (constituting 30 quads of primary energy consumption in 2010) with today's best-on-market equivalents would save {approx}200 quads of US primary energy over 30 years (25% of consumption anticipated there from). For the 29 products for maximum feasible savings potential could be estimated, the savings were twice as high. These results demonstrate that pushing ultra-efficient products to market could significantly escalate carbon emission reductions and is a viable strategy for sustaining large emissions reductions through standards. The results of this analysis were used by DOE for new coverage prioritization, to identify key opportunities for product prototyping and market development, and will leverage future standards rulemakings by identifying the full scope of maximum feasible technology options. High leverage products include advances lighting systems, HVAC, and televisions. High leverage technologies include electronic lighting, heat pumps, variable speed motors, and a host of controls-related technologies.

  17. Realized and Projected Impacts of U.S. Energy Efficiency Standards for Residential and Commercial Appliances

    SciTech Connect (OSTI)

    Meyers, Stephen P.; McMahon, James; Atkinson, Barbara

    2008-05-08T23:59:59.000Z

    This study estimated energy, environmental and consumer economic impacts of U.S. Federal residential energy efficiency standards that became effective in the 1988-2006 period, and of energy efficiency standards for fluorescent lamp ballasts and distribution transformers. These standards have been the subject of in-depth analyses conducted as part of DOE's standards rulemaking process. This study drew on those analyses, but updated certain data and developed a common framework and assumptions for all of the products in order to estimate realized impacts and to update projected impacts. It also performed new analysis for the first (1990) fluorescent ballast standards, which had been introduced in the NAECA legislation without a rulemaking. We estimate that the considered standards will reduce residential/ commercial primary energy consumption and carbon dioxide emissions in 2030 by 4percent compared to the levels expected without any standards. The reduction for the residential sector is larger, at 8percent. The estimated cumulative energy savings from the standards amount to 39 quads by 2020, and 63 quads by 2030. The standards will also reduce emissions of carbon dioxide by considerable amounts.The estimated cumulative net present value of consumer benefit amounts to $241 billion by 2030, and grows to $269 billion by 2045. The overall ratio of consumer benefits to costs (in present value terms) in the 1987-2050 period is 2.7 to 1. Although the estimates made in this study are subject to a fair degree of uncertainty, we believe they provide a reasonable approximation of the national benefits resulting from Federal appliance efficiency standards.

  18. A Global Review of Incentive Programs to Accelerate Energy-Efficient Appliances and Equipment

    SciTech Connect (OSTI)

    de la Rue du Can, Stephane; Phadke, Amol; Leventis, Greg; Gopal, Anand

    2013-08-01T23:59:59.000Z

    Incentive programs are an essential policy tool to move the market toward energy-efficient products. They offer a favorable complement to mandatory standards and labeling policies by accelerating the market penetration of energy-efficient products above equipment standard requirements and by preparing the market for increased future mandatory requirements. They sway purchase decisions and in some cases production decisions and retail stocking decisions toward energy-efficient products. Incentive programs are structured according to their regulatory environment, the way they are financed, by how the incentive is targeted, and by who administers them. This report categorizes the main elements of incentive programs, using case studies from the Major Economies Forum to illustrate their characteristics. To inform future policy and program design, it seeks to recognize design advantages and disadvantages through a qualitative overview of the variety of programs in use around the globe. Examples range from rebate programs administered by utilities under an Energy-Efficiency Resource Standards (EERS) regulatory framework (California, USA) to the distribution of Eco-Points that reward customers for buying efficient appliances under a government recovery program (Japan). We found that evaluations have demonstrated that financial incentives programs have greater impact when they target highly efficient technologies that have a small market share. We also found that the benefits and drawbacks of different program design aspects depend on the market barriers addressed, the target equipment, and the local market context and that no program design surpasses the others. The key to successful program design and implementation is a thorough understanding of the market and effective identification of the most important local factors hindering the penetration of energy-efficient technologies.

  19. Enhance your Cyber Security Knowledge

    E-Print Network [OSTI]

    Enhance your Cyber Security Knowledge About NPS CS FUNDAMENTALS: Create a strong foundational by increasing the effectiveness of the armed forces of the United States and its allies. Cyber Security-4015 About CISR #12;Cyber Security Adversarial Techniques Cyber Security Defense Cyber Security Fundamentals

  20. Annual Security Report October 2013

    E-Print Network [OSTI]

    Goddard III, William A.

    1 Annual Security Report October 2013 Mission Statement The Campus Security and Parking Services Department ("Security") exists to provide a secure and welcoming research, educational, and work environment in which security concerns are balanced with freedom of movement in an open campus atmosphere while

  1. Dumb Ideas in Computer Security

    E-Print Network [OSTI]

    Dumb Ideas in Computer Security Dr Charles P Pfleeger Pfleeger Consulting Group 19 July 2011 chuck Security" (2005) http://www.ranum.com/security/computer_security/editorials/dumb/ Default permit Ideas in Computer Security 219 Jul 2011 #12;Struck a Nerve Results 1-10 of about 2,030,000 for dumb

  2. Security Division 2007 Annual Report

    E-Print Network [OSTI]

    Computer Security Division 2007 Annual Report #12;TAble of ConTenTS Welcome Division Organization The Computer Security Division Responds to the Federal Information Security Management Act of 2002 Security Information Technology 15 Security Testing and Metrics 17 Validation Programs and Laboratory Accreditation 17

  3. August 2003 IT SECURITY METRICS

    E-Print Network [OSTI]

    August 2003 IT SECURITY METRICS Elizabeth B. Lennon, Editor Information Technology Laboratory approach to measuring information security. Evaluating security at the sys tem level, IT security metrics and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

  4. Energy Security Initiatives Update

    Broader source: Energy.gov [DOE]

    Presentationgiven at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meetinglists Federal government energy security initiatives.

  5. TEC Information Security

    Broader source: Energy.gov (indexed) [DOE]

    External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

  6. Personnel Security Specialist

    Broader source: Energy.gov [DOE]

    The Office of the Associate Under Secretary for Environment, Health, Safety, and Security (AU) which provides corporate leadership and strategic approaches for protecting DOEs workers, the public,...

  7. NNSA orders security enhancements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    badge or valid driver's license) before proceeding, and will be asked to vouch for other vehicle occupants. LOS ALAMOS, N. M., Dec. 21, 2012-The National Nuclear Security...

  8. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08T23:59:59.000Z

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  9. Hazardous Material Security (Maryland)

    Broader source: Energy.gov [DOE]

    All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

  10. National Nuclear Security Administration

    Broader source: Energy.gov (indexed) [DOE]

    and Related Structures within TA-3 at Los Alamos National Laboratory, Los Alamos, New Mexico U. S. Department of Energy National Nuclear Security Administration Los Alamos Area...

  11. "Table HC13.10 Home Appliances Usage Indicators by South Census Region, 2005"

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells,1 U.S. Department of Energygasoline4 Space2.9 Home Appliances Housing

  12. "Table HC14.10 Home Appliances Usage Indicators by West Census Region, 2005"

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells,1 U.S. Department of Energygasoline4 Space2.9 Home Appliances78 Water3.90

  13. "Table HC15.10 Home Appliances Usage Indicators by Four Most Populated States, 2005"

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells,1 U.S. Department of Energygasoline4 Space2.9 Home Appliances7835 Housing0

  14. "Table HC15.9 Home Appliances Characteristics by Four Most Populated States, 2005"

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells,1 U.S. Department of Energygasoline4 Space2.9 Home Appliances7835258

  15. "Table HC3.10 Home Appliances Usage Indicators by Owner-Occupied Housing Unit, 2005"

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells,1 U.S. Department of Energygasoline4 Space2.9 Home Appliances78352580 Home

  16. Office of Departmental Personnel Security

    Broader source: Energy.gov [DOE]

    The Office of Departmental Personnel Security serves as the central leader and advocate vested with the authority to ensure consistent and effective implementation of personnel security programs Department-wide (including for the National Nuclear Security Administration (NNSA).

  17. UC SECURITY FRAMEWORK 2011 -2012

    E-Print Network [OSTI]

    Hickman, Mark

    1 UC SECURITY FRAMEWORK 2011 - 2012 #12;2 Contents Background..................................................................................................................................4 About UC Security & Campus Community Support .................................................................5 Security Service Authority and Relationship with NZ Police and Emergency Services ...........5

  18. The security of machine learning

    E-Print Network [OSTI]

    Barreno, Marco; Nelson, Blaine; Joseph, Anthony D.; Tygar, J. D.

    2010-01-01T23:59:59.000Z

    of the IEEE symposium on security and privacy (pp. 188201).and communications security (CCS) (pp. 5968). Globerson,detection. In USENIX security symposium. Klimt, B. , & Yang,

  19. January 2005 INTEGRATING IT SECURITY

    E-Print Network [OSTI]

    January 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS By Joan S. Hash, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Introduction To assist federal agencies with effec tively integrating security

  20. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08T23:59:59.000Z

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  1. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27T23:59:59.000Z

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  2. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01T23:59:59.000Z

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  3. Social Networking? Secure Networking?

    E-Print Network [OSTI]

    Chapman, Michael S.

    Social Networking? Secure Networking? Teaching & Learning Technology Roundtable February 2010 #12 The intent behind the current security measures in place at OHSU The OHSU Social Networking Guidelines 2. To begin a campus wide dialogue exploring the changing world of online social networking and it

  4. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19T23:59:59.000Z

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  5. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29T23:59:59.000Z

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Cancels DOE P 470.1.

  6. December 2007 SECURING EXTERNAL

    E-Print Network [OSTI]

    devices such as desktop and laptop computers, personal digital assistants (PDAs), and cell phones. These teleworkers use devices such as desktop and laptop computers, personal digital assistants (PDAs), and cellDecember 2007 SECURING EXTERNAL COMPUTERS AND OTHER DEVICES USED BY TELEWORKERS SECURING EXTERNAL

  7. Global Material Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTuba City, Arizona,SiteNational Nuclear SecuritySecurity

  8. On the secure obfuscation of deterministic finite automata.

    SciTech Connect (OSTI)

    Anderson, William Erik

    2008-06-01T23:59:59.000Z

    In this paper, we show how to construct secure obfuscation for Deterministic Finite Automata, assuming non-uniformly strong one-way functions exist. We revisit the software protection approaches originally proposed by [5, 10, 12, 17] and revise them to the current obfuscation setting of Barak et al. [2]. Under this model, we introduce an efficient oracle that retains some 'small' secret about the original program. Using this secret, we can construct an obfuscator and two-party protocol that securely obfuscates Deterministic Finite Automata against malicious adversaries. The security of this model retains the strong 'virtual black box' property originally proposed in [2] while incorporating the stronger condition of dependent auxiliary inputs in [15]. Additionally, we show that our techniques remain secure under concurrent self-composition with adaptive inputs and that Turing machines are obfuscatable under this model.

  9. Army Energy Security and Independence

    Broader source: Energy.gov (indexed) [DOE]

    ARMY ENERGY SECURITY AND INDEPENDENCE Leadership Ownership Partnership 19 NOV 2008 Don Juhasz, PE, CEM CHIEF ARMY ENERGY POLICY Army Energy Security - "The Way Ahead" 2 ARMY ENERGY...

  10. Headquarters Facilities Master Security Plan

    Office of Environmental Management (EM)

    It implements the requirements of: Title 32, CFR, Part 2001, Classified National Security Information Executive Order 13526, Classified National Security Information...

  11. Sandia Energy - Water Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Infrastructure Security Home Climate & Earth Systems WaterEnergy Nexus Decision Models for Integrating EnergyWater Water Infrastructure Security Water Infrastructure...

  12. Smart-Grid Security Issues

    SciTech Connect (OSTI)

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29T23:59:59.000Z

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  13. International Nuclear Security

    SciTech Connect (OSTI)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14T23:59:59.000Z

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  14. Extracting Security Control Requirements University of Tulsa

    E-Print Network [OSTI]

    Gamble, R. F.

    , Requirements, Security Policy Modeling. 1. INTRODUCTION Networks and information systems have grown. Security has become a larger issue with the democratization of technology and information. Security accepted security controls for "Federal Information Systems and Organizations" [8]. NIST defines security

  15. INSTITUTE FOR CYBER SECURITY Application-Centric Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

  16. March 24, 2008 Databases: Security 1 Database Security and Authorization

    E-Print Network [OSTI]

    Adam, Salah

    to control login process by the DBMS Inference control The countermeasures to statistical database security database #12;March 24, 2008 Databases: Security 3 Chapter Outline Introduction Access Control Methods Policy System-related Security levels and categories Security Threats Loss of integrity Loss

  17. Safety and Security What do Safety/Security work with?

    E-Print Network [OSTI]

    Safety and Security on campus #12;Agenda What do Safety/Security work with? If something happens Opening hours Remember Website How to find us #12;The Section for Safety and Security work with; Security revolving work environment Handle locks, keys, alarms, surveillance Responsible

  18. Urban Commerce and Security Study Urban Commerce and Security Study

    E-Print Network [OSTI]

    Urban Commerce and Security Study Urban Commerce and Security Study Contact Information Fred S. Roberts Research Sponsor: Department of Homeland Security Rutgers University/CCICADA Center Professor.S. Department of Homeland Security, under Agreement 2009-ST-061-CCI002-02. Any opinions, findings

  19. SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card

    E-Print Network [OSTI]

    Li, Mo

    SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card Applying for a Social Security Card is easy AND it is FREE! If you DO NOT follow these instructions, we CANNOT process your and evidence to any Social Security office. Follow instructions below. HOW TO COMPLETE THE APPLICATION Most

  20. Wireless Security: Secure and Public Networks Villanova University

    E-Print Network [OSTI]

    36 Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer wireless access points. Security protocols exist for wireless networks; however, all widely implemented at implementing a protocol which allows public access to a secure wireless network have been made. In this report

  1. ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1

    E-Print Network [OSTI]

    Su, Xiao

    ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1 Information................................................................................................................................................................................3 Information Security Policy...............................................................................................................................................4 Information Security Policy Management

  2. SECURING RADIO FREQUENCY IDENTIFICATION (RFID)

    E-Print Network [OSTI]

    business process for an organization; as a result, the security risks for RFID systems and the controls for an organization; as a result, the security risks for RFID systems and the controls available to address themMay 2007 SECURING RADIO FREQUENCY IDENTIFICATION (RFID) SYSTEMS SECURING RADIO FREQUENCY

  3. UNCG Security Awareness Training & Instructions

    E-Print Network [OSTI]

    Saidak, Filip

    UNCG Security Awareness Training & Instructions 02.09.2010 Page 1 of 4 Educating UNCG faculty and staff with respect to security best practices is essential in securing the University's information University employee that works with restricted or financial data. UNCG engaged Fishnet Security, a nationally

  4. ANNUAL SECURITY & FIRE SAFETY REPORT

    E-Print Network [OSTI]

    Maxwell, Bruce D.

    ANNUAL SECURITY & FIRE SAFETY REPORT 2014 A guide to policies, procedures, practices, and programs implemented to keep students, faculty, and staff safe and facilities secure. www.montana.edu/reports/security.pdf #12;Inside this Report 2014 Annual Security and Fire Safety Report for Reporting Year 2013

  5. ISSUANCE 2015-07-14: Appliance Standards and Rulemaking Federal Advisory

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently Asked Questions for DOEthe Ranking Member,711997SecurityCommercialCommittee: Notice of

  6. Energy and CO2 Efficient Scheduling of Smart Home Appliances Kin Cheong Sou, Mikael Kordel, Jonas Wu, Henrik Sandberg and Karl Henrik Johansson

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    Energy and CO2 Efficient Scheduling of Smart Home Appliances Kin Cheong Sou, Mikael Kordel, Jonas Wu, Henrik Sandberg and Karl Henrik Johansson Abstract-- A major goal of smart grid technology (e.g., smart meters) is to provide consumers with demand response signals such as electricity tariff and CO2

  7. An Adaptive Approach to Energy Security and Assurance

    SciTech Connect (OSTI)

    Naqvi, Dr. Waseem [Raytheon Network Centric Systems] [Raytheon Network Centric Systems; Fernandez, Steven J [ORNL] [ORNL

    2009-01-01T23:59:59.000Z

    The North American power network has been called the world s largest, most complex machine. This network represents an enormous continent-wide investment, including over 15,000 generators in 10,000 power plants, and miles of transmission lines, distribution networks, and control systems. It has long been recognized that existing power-delivery systems are vulnerable to natural disasters and adversarial attack. The next generation of control systems must simultaneously protect against these disruptions while integrating new generation sources and maintaining active, automated control of the grid. The grid s interconnectedness needed to provide smart grid control also increases its vulnerability to interconnect-wide disruptions that are initiated locally. While strong centralized control is essential to reliable operations, this control requires multiple, high-data-rate, two-way communication links, a powerful central computing facility, and an elaborate operation-control center, all of which present vulnerabilities. It is clearly impossible to completely protect such a widespread and complex system. The key to maintaining the integrity of this network lies in the ability to identify its critical elements and to then effectively protect these elements. This identification and targeted protection will enable parts of the network to remain operational and even automatically reconfigure in the event of local failures or threats of failure, providing dependable continuity of service. The bold concept proposed here is the communication, predictive models and fast controls that eliminate the need to protect all components from emergent contingencies, but to reconfigure actively to maintain critical functions. The transformation from laboratory applications to larger than micro grid areas will require the next generation of energy technologies.

  8. Adapting technology to keep the national infrastructure safe and secure

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProducts (VAP) VAP7-0973 1 IntroductionActinide ChemistryActivities

  9. Operations Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-04-30T23:59:59.000Z

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  10. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-25T23:59:59.000Z

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  11. AMALGAMATED SECURITY COMMUNITIES

    E-Print Network [OSTI]

    Harvey, Andrew Stephen

    2011-08-31T23:59:59.000Z

    This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

  12. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-01-22T23:59:59.000Z

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  13. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Administration FY 2011 - FY 2015 Budget Outlook Managing the NNSA 4.0% Science, Technology & Engineering 14.5% Stockpile Support 17.9% Preventing the Spread of...

  14. Energy-Efficiency Labels and Standards: A Guidebook forAppliances, Equipment, and Lighting - 2nd Edition

    SciTech Connect (OSTI)

    Wiel, Stephen; McMahon, James E.

    2005-04-28T23:59:59.000Z

    Energy-performance improvements in consumer products are an essential element in any government's portfolio of energy-efficiency and climate change mitigation programs. Governments need to develop balanced programs, both voluntary and regulatory, that remove cost-ineffective, energy-wasting products from the marketplace and stimulate the development of cost-effective, energy-efficient technology. Energy-efficiency labels and standards for appliances, equipment, and lighting products deserve to be among the first policy tools considered by a country's energy policy makers. The U.S. Agency for International Development (USAID) and several other organizations identified on the cover of this guidebook recognize the need to support policy makers in their efforts to implement energy-efficiency standards and labeling programs and have developed this guidebook, together with the Collaborative Labeling and Appliance Standards Program (CLASP), as a primary reference. This second edition of the guidebook was prepared over the course of the past year, four years after the preparation of the first edition, with a significant contribution from the authors and reviewers mentioned previously. Their diligent participation helps maintain this book as the international guidance tool it has become. The lead authors would like to thank the members of the Communications Office of the Environmental Energy Technologies Division, Lawrence Berkeley National Laboratory for their support in the development, production, and distribution of the guidebook. This guidebook is designed as a manual for government officials and others around the world responsible for developing, implementing, enforcing, monitoring, and maintaining labeling and standards setting programs. It discusses the pros and cons of adopting energy-efficiency labels and standards and describes the data, facilities, and institutional and human resources needed for these programs. It provides guidance on the design, development, implementation, maintenance, and evaluation of the programs and on the design of the labels and standards themselves. In addition, it directs the reader to references and other resources likely to be useful in conducting the activities described and includes a chapter on energy policies and programs that complement appliance efficiency labels and standards. This guidebook attempts to reflect the essential framework of labeling and standards programs. It is the intent of the authors and sponsor to distribute copies of this book worldwide, at no charge, for the general public benefit. The guidebook is also available on the web at www.clasponline.org and may be downloaded to be used intact or piecemeal for whatever beneficial purposes readers may conceive.

  15. Engineering secure software

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01T23:59:59.000Z

    breaches in the operating environment. Security breaches resulting from misuse or tnisconfiguration of the program should not be blamed on the software. T'his is a debatable position. A security breach that results from an unintentional enor... units with public key algorithms, private keys, and certificates. Any attempt to access or modify the data in these devices will render them unusable. The device contains software tools. These devices use the computer they reside on as a general...

  16. Incidents of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-17T23:59:59.000Z

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  17. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

    2012-01-31T23:59:59.000Z

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or ?? tunnels?, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

  18. IY5512: Part 1 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    IY5512: Part 1 1 Information Security Group IY5512 Computer Security Part 1: Introduction to computer security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security) ... 2 Information Security Group Agenda Overview Security goals Security approaches prevention

  19. ata security feature: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing...

  20. Security enhanced with increased vehicle inspections

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security enhanced with increased vehicle inspections Security measures increase as of March: vehicle inspections won't delay traffic New increased security procedures meet LANL's...

  1. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    her students on security of process control systems. I amcyber-security tools for process control systems. In theon the security mechanisms of process control systems, few

  2. Global Environmental Change and Human Security

    E-Print Network [OSTI]

    Kunnas, Jan

    2011-01-01T23:59:59.000Z

    with human rights, human security or environmental change ifEnvironmental Change and Human Security By Matthew, RichardChange and Human Security. Cambridge, Massachusetts &

  3. Security and United States Immigration Policy

    E-Print Network [OSTI]

    Totten, Robbie James

    2012-01-01T23:59:59.000Z

    Change and European Security. London: Brassey's. Furer,1981]. American National Security, 6th ed. Baltimore, MD:J. Wheeler. 2008. The Security Dilemma: Fear, Cooperation

  4. Energy and Security in Northeast Asia

    E-Print Network [OSTI]

    May, Michael; Johnson, Celeste; Fei, Edward; Suzuki, Tatsujiro

    1996-01-01T23:59:59.000Z

    regional cooperation on energy and security issues in Asia.Energy and Security in Northeast Asia An IGCC studycan be drawn. The energy security situation and outlook are

  5. Sandia Energy - Cyber Security for Electric Infrastructure

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber Security for Electric Infrastructure Home Stationary Power Grid Modernization Cyber Security for Electric Infrastructure Cyber Security for Electric Infrastructureashoter2015...

  6. Preliminary Notice of Violation, National Security Technologies...

    Office of Environmental Management (EM)

    National Security Technologies, LLC - September 26, 2014 Preliminary Notice of Violation, National Security Technologies, LLC - September 26, 2014 September 26, 2014 Security...

  7. Personnel Security - DOE Directives, Delegations, and Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    72.2 Chg 1, Personnel Security by Mark Pekrul Functional areas: Personnel Security, Security, Human Capital The order establishes requirements that will enable DOE to operate a...

  8. Some Thoughts on Teaching Secure Programming

    E-Print Network [OSTI]

    Bishop, Matt

    2013-01-01T23:59:59.000Z

    Teaching Context in Information Security, ACM Journal onWorld Conference on Information Security Education pp. 23Colloquium on Information Systems Security Education (CISSE)

  9. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    Analysis of Information Security Games, Proceedings of theon the Economics of Information Security WEIS, Hanover, NH,on the Economics of Information Security. Anderson, R. and

  10. Vehicle security apparatus and method

    DOE Patents [OSTI]

    Veligdan, J.T.

    1996-02-13T23:59:59.000Z

    A vehicle security apparatus for use in a motor vehicle is disclosed, the apparatus comprising an optical key, a receptacle, a receiver and at least one optical fiber. The optical key has a transmitter having at least one first preprogrammed coded signal stored in a first electric circuit. The receptacle receives the optical key and at least one transmittable coded optical signal from the transmitter corresponding to the at least one preprogrammed coded signal stored in the first electric circuit. The receiver compares the at least one transmittable coded optical signal to at least one second preprogrammed coded signal stored in a second electric circuit and the receiver is adapted to trigger switching effects for at least one of enabling starting the motor vehicle and starting the motor vehicle upon determination that the at least one transmittable coded optical signal corresponds to the at least one second preprogrammed signal in the second electric circuit. The at least one optical fiber is operatively connected between the receptacle and the receiver for carrying the optical signal from the receptacle to the receiver. Also disclosed is a method for permitting only authorized use of a motor vehicle. 7 figs.

  11. Promoting India's development: energy security and climate security are convergent goals

    SciTech Connect (OSTI)

    Rajan, Gupta [Los Alamos National Laboratory; Shankar, Harihar [Los Alamos National Laboratory; Joshi, Sunjoy [INDIA

    2009-01-01T23:59:59.000Z

    This paper investigates three aspects of the energy-climate challenges faced by India. First, we examine energy security in light of anticipated growth in power generation in response to the national goal of maintaining close to 10% growth in GDP. Second, we examine possible options for mitigation and adaptation to climate change for India that it can take to the coming Copenhagen meeting on climate change. Lastly, we introduce an open web based tool for analyzing and planning global energy systems called the Global Energy Observatory (GEO).

  12. Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMFormsGasReleaseSpeechesHallNot Logged In You must createSecurity Global

  13. physical security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron4 Self-Scrubbing:,, ,Development of NovelHigh( ( ( ( (physical security |

  14. Radiological Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTuba City,Enriched UraniumPhysical Security Systems(PA)About| National

  15. Security Commodity Team | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol HomeFacebook TwitterSearch-Comments Sign InNuclear Security

  16. Security Notice | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch > TheNuclearHomeland ScienceInnovationScience andbarrierSecurity

  17. Tag: security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our InstagramStructureProposedPAGESafety Tag: Safety Displaying 1security Tag:

  18. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our Instagram Secretary Moniz is Taking OverEvaluating ' M M t345 UnlimitedSecure

  19. Secure Storage | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our Instagram Secretary Moniz is Taking OverEvaluating ' M M t345Secure Storage

  20. Engineering secure software

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01T23:59:59.000Z

    the vulnerabilities based on their coverage and cost. The above modeling approach is also known as thc onion peel model due to its nature of dividing the problem space into zones of similar security. These zones represent the peels of the onion. Each zone is also... into peels based on the security considerations of the entities of the system. The model describes minimum interaction among components across peels and maximum within peels. The onion diagram includes the physical entities of the systems and not just...

  1. GAANN -Computer Systems Security GAANN Computer Systems Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important? ­ Computing devices have a large impact on our daily life ­ Guaranteeing that the devices perform as desired

  2. Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability

    E-Print Network [OSTI]

    Ragsdale, G.

    -25, 2010 Implementing TCG Standards Within Systems ? Trusted Platform Module (TPM) ? Provides root of trust ? Secure storage ? Signing & hashing functions ? Tamper detection ? Accelerates cryptography ? TPM software stack ? Implements TCG stack... Update Session Security (symmetric key) Code and Data Integrity (memory hash) ?Secure secret storage ?TPM chip root trust secret ?Owner root trust secret ?Memory hash signature ?Standard encryption algorithm ?Standard hashing algorithm ?Tamper detection...

  3. SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011

    E-Print Network [OSTI]

    SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011 Choose brands and models of mobile devices that have the options referenced below. Use all available security options that your or sensitive university information in un-approved off-campus services, such as public cloud based services

  4. Security Patterns: Comparing Modeling Approaches Armstrong NHLABATSI

    E-Print Network [OSTI]

    Jurjens, Jan

    Security Patterns: Comparing Modeling Approaches Armstrong NHLABATSI ** , Arosha BANDARA the challenges of developing secure software systems remains an active research area in software engineering. Current research efforts have resulted in the documentation of recurring security problems as security

  5. INFORMATION SECURITY University Policy No: IM7800

    E-Print Network [OSTI]

    Herwig, Falk

    Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

  6. Departmental Personnel Security- Clearance Automation

    Broader source: Energy.gov [DOE]

    The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

  7. Computer Security Incident Handling Guide

    E-Print Network [OSTI]

    States Computer Emergency Readiness Team National Cyber Security Division Department of Homeland Security of Standards and Technology Gaithersburg, MD Karen Scarfone Scarfone Cybersecurity C O M P U T E R S E C U R I

  8. System security Dr Len Hamey

    E-Print Network [OSTI]

    Hamey, Len

    , firewalls, detecting intrusions) Security process cycle policy implementation administration audit risk access with firewall Use generic service banners Use intrusion detection system that can detect;2 Security Services Confidentiality service. Authentication service. Integrity service. Access Control

  9. Enhancing Transportation Energy Security through Advanced Combustion...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Transportation Energy Security through Advanced Combustion and Fuels Technologies Enhancing Transportation Energy Security through Advanced Combustion and Fuels Technologies 2005...

  10. Line Management Perspective: National Nuclear Security Administration...

    Broader source: Energy.gov (indexed) [DOE]

    National Nuclear Security Administration (NNSA) Line Management Perspective: National Nuclear Security Administration (NNSA) Addthis Description Slide Presentation by Jim...

  11. Office of Security Assessments | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    information, personnel security, and foreign visits and assignments. Assesses the information security practices at facilities managing special access programs and...

  12. Secretary Richardson Accepts Recommendations for Improving Security...

    National Nuclear Security Administration (NNSA)

    Secretary Richardson Accepts Recommendations for Improving Security at Nuclear Weapons Laboratories | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS...

  13. Security Science & Technology | Nuclear Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Science & Technology Border Security Comprehensive Vulnerability and Threat Analysis Consequence Management, Safeguards, and Non-Proliferation Tools Export...

  14. Corporate Security and Conflict Outcomes

    E-Print Network [OSTI]

    Tkach, Benjamin K

    2013-10-21T23:59:59.000Z

    militaries (Avant 2000). Existing research has shown a steady increase in the number and employment of private security firms (PSFs) over the last five decades due to expansion of global market demand for private security (Avant 2005; Dunigan 2011; Singer... prominent role in international aviation security (Abrahamsen and Williams 2011). Because PSFs are based largely on corporate profit motivations, contract fulfillment and reputation are critical for firms to secure market share. The international market...

  15. East Asian Security in 2025

    E-Print Network [OSTI]

    Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

    2008-01-01T23:59:59.000Z

    East Asian Security in 2025 Who We Are Reagan Heavin Energy Adam Hudson State Capacity Brandon Krueger Military Sean ONeil Demographics Griffin Rozell Balance of Power Matt Suma Economy East Asian Security in 2025 China...: Competition, Cooperation, Plateau? Reagan Heavin Adam Hudson Brandon Krueger Sean ONeil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda Conclusions Projections Drivers Four Outcomes Questions East Asian Security in 2025...

  16. Safeguards and Security Program References

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

  17. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12T23:59:59.000Z

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

  18. Safeguard Security and Awareness Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-10-02T23:59:59.000Z

    Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

  19. Simulated Interdiction: Proliferation Security Initiative

    E-Print Network [OSTI]

    2009-01-01T23:59:59.000Z

    ... Technical Capabilities to Support PSI Foreign Policy and External Relations ............... Republic of Bevostan .. Geography ... iii 1 3 4 5 6 7 8 8 8 8 8 9 9 10... Security, Science and Policy Institute (NSSPI) Texas A&M University May 6, 2009 Simulated Interdiction: The Proliferation Security Initiative (PSI) Acknowledgements The National Nuclear Security Administration (NNSA) of the U.S. Department...

  20. Security and Verification Provable cryptography

    E-Print Network [OSTI]

    Gregoire, Benjamin - Institut National de Recherche en Informatique et en Automatique, Centre de recherche Sophia Antipolis

    Security and Verification Provable cryptography Benjamin Grgoire1 Tamara Rezk1 1INRIA Sophia Antipolis - Mditerrane, France Cours de Master 2 Univerisit de Nice Sophia-Antipolis Security and Verification 1/ 33 #12;Cryptanalysis-driven Security Propose a cryptographic scheme Wait for someone to come

  1. MINIMUM SECURITY REQUIREMENTS FOR FEDERAL

    E-Print Network [OSTI]

    March 2006 MINIMUM SECURITY REQUIREMENTS FOR FEDERAL INFORMATION AND INFORMATION SYSTEMS: FEDERAL INFORMATION PROCESSING STANDARD (FIPS) 200 APPROVED BY THE SECRETARY OF COMMERCE MINIMUM SECURITY REQUIREMENTS BY THE SECRETARY OF COMMERCE Shirley Radack, EditorShirley Radack, Editor Computer Security Division

  2. RECOMMENDED SECURITY CONTROLS FOR FEDERAL

    E-Print Network [OSTI]

    May 2005 RECOMMENDED SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS: GUIDANCE FOR SELECTING COST-EFFECTIVE CONTROLS USING A RISK-BASED PROCESS Shirley Radack, Editor, Computer Security Division, Information Technology Laboratory National Institute of Standards and Technology Security controls are the management

  3. Positioning Security from electronic warfare

    E-Print Network [OSTI]

    Kuhn, Markus

    Positioning Security from electronic warfare to cheating RFID and road-tax systems Markus Kuhn;Military positioning-security concerns Electronic warfare is primarily about denying or falsifying location of the importance of global positioning security has led to the military discipline of "navigation warfare". 5 #12

  4. Information Technology Security Assessment Framework

    E-Print Network [OSTI]

    Federal Information Technology Security Assessment Framework November 28, 2000 Prepared (NIST) Computer Security Division #12;Overview Information and the systems that process it are among and maintain a program to adequately secure its information and system assets. Agency programs must: 1) assure

  5. Foundations for Designing Secure Architectures

    E-Print Network [OSTI]

    Jurjens, Jan

    Architectures This talk: foundations for designing software architectures for secure systems, based their architectures. Will apply specialized tool-support to automatically evaluate the designs for potential security weaknesses. (Based on tutorial at WICSA 2004.) #12;Jan Jrjens, TU Munich: Foundations for Designing Secure

  6. GEORG-AUGUST-UNIVERSITT Computer Security

    E-Print Network [OSTI]

    Grabowski, Jens

    GEORG-AUGUST-UNIVERSITT GTTINGEN Computer Security Overview and Introduction Computer Security Security @ Gttingen Research group for comuter security Prof. Dr. Konrad Rieck 4 PhD students (+ 2 security Research on analysis, detection and prevention of threats Development of intelligent security

  7. SECURITY TECHNIQUES Chris J Mitchell1

    E-Print Network [OSTI]

    Mitchell, Chris

    SECURITY TECHNIQUES Chris J Mitchell1 Introduction In this paper we consider the range of security security has been exerted. However, the techniques described are of general applicability by a security technique; in doing so we will distinguish between security features and security techniques (or

  8. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12T23:59:59.000Z

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  9. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16T23:59:59.000Z

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  10. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28T23:59:59.000Z

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  11. The decommodified security ratio

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    are currently experiencing: changing patterns of work, the phenom- enon she calls the "breakdown in the wage furthered by the work of the International Labour Office. In particular, the programme of researchThe decommodified security ratio: A tool for assessing European social protection systems Georges

  12. Transmission Line Security Monitor

    ScienceCinema (OSTI)

    None

    2013-05-28T23:59:59.000Z

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  13. Conceptualizing Energy Security

    E-Print Network [OSTI]

    Winzer, Christian

    Energy security is one of the main targets of energy policy. However, the term has not been clearly defined, which makes it hard to measure and difficult to balance against other policy objectives. We review the multitude of definitions of energy...

  14. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21T23:59:59.000Z

    To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

  15. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

  16. December 2003 SECURITY CONSIDERATIONS

    E-Print Network [OSTI]

    Perkins, Richard A.

    security early in the information system development life cycle (SDLC), you may be able to avoid higher, with tailoring, to any SDLC model or acquisition method the organization is using. The appendices to the guide.nist.gov/publications/nistpubs/ index.html. The System Development Life Cycle (SDLC) The system development life cycle starts

  17. National Security System Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-03-08T23:59:59.000Z

    The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

  18. Metaphors for cyber security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01T23:59:59.000Z

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  19. Transmission Line Security Monitor

    SciTech Connect (OSTI)

    None

    2011-01-01T23:59:59.000Z

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  20. A network security monitor

    SciTech Connect (OSTI)

    Heberlein, L.T.; Dias, G.V.; Levitt, K.N.; Mukherjee, B.; Wood, J.; Wolber, D. (California Univ., Davis, CA (USA). Dept. of Electrical Engineering and Computer Science)

    1989-11-01T23:59:59.000Z

    The study of security in computer networks is a rapidly growing area of interest because of the proliferation of networks and the paucity of security measures in most current networks. Since most networks consist of a collection of inter-connected local area networks (LANs), this paper concentrates on the security-related issues in a single broadcast LAN such as Ethernet. Specifically, we formalize various possible network attacks and outline methods of detecting them. Our basic strategy is to develop profiles of usage of network resources and then compare current usage patterns with the historical profile to determine possible security violations. Thus, our work is similar to the host-based intrusion-detection systems such as SRI's IDES. Different from such systems, however, is our use of a hierarchical model to refine the focus of the intrusion-detection mechanism. We also report on the development of our experimental LAN monitor currently under implementation. Several network attacks have been simulated and results on how the monitor has been able to detect these attacks are also analyzed. Initial results demonstrate that many network attacks are detectable with our monitor, although it can surely be defeated. Current work is focusing on the integration of network monitoring with host-based techniques. 20 refs., 2 figs.

  1. Development of an Automated Security Risk Assessment Methodology Tool for Critical Infrastructures.

    SciTech Connect (OSTI)

    Jaeger, Calvin D.; Roehrig, Nathaniel S.; Torres, Teresa M.

    2008-12-01T23:59:59.000Z

    This document presents the security automated Risk Assessment Methodology (RAM) prototype tool developed by Sandia National Laboratories (SNL). This work leverages SNL's capabilities and skills in security risk analysis and the development of vulnerability assessment/risk assessment methodologies to develop an automated prototype security RAM tool for critical infrastructures (RAM-CITM). The prototype automated RAM tool provides a user-friendly, systematic, and comprehensive risk-based tool to assist CI sector and security professionals in assessing and managing security risk from malevolent threats. The current tool is structured on the basic RAM framework developed by SNL. It is envisioned that this prototype tool will be adapted to meet the requirements of different CI sectors and thereby provide additional capabilities.

  2. April 30 Public Meeting: Physical Characterization of Smart and Grid-Connected Commercial and Residential Building End-Use Equipment and Appliances

    Broader source: Energy.gov [DOE]

    These documents contain slide decks presented at the Physical Characterization of Smart and Grid-Connected Commercial and Residential Buildings End-Use Equipment and Appliances public meeting held on April 30, 2014. The first document includes the first presentation from the meeting: DOE Vision and Objectives. The second document includes all other presentations from the meeting: Terminology and Definitions; End-User and Grid Services; Physical Characterization Framework; Value, Benefits & Metrics.

  3. 1. Check to make sure all electrical appliances, such as curling irons, toasters, etc. are unplugged. Exceptions are clocks and refrigerators. Keep your refrigerator plugged in!

    E-Print Network [OSTI]

    Minnesota, University of

    . are unplugged. Exceptions are clocks and refrigerators. Keep your refrigerator plugged in! 2. Secure windows

  4. FOILFEST :community enabled security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

    2005-09-01T23:59:59.000Z

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

  5. Security seal. [Patent application

    DOE Patents [OSTI]

    Gobeli, G.W.

    1981-11-17T23:59:59.000Z

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  6. Cyber Security & Smart Grid

    E-Print Network [OSTI]

    Shapiro, J.

    2011-01-01T23:59:59.000Z

    to complexity, proprietary nature and different management teams ? Ripe for exploitation ? Intel, Microsoft, Security vendors are not focused on this technology ? Many are NOT PC?s ? Many can be infected and the devices cannot be cleaned ESL-KT-11...-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Inherent Vulnerabilities ? Two-way communications ? Distributed connectivity ? Customer usage data ? Metering devices ? Weak authentication and access control ? Lack of adequate training ? Lack...

  7. Perceptions of Security

    E-Print Network [OSTI]

    Ura, Karma

    2001-01-01T23:59:59.000Z

    followed by guerrillas, waged by the Bhutanese militia in rugged terrain. Though not written in accounts of any battles, the form of war oral sources describe suggest unconventional warfare. The natural defence position of the terrain combined with its... nor poverty in the areas adjacent to Bhutan, which are the ultimate causes of the current security problems Bhutan faces, are unfortunately on decline. Journal of Bhutan Studies 136 On the other hand, Bhutan, like several small states, has been...

  8. Security, Safety and Health

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory BoardSecuring

  9. Information Security Management System for Microsoft's Cloud Infrastructure

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Information Security Management System for Microsoft's Cloud Infrastructure Online Services ......................................................................................................................................................................................1 Information Security Management System.......................................................................................................................7 Information Security Management Forum

  10. Optimal Resource Allocation for Security in Reliability Systems M. N. Azaiez

    E-Print Network [OSTI]

    Wang, Hai

    systems, about protecting nuclear power plants against terrorist attacks or sabotage, or about ensuring, the threat is usually assumed to be static, rather than responding in an adaptive way to the defenses to defense against intentional threats to security have dealt either with components in isolation (Major

  11. Unconditional Security of the Bennett 1992 quantum key-distribution over lossy and noisy channel

    E-Print Network [OSTI]

    Kiyoshi Tamaki; Norbert Ltkenhaus

    2003-08-11T23:59:59.000Z

    We show that the security proof of the Bennett 1992 protocol over loss-free channel in (K. Tamaki, M. Koashi, and N. Imoto, Phys. Rev. Lett. 90, 167904 (2003)) can be adapted to accommodate loss. We assumed that Bob's detectors discriminate between single photon states on one hand and vacuum state or multi-photon states on the other hand.

  12. Implementing Information Security and Its Technology: A Line Management Perspective

    E-Print Network [OSTI]

    Barletta, William A.

    2005-01-01T23:59:59.000Z

    of an integrated information security and privacy program.An institution's information security program forms thefrom the chief information security officer, chief security

  13. 2014 Headquarters Facilities Master Security Plan - Chapter 8...

    Office of Environmental Management (EM)

    8, Operations Security Program 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program June 2014 2014 Headquarters Facilities Master Security...

  14. 2014 Headquarters Facilities Master Security Plan - Chapter 14...

    Office of Environmental Management (EM)

    4, Cyber Security 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

  15. 2014 Headquarters Facilities Master Security Plan - Chapter 1...

    Office of Environmental Management (EM)

    , Physical Security 2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 1,...

  16. 2014 Headquarters Facilities Master Security Plan - Chapter 10...

    Office of Environmental Management (EM)

    0, Security Awareness Program 2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program June 2014 2014 Headquarters Facilities Master Security Plan...

  17. 2014 Headquarters Facilities Master Security Plan - Chapter 3...

    Office of Environmental Management (EM)

    3, Personnel Security 2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 3,...

  18. Secure Learning and Learning for Security: Research in the Intersection

    E-Print Network [OSTI]

    Rubinstein, Benjamin

    2010-01-01T23:59:59.000Z

    and Alissa Dill. 2008 CISO priorities: The right objectivesbased reactive defense. The CISO risk management problem isSecurity Officer (CISO) to manage the enterprises

  19. Information Systems 32 (2007) 11661183 Security Attack Testing (SAT)--testing the security of

    E-Print Network [OSTI]

    2007-01-01T23:59:59.000Z

    Information Systems 32 (2007) 11661183 Security Attack Testing (SAT)--testing the security have been devoted into integrating security issues into information systems development practices reserved. Keywords: Information systems development methodology; Integrating security and software

  20. SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY

    E-Print Network [OSTI]

    SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National and to protect their systems and information from security threats and risks. There have been many past efforts