National Library of Energy BETA

Sample records for adaptive security appliances

  1. T-531: The WebVPN implementation on Cisco Adaptive Security Appliances...

    Energy Savers [EERE]

    implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.2(3) PLATFORM: Listed Vunerable Platform Details ABSTRACT: The WebVPN...

  2. T-531: The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500

    Broader source: Energy.gov [DOE]

    The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.2(3) permits the viewing of CIFS shares even when CIFS file browsing has been disabled, which allows remote authenticated users to bypass intended access restrictions via CIFS requests, aka Bug ID CSCsz80777.

  3. U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Laclede GasEfficiency| DepartmentSecurity |Know |1, inUraniumDepartment of

  4. Blue Coat Systems, Inc. Secure Web Gateway Virtual Appliance-V100

    E-Print Network [OSTI]

    Blue Coat Systems, Inc. Secure Web Gateway Virtual Appliance-V100 Software Version: 6.5.2.8 FIPS@corsec.com http://www.bluecoat.com http://www.corsec.com #12;Secure Web Gateway Virtual Appliance-V100 Security Policy, Version 0.5 July 25, 2014 Blue Coat Secure Web Gateway Virtual Appliance-V100 Page 2 of 33 © 2014

  5. Adaptively Secure Coin-Flipping, Revisited Shafi Goldwasser1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    in this setting. We then shed light on the connection between adaptive and strongly adaptive adversariesAdaptively Secure Coin-Flipping, Revisited Shafi Goldwasser1 , Yael Tauman Kalai2 , and Sunoo Park3' bits, can tolerate t(n) = O( n) even in the presence of adaptive corruptions, and they conjectured

  6. Energy Sector Security Appliances in a System for Intelligent Learning Network Configuration Management and Monitoring (Essence)

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:FinancingPetroleum12, 2015 Infographic courtesyEducationNevada | DepartmenttoPublicSector Security

  7. APPLIANCE STANDARDS

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    APPLIANCE STANDARDS How they interact with energy efficiency programs Alas, those mercurial baselines. Since 2005, 45 mandatory Department of Energy (DOE) efficiency standards have...

  8. Securing Distributed Adaptation Jun Li Mark Yarvis Peter Reiher

    E-Print Network [OSTI]

    Li, Jun

    [22] allow adaptation to occur at nodes within the network. Unfortunately, this added flexibility Angeles AbstractOpen architecture networks provide applications with fine-grained control over network in conventional networks. One particular security requirement is the ability of applications to protect

  9. Catalog of DC Appliances and Power Systems

    E-Print Network [OSTI]

    Garbesi, Karina

    2012-01-01

    Ovens Electric Heat Pumps Geothermal Heat Pumps Solar WaterOvens Appliance DC-internal product power (Watts) Personal Computers and Related Equipment Rechargeable Electronics Refrigerators Room Air Conditioners Security Systems Solar

  10. Securing Distributed Adaptation + Jun Li Mark Yarvis Peter Reiher

    E-Print Network [OSTI]

    California at Los Angeles, University of

    Angeles Abstract + ľ ľľ ľOpen architecture networks provide applications with fine­grained control over network elements. With this control comes the risk of misuse and new challenges to security beyond those present in conventional networks. One particular security requirement is the ability of applications

  11. Appliance Efficiency Regulations

    Broader source: Energy.gov [DOE]

    Note: The federal government has imposed and updated appliance efficiency standards through several legislative acts,* and now has standards in place or under development for 30 classes of...

  12. Guide to Kitchen Appliances

    SciTech Connect (OSTI)

    2010-10-01

    This fact sheet tells you how to buy and maintain energy-efficient kitchen appliances, including refrigerators, freezers, and dishwashers, to save energy and money.

  13. Security challenges and opportunities in adaptive and reconfigurable hardware

    E-Print Network [OSTI]

    Costan, Victor Marius

    We present a novel approach to building hardware support for providing strong security guarantees for computations running in the cloud (shared hardware in massive data centers), while maintaining the high performance and ...

  14. Adaptive Flow Aggregation -A New Solution for Robust Flow Monitoring under Security Attacks

    E-Print Network [OSTI]

    Lui, John C.S.

    Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks Yan Hu.S. Lui Dept. of CSE Chinese University of Hong Kong Email: cslui@cse.cuhk.edu.hk Abstract-- Flow the resources (memory, export bandwidth or CPU) of the flow monitor. A standard solution is to do sampling (look

  15. Appliance Energy Calculator

    Broader source: Energy.gov [DOE]

    Our appliance and electronic energy use calculator allows you to estimate your annual energy use and cost to operate specific products. The wattage values provided are samples only; actual wattage...

  16. 52 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 28, NO. 1, FEBRUARY 2013 Adaptive Robust Optimization for the Security

    E-Print Network [OSTI]

    Bertsimas, Dimitris

    for the Security Constrained Unit Commitment Problem Dimitris Bertsimas, Member, IEEE, Eugene Litvinov, Senior Abstract--Unit commitment, one of the most critical tasks in electric power system operations, faces new a two-stage adaptive robust unit commitment model for the security constrained unit commitment problem

  17. U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass...

    Broader source: Energy.gov (indexed) [DOE]

    1027448 Bugtraq ID: 55250 EMC.com CVE-2012-2285 IMPACT ASSESSMENT: High Discussion EMC Cloud Tiering Appliance (CTA) is prone to a security-bypass vulnerability that may allow...

  18. Appliances, Lighting, Electronics, and Miscellaneous Equipment Electricity Use in New Homes

    E-Print Network [OSTI]

    Brown, Richard E.; Rittelman, William; Parker, Danny; Homan, Gregory

    2007-01-01

    62440 Appliances, Lighting, Electronics, and Miscellaneousof California. Appliances, Lighting, Electronics, anduses (appliances, lighting, electronics, and miscellaneous

  19. Tips: Smart Appliances | Department of Energy

    Office of Environmental Management (EM)

    manufacturers are now offering "smart" appliances -- appliances that can be connected to smart electric meters or home energy management systems to help you shift your electricity...

  20. Tips: Smart Appliances | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Some manufacturers are now offering "smart" appliances -- appliances that can be connected to smart electric meters or home energy management systems to help you shift your...

  1. Research & Development Roadmap: Next-Generation Appliances |...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Research & Development Roadmap: Next-Generation Appliances Research & Development Roadmap: Next-Generation Appliances The Research and Development (R&D) Roadmap for Next-Generation...

  2. Adaptive load control of microgrids with non-dispatchable generation

    E-Print Network [OSTI]

    Brokish, Kevin Martin

    2009-01-01

    Intelligent appliances have a great potential to provide energy storage and load shedding for power grids. Microgrids are simulated with high levels of wind energy penetration. Frequency-adaptive intelligent appliances are ...

  3. Security

    Broader source: Energy.gov [DOE]

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  4. Remote repair appliance

    DOE Patents [OSTI]

    Heumann, Frederick K. (Ballston Spa, NY); Wilkinson, Jay C. (Ballston Spa, NY); Wooding, David R. (Saratoga Springs, NY)

    1997-01-01

    A remote appliance for supporting a tool for performing work at a worksite on a substantially circular bore of a workpiece and for providing video signals of the worksite to a remote monitor comprising: a baseplate having an inner face and an outer face; a plurality of rollers, wherein each roller is rotatably and adjustably attached to the inner face of the baseplate and positioned to roll against the bore of the workpiece when the baseplate is positioned against the mouth of the bore such that the appliance may be rotated about the bore in a plane substantially parallel to the baseplate; a tool holding means for supporting the tool, the tool holding means being adjustably attached to the outer face of the baseplate such that the working end of the tool is positioned on the inner face side of the baseplate; a camera for providing video signals of the worksite to the remote monitor; and a camera holding means for supporting the camera on the inner face side of the baseplate, the camera holding means being adjustably attached to the outer face of the baseplate. In a preferred embodiment, roller guards are provided to protect the rollers from debris and a bore guard is provided to protect the bore from wear by the rollers and damage from debris.

  5. Energy Star Appliances 1 Texas A&M AgriLife Extension Service ENERGY STAR Appliances

    E-Print Network [OSTI]

    Energy Star® Appliances 1 Texas A&M AgriLife Extension Service ENERGY STAR® Appliances ENERGY STAR®-labeled appliances save you money by using less electricity and water than other appliances. Better appliance energy efficiency comes from quality materials and technologically advanced materials. Although energy efficient

  6. Incorporating Experience Curves in Appliance Standards Analysis

    E-Print Network [OSTI]

    Desroches, Louis-Benoit

    2012-01-01

    appliance price projections than the assumption-basedrepresentative projection of future prices than the constant

  7. Proceedings of Student-Faculty Research Day, CSIS, Pace University, May 3rd A Frame Problem Approach for Adaptive Cyber Security Design

    E-Print Network [OSTI]

    Tappert, Charles

    Problem Approach for Adaptive Cyber Security Design R. Shaikh, T. Bryla, and S. Ahmed Pace University in the context of network security counteraction against cyber-attacks. A simple simulator is designed extensions of this work. Key words: Frame Problem; Cyber-security Introduction With the growing popularity

  8. Appliances & Electronics | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    href"node587248">Check out these tips -- which include using a power strip and switching to ENERGY STAR appliances -- that every homeowner should try. Looking for ways to...

  9. GE Appliances: Order (2010-CE-2113)

    Broader source: Energy.gov [DOE]

    DOE issued an Order after entering into a Compromise Agreement with General Electric Appliances after finding GE Appliances had failed to certify that certain models of dehumidifiers comply with the applicable energy conservation standards.

  10. Tips: Shopping for Appliances | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Appliances July 16, 2014 - 7:33pm Addthis What's the real cost? Every appliance has two price tags -- the purchase price and the operating cost. Consider both when buying a new...

  11. Midea Washing Appliance: Order (2011-CE-1903)

    Broader source: Energy.gov [DOE]

    DOE ordered Midea Washing Appliance Mfg. Co., Ltd. to pay a $6,000 civil penalty after finding Midea Washing Appliance had failed to certify that certain models of dishwashers comply with the applicable energy conservation standards.

  12. Appliance Standards and Rulemaking Federal Advisory Committee...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Issuance Appliance Standards and Rulemaking Federal Advisory Committee (ASRAC) - Central Air Conditioner Regional Standards Enforcement Working Group; Notice of Open...

  13. Modeling of GE Appliances: Final Presentation

    SciTech Connect (OSTI)

    Fuller, Jason C.; Vyakaranam, Bharat; Leistritz, Sean M.; Parker, Graham B.

    2013-01-31

    This report is the final in a series of three reports funded by U.S. Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) in collaboration with GE Appliances’ through a Cooperative Research and Development Agreement (CRADA) to describe the potential of GE Appliances’ DR-enabled appliances to provide benefits to the utility grid.

  14. Appliances, Lighting, Electronics, and Miscellaneous Equipment Electricity Use in New Homes

    E-Print Network [OSTI]

    Brown, Richard E.; Rittelman, William; Parker, Danny; Homan, Gregory

    2007-01-01

    62440 Appliances, Lighting, Electronics, and MiscellaneousAppliances, Lighting, Electronics, and Miscellaneoususes (appliances, lighting, electronics, and miscellaneous

  15. Appliance remanufacturing and life cycle energy and economic savings

    E-Print Network [OSTI]

    Boustani, Avid

    In this paper we evaluate the energy and economic consequences of appliance remanufacturing relative to purchasing new. The appliances presented in this report constitute major residential appliances: refrigerator, dishwasher, ...

  16. GE Appliances: Proposed Penalty (2010-CE-2113)

    Broader source: Energy.gov [DOE]

    DOE alleged in a Notice of Proposed Civil Penalty that General Electric Appliances failed to certify a variety of dehumidifiers as compliant with the applicable energy conservation standards.

  17. Earthjustice, Appliance Standards Awareness Project, Natural...

    Energy Savers [EERE]

    Council - Comments in response to DOE solicitation of views on the implementation of test procedure waivers for large capacity clothes washers Earthjustice, Appliance Standards...

  18. Appliance Rebates: Frequently Asked Questions | Department of...

    Energy Savers [EERE]

    Spikes Former Communicator at DOE's National Renewable Energy Laboratory The appliance rebate program has been wildly successful in many states. So successful, in fact, that people...

  19. Smart Domestic Appliances Provide Flexibility for Sustainable...

    Open Energy Info (EERE)

    benefits and difficulties associated with smart grid appliances. The presenter discusses demand response and load management and how users of smart grid can benefit renewable...

  20. Appliances and Electronics | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    electricity. | Photo courtesy of Dennis SchroederNREL. Incentives and Financing for Energy Efficient Homes This chart shows how much energy a typical appliance uses per year...

  1. Retrospective Evaluation of Appliance Price Trends

    E-Print Network [OSTI]

    Dale, Larry

    2010-01-01

    the higher the product cost and retail price. Table 3.change and appliance price Room air conditioners Small (price data to clarify price

  2. ASKO Appliances: Compliance Determination (2010-SE-0601)

    Broader source: Energy.gov [DOE]

    DOE tested four units dishwasher manufactured by ASKO Appliances, Inc. Applying statistical analysis, DOE found that the dishwasher meets the federal energy standards for maximum energy use.

  3. Energy Efficient Appliance Sales Soar in North Carolina

    Broader source: Energy.gov [DOE]

    It took just eight days for retailers to rack up $64 million in sales of appliances through the state's Appliance Rebate Program.

  4. HVAC, Water Heating, and Appliances Overview - 2015 BTO Peer...

    Office of Environmental Management (EM)

    Heating, and Appliances Overview - 2015 BTO Peer Review HVAC, Water Heating, and Appliances Overview - 2015 BTO Peer Review Presenter: Tony Bouza, U.S. Department of Energy View...

  5. State Energy-Efficient Appliance Rebate Program: Volume 1 - Program...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    State Energy-Efficient Appliance Rebate Program: Volume 1 - Program Design Lessons Learned State Energy-Efficient Appliance Rebate Program: Volume 1 - Program Design Lessons...

  6. State Energy Efficient Appliance Rebate Program (SEEARP) reports...

    Open Energy Info (EERE)

    State Energy Efficient Appliance Rebate Program (SEEARP) reports database The State Energy Efficient Appliance Rebate Program (SEEARP) reports database includes rebate reports...

  7. State Energy-Efficient Appliance Rebate Program: Volume 2 - Program...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    State Energy-Efficient Appliance Rebate Program: Volume 2 - Program Results State Energy-Efficient Appliance Rebate Program: Volume 2 - Program Results View the report State...

  8. Fort Collins Utilities - Residential and Small Commercial Appliance...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Residential and Small Commercial Appliance Rebate Program Fort Collins Utilities - Residential and Small Commercial Appliance Rebate Program < Back Eligibility Residential Savings...

  9. EIA Energy Efficiency-Appliance Standards and Labeling Links

    U.S. Energy Information Administration (EIA) Indexed Site

    and enforcement requirements for residential appliances; final rule Energy Efficiency and Renewable Energy - Appliances & Commercial Equipment Standards, the program develops test...

  10. Four-County EMC- Residential Energy Efficiency Appliance Rebate Program

    Broader source: Energy.gov [DOE]

    Four-County EMC offers its customers $50 rebates for purchasing certain Energy Star appliances. Eligible appliances include refrigerators, dishwashers, clothes washers and freezers. The rebates are...

  11. AWARDS: An Adaptive Write Strategy for Secure Local Disk Systems Mais Nijim, Xiao Qin

    E-Print Network [OSTI]

    Qin, Xiao

    importance for modern storage systems, it is imperative to protect stored data from being tampered or disclosed. Although an increas- ing number of secure storage systems have been devel- oped, there is no way.0% and 358.9% (with averages of 199.5% and 213.4%). 1 Introduction In the past decade, storage systems have

  12. Retrospective Evaluation of Appliance Price Trends

    SciTech Connect (OSTI)

    Dale, Larry; Antinori, Camille; McNeil, Michael; McMahon, James E.; Fujita, K. Sydny

    2008-07-20

    Real prices of major appliances (refrigerators, dishwashers, heating and cooling equipment) have been falling since the late 1970s despite increases in appliance efficiency and other quality variables. This paper demonstrates that historic increases in efficiency over time, including those resulting from minimum efficiency standards, incur smaller price increases than were expected by Department of Energy (DOE) forecasts made in conjunction with standards. This effect can be explained by technological innovation, which lowers the cost of efficiency, and by market changes contributing to lower markups and economies of scale in production of higher efficiency units. We reach four principal conclusions about appliance trends and retail price setting: 1. For the past several decades, the retail price of appliances has been steadily falling while efficiency has been increasing. 2. Past retail price predictions made by DOE analyses of efficiency standards, assuming constant prices over time, have tended to overestimate retail prices. 3. The average incremental price to increase appliance efficiency has declined over time. DOE technical support documents have typically overestimated this incremental price and retail prices. 4. Changes in retail markups and economies of scale in production of more efficient appliances may have contributed to declines in prices of efficient appliances.

  13. Impact of Natural Gas Appliances on Pollutant Levels in California Homes

    E-Print Network [OSTI]

    Mullen, Nasim A.

    2014-01-01

    35): 5661-67. Impact of Natural Gas Appliances on PollutantO-. ! Natural Gas Appliances on PollutantA! =? >7! =::! Impact of Natural Gas Appliances on Pollutant

  14. Pollutant Emission Factors from Residential Natural Gas Appliances: A Literature Review

    E-Print Network [OSTI]

    Traynor, G.W.

    2011-01-01

    distributions from residential natural gas appliances. CH 4ng/J) distribution from residential natural gas appliances.from Residential Natural Gas Appliances: A Literature Review

  15. West Virginia Consumers Have Appliance Rebate 'Trifecta'

    Broader source: Energy.gov [DOE]

    West Virginians didn’t waste any time in taking advantage of the Energy Efficient Appliance Rebate Program. Only three months in, and almost half of the available $1.7 million is already spoken for.

  16. Incorporating Experience Curves in Appliance Standards Analysis

    E-Print Network [OSTI]

    Desroches, Louis-Benoit

    2012-01-01

    appliance price trends. Energy Policy 37, 597-605. Day, G.learning hypothesis. Energy Policy 37, 2525-2535. Fusfeld,curves for wind farms. Energy Policy 33, 133-150. Klaassen,

  17. Wyoming's Appliance Rebate Program Surges Ahead

    Broader source: Energy.gov [DOE]

    Wyoming’s appliance rebate program, which opened in April, continues through this fall. Residents of the Equality State can receive rebates on ENERGY STAR certified clothes washers, dishwashers, water heaters and gas furnaces ranging from $50 to $250.

  18. 2009 CALIFORNIA RESIDENTIAL APPLIANCE SATURATION STUDY

    E-Print Network [OSTI]

    data, household energy consumption data and weather information to calculate average annual information on appliances, equipment, and general consumption patterns. Data collection was completed in early 2010. The study yielded energy consumption estimates for 27 electric and 10 natural gas

  19. Equator Appliance: ENERGY STAR Referral (EZ 3720)

    Broader source: Energy.gov [DOE]

    DOE referred Equator Appliance clothes washer EZ 3720 to EPA, brand manager of the ENERGY STAR program, for appropriate action after DOE testing revealed that the model does not meet ENERGY STAR requirements.

  20. Tips: Kitchen Appliances | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Most of the energy used by a dishwasher is for water heating. The EnergyGuide label estimates how much power is needed per year to run the appliance and to heat the water...

  1. Catalog of DC Appliances and Power Systems

    E-Print Network [OSTI]

    Garbesi, Karina

    2012-01-01

    main conclusions about off-grid markets for DC appliances,and power systems. Mature Off-Grid Markets for DC Appliancesapplications include off-grid residential, telecom, remote

  2. State Appliance Standards (released in AEO2009)

    Reports and Publications (EIA)

    2009-01-01

    State appliance standards have existed for decades, starting with Californias enforcement of minimum efficiency requirements for refrigerators and several other products in 1979. In 1987, recognizing that different efficiency standards for the same products in different states could create problems for manufacturers, Congress enacted the National Appliance Energy Conservation Act (NAECA), which initially covered 12 products. The Energy Policy Act of 1992 (EPACT92), EPACT2005, and EISA2007 added additional residential and commercial products to the 12 products originally specified under NAECA.

  3. Non-intrusive appliance monitor apparatus

    DOE Patents [OSTI]

    Hart, George W. (Natick, MA); Kern, Jr., Edward C. (Lincoln, MA); Schweppe, Fred C. (Carlisle, MA)

    1989-08-15

    A non-intrusive monitor of energy consumption of residential appliances is described in which sensors, coupled to the power circuits entering a residence, supply analog voltage and current signals which are converted to digital format and processed to detect changes in certain residential load parameters, i.e., admittance. Cluster analysis techniques are employed to group change measurements into certain categories, and logic is applied to identify individual appliances and the energy consumed by each.

  4. Non-intrusive appliance monitor apparatus

    DOE Patents [OSTI]

    Hart, G.W.; Kern, E.C. Jr.; Schweppe, F.C.

    1989-08-15

    A non-intrusive monitor of energy consumption of residential appliances is described in which sensors, coupled to the power circuits entering a residence, supply analog voltage and current signals which are converted to digital format and processed to detect changes in certain residential load parameters, i.e., admittance. Cluster analysis techniques are employed to group change measurements into certain categories, and logic is applied to identify individual appliances and the energy consumed by each. 9 figs.

  5. Hardware Security for Device Authentication in the Smart Grid

    E-Print Network [OSTI]

    Murawski, Andrzej

    Hardware Security for Device Authentication in the Smart Grid Andrew J. Paverd and Andrew P. Martin. Secure communication between devices is a key aspect of smart grid security. In the future smart home environment, various smart devices, appliances and energy management systems will communicate with each other

  6. Security tasks are highly interdependent.

    E-Print Network [OSTI]

    Exchange of Information Develop security tools that: · Integrate information from different communication channels · Provide flexible reporting (reports adapted to the recipient) · Communicate security information Security practitioners perform many activities: · Information exchanged in different formats across

  7. Bio-Inspired Cyber Security for Smart Grid Deployments

    SciTech Connect (OSTI)

    McKinnon, Archibald D.; Thompson, Seth R.; Doroshchuk, Ruslan A.; Fink, Glenn A.; Fulp, Errin W.

    2013-05-01

    mart grid technologies are transforming the electric power grid into a grid with bi-directional flows of both power and information. Operating millions of new smart meters and smart appliances will significantly impact electric distribution systems resulting in greater efficiency. However, the scale of the grid and the new types of information transmitted will potentially introduce several security risks that cannot be addressed by traditional, centralized security techniques. We propose a new bio-inspired cyber security approach. Social insects, such as ants and bees, have developed complex-adaptive systems that emerge from the collective application of simple, light-weight behaviors. The Digital Ants framework is a bio-inspired framework that uses mobile light-weight agents. Sensors within the framework use digital pheromones to communicate with each other and to alert each other of possible cyber security issues. All communication and coordination is both localized and decentralized thereby allowing the framework to scale across the large numbers of devices that will exist in the smart grid. Furthermore, the sensors are light-weight and therefore suitable for implementation on devices with limited computational resources. This paper will provide a brief overview of the Digital Ants framework and then present results from test bed-based demonstrations that show that Digital Ants can identify a cyber attack scenario against smart meter deployments.

  8. Tips: Shopping for Appliances | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuels Data CenterFinancialInvestingRenewableTeach and Learn5Shopping for Appliances

  9. Hydrophilic structures for condensation management in refrigerator appliances

    DOE Patents [OSTI]

    Kuehl, Steven John; Vonderhaar, John J; Wu, Guolian; Wu, Mianxue

    2014-10-21

    A refrigerator appliance that includes a freezer compartment having a freezer compartment door, and a refrigeration compartment having at least one refrigeration compartment door. The appliance further includes a mullion with an exterior surface. The mullion divides the compartments and the exterior surface directs condensation toward a transfer point. The appliance may also include a cabinet that houses the compartments and has two sides, each with an exterior surface. Further, at least one exterior surface directs condensation toward a transfer point.

  10. Impact of Natural Gas Appliances on Pollutant Levels in California Homes

    E-Print Network [OSTI]

    Mullen, Nasim A.

    2014-01-01

    35): 5661-67. Impact of Natural Gas Appliances on Pollutant6'G%! S'4-. ! Impact of Natural Gas Appliances on PollutantNot applicable Impact of Natural Gas Appliances on Pollutant

  11. Information Security Governance: When Compliance Becomes more Important than Security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Information Security Governance: When Compliance Becomes more Important than Security Terence Tan1 information security must adapt to changing conditions by extending security governance to middle management for implementing information security are more interested in complying with organizational standards and policies

  12. ISSUANCE 2015-07-14: Appliance Standards and Rulemaking Federal...

    Broader source: Energy.gov (indexed) [DOE]

    Meetings and Webinars. asracsummerwebinars.pdf More Documents & Publications ISSUANCE 2015-05-26:Appliance Standards and Rulemaking Federal Advisory Committee: Notice of Open...

  13. Low-cost Appliance State Sensing for Energy Disaggregation

    E-Print Network [OSTI]

    Wu, Tianji

    2012-01-01

    the power consumption of a power cycle of appliances [KJ12].the expected length of a power cycle. Although current NILM

  14. ISSUANCE 2015-06-30: Appliance Standards and Rulemaking Federal...

    Energy Savers [EERE]

    Advisory Committee: Notice of Intent to Establish the Central Air Conditioners and Heat Pumps Working Group ISSUANCE 2015-06-30: Appliance Standards and Rulemaking Federal Advisory...

  15. Buying an Appliance this Holiday Season? ENERGY STAR Products...

    Broader source: Energy.gov (indexed) [DOE]

    When shopping for appliances or electronics for the holidays, look for the ENERGY STAR and EnergyGuide labels. | Photo by Dennis Schroeder, NREL 22090. When shopping for...

  16. Appliance Standards Update and Review of Certification, Compliance...

    Energy Savers [EERE]

    of Certification, Compliance and Enforcement Powerpoint Presentation for ASHRAE Conference, January 31, 2011 Appliance Standards Update and Review of Certification, Compliance...

  17. Appliance Standards Program Schedule - CCE Overview and Update...

    Energy Savers [EERE]

    October 26, 2011 This document is Appliance Standards Program Schedule & CCE Overview and Update presentation, dated 10262011, presented to Energy-Efficiency Advocacy Groups...

  18. Robot in Society: Friend or Appliance? Cynthia Breazeal #

    E-Print Network [OSTI]

    Robot in Society: Friend or Appliance? Cynthia Breazeal # Massachusetts Institute of Technology Artificial Intelligence Laboratory 545 Technology Square, Room 938 Cambridge, MA 02139 USA email: cynthia

  19. ISSUANCE 2015-05-26:Appliance Standards and Rulemaking Federal...

    Office of Environmental Management (EM)

    and Rulemaking Federal Advisory Committee: Notice of Open Meeting and Webinar ISSUANCE 2015-05-26:Appliance Standards and Rulemaking Federal Advisory Committee: Notice of Open...

  20. Estimating Appliance and Home Electronic Energy Use | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    how much electricity your appliances and home electronics use: The Energy Guide Label, which shows the estimated yearly operating cost and estimated yearly electricity use...

  1. Webinar: Appliance Standards and Rulemaking Federal Advisory Committee

    Broader source: Energy.gov [DOE]

    DOE is conducting a public meeting and webinar regarding the Appliance Standards and Rulemaking Federal Advisory Committee (ASRAC). For more information, please visit the ASRAC page. 

  2. Saving Energy and Money with Appliance and Equipment Standards...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and Equipment Standards in the United States Overview Appliance and equipment efficien- cy standards have served as one of the nation's most effective policies for...

  3. DOE Announces Tougher Enforcement of Appliance Standards Reporting...

    Energy Savers [EERE]

    certification reports and compliance statements as part of enhanced enforcement of DOE's energy efficiency appliance standards program. Under federal law, manufacturers of some...

  4. Measure Guideline: Combustion Safety for Natural Draft Appliances Through Appliance Zone Isolation

    SciTech Connect (OSTI)

    Fitzgerald, J.; Bohac, D.

    2014-04-01

    This measure guideline covers how to assess and carry out the isolation of natural draft combustion appliances from the conditioned space of low-rise residential buildings. It deals with combustion appliances located either within the living space in enclosed closets or side rooms or outside the living space in an adjacent area like an attic or garage. This subset of houses does not require comprehensive combustion safety tests and simplified prescriptive procedures can be used to address safety concerns. This allows residential energy retrofit contractors inexperienced in advanced combustion safety testing to effectively address combustion safety issues and allow energy retrofits including tightening and changes to distribution and ventilation systems to proceed.

  5. Kitchen Appliance Upgrades Improve Water Efficiency at U.S. Department...

    Energy Savers [EERE]

    Kitchen Appliance Upgrades Improve Water Efficiency at U.S. Department of Defense Exchange Facilities Kitchen Appliance Upgrades Improve Water Efficiency at U.S. Department of...

  6. Trends in the cost of efficiency for appliances and consumer electronics

    E-Print Network [OSTI]

    Desroches, Louis-Benoit

    2013-01-01

    appliances and consumer electronics Louis-Benoit Desroches,appliances and consumer electronics have decreased in realappliances and consumer electronics are likely to diminish

  7. 5th Semi-Annual Report to Congress on Appliance Energy-Efficiency...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    on Appliance Energy Efficiency Rulemakings - Implementation Report: Energy Conservation Standards Activities 3rd Semi-Annual Report to Congress on Appliance Energy-Efficiency...

  8. Data Availability in Appliance Standards and Labeling Program Development and Evaluation

    E-Print Network [OSTI]

    Romankiewicz, John

    2014-01-01

    by design option) Data Availability and Use InternationallyData Availability in Appliance Standards and Labelingemployer. Data Availability in Appliance Standards and

  9. Introducing a digital library reading appliance into a reading group

    E-Print Network [OSTI]

    Marshall, Cathy

    Introducing a digital library reading appliance into a reading group Catherine C. Marshall, Morgan will we read digital library materials? This paper describes the reading practices of an on-going reading group, and how these practices changed when we introduced XLibris, a digital library reading appliance

  10. Development of Machine Vision Technology for Railcar Safety Appliance Inspection

    E-Print Network [OSTI]

    Todorovic, Sinisa

    *Computer Vision and Robotics Laboratory - Department of Electrical and Computer Engineering University American trains depart a terminal or rail yard, many aspects of the cars and locomotives undergo inspection car-specific appliances. Safety appliances have been required on U.S. railcars since 1893 when

  11. Incorporating Experience Curves in Appliance Standards Analysis

    SciTech Connect (OSTI)

    Garbesi, Karina; Chan, Peter; Greenblatt, Jeffery; Kantner, Colleen; Lekov, Alex; Meyers, Stephen; Rosenquist, Gregory; Buskirk, Robert Van; Yang, Hung-Chia; Desroches, Louis-Benoit

    2011-10-31

    The technical analyses in support of U.S. energy conservation standards for residential appliances and commercial equipment have typically assumed that manufacturing costs and retail prices remain constant during the projected 30-year analysis period. There is, however, considerable evidence that this assumption does not reflect real market prices. Costs and prices generally fall in relation to cumulative production, a phenomenon known as experience and modeled by a fairly robust empirical experience curve. Using price data from the Bureau of Labor Statistics, and shipment data obtained as part of the standards analysis process, we present U.S. experience curves for room air conditioners, clothes dryers, central air conditioners, furnaces, and refrigerators and freezers. These allow us to develop more representative appliance price projections than the assumption-based approach of constant prices. These experience curves were incorporated into recent energy conservation standards for these products. The impact on the national modeling can be significant, often increasing the net present value of potential standard levels in the analysis. In some cases a previously cost-negative potential standard level demonstrates a benefit when incorporating experience. These results imply that past energy conservation standards analyses may have undervalued the economic benefits of potential standard levels.

  12. Randomized Load Control: A Simple Distributed Approach for Scheduling Smart Appliances

    E-Print Network [OSTI]

    Thiébaux, Sylvie

    program- ming their washing machine, dryer, dishwasher, electric ve- hicle, or other appliance in this way

  13. Research & Development Roadmap for Next-Generation Appliances

    SciTech Connect (OSTI)

    Goetzler, William; Sutherland, Timothy; Foley, Kevin

    2012-03-01

    Appliances present an attractive opportunity for near-term energy savings in existing building, because they are less expensive and replaced more regularly than heating, ventilation, and air-conditioning (HVAC) systems or building envelope components. This roadmap targets high-priority research and development (R&D), demonstration and commercialization activities that could significantly reduce residential appliance energy consumption. The main objective of the roadmap is to seek activities that accelerate the commercialization of high-efficiency appliance technologies while maintaining the competitiveness of American industry. The roadmap identified and evaluated potential technical innovations, defined research needs, created preliminary research and development roadmaps, and obtained stakeholder feedback on the proposed initiatives.

  14. SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 2012; 00:111

    E-Print Network [OSTI]

    Leung, Victor C.M.

    @ece.ubc.ca Received . . . 1. INTRODUCTION Improvements in power generation, transmission, distribu- tion) management scheme aimed at securing the group communications, for instance, from the utility to appliances and consumption as well as service delivery, operation and market management of the grid are the main bene- fits

  15. Catalog of DC Appliances and Power Systems

    E-Print Network [OSTI]

    Garbesi, Karina

    2012-01-01

    Electric Water Heaters Solar Water Heaters Color TelevisionsSecurity Systems Solar Water Heaters Spas See standby/lowGeothermal Heat Pumps Solar Water Heaters Electric Heat

  16. Catalog of DC Appliances and Power Systems

    E-Print Network [OSTI]

    Garbesi, Karina

    2012-01-01

    Other Electric Water Heaters Solar Water Heaters ColorSecurity Systems Solar Water Heaters Spas See standby/lowGeothermal Heat Pumps Solar Water Heaters Electric Heat

  17. Estimating Appliance and Home Electronic Energy Use | Department...

    Broader source: Energy.gov (indexed) [DOE]

    Estimate the energy consumption and cost to operate an appliance when making a purchase. Investing in an energy-efficient product may save you money in the long run. | Photo...

  18. Cowlitz County PUD- Residential Energy Efficient Appliance Rebate Program

    Broader source: Energy.gov [DOE]

    Cowlitz County PUD offers the EnergySHARE Plus appliance rebate program to its residential customers. Rebates are offered for Energy Star clothes washers, refrigerators and freezers (including the...

  19. Taunton Municipal Lighting Plant- Residential Energy Star Appliance Rebate Program

    Broader source: Energy.gov [DOE]

    Customers of Taunton Municipal Lighting Plant (TMLP) are eligible for rebates on energy efficient appliances for the home. Clothes washers, dishwashers, refrigerators and room AC units are eligible...

  20. Super Cool Appliance Design Wins Student Competition | Department...

    Energy Savers [EERE]

    facts? Max Tech and Beyond challenged university teams to create the next generation of ultra-low energy use appliances by going beyond the current "max tech." A team of...

  1. ASKO Appliances: Proposed Penalty (2012-CE-19/2004)

    Broader source: Energy.gov [DOE]

    DOE alleged in a Notice of Proposed Civil Penalty that ASKO Appliances, Inc. failed to certify residential clothes washers and dishwashers as compliant with the applicable energy and water conservation standards.

  2. ASKO Appliances: Order (2012-CE-19/2004)

    Broader source: Energy.gov [DOE]

    DOE ordered ASKO Appliances, Inc. to pay a $36,500 civil penalty after finding ASKO had failed to certify that certain models of residential dishwashers and clothes washers comply with the applicable energy and water conservation standards.

  3. Detailed Modeling and Response of Demand Response Enabled Appliances

    SciTech Connect (OSTI)

    Vyakaranam, Bharat; Fuller, Jason C.

    2014-04-14

    Proper modeling of end use loads is very important in order to predict their behavior, and how they interact with the power system, including voltage and temperature dependencies, power system and load control functions, and the complex interactions that occur between devices in such an interconnected system. This paper develops multi-state time variant residential appliance models with demand response enabled capabilities in the GridLAB-DTM simulation environment. These models represent not only the baseline instantaneous power demand and energy consumption, but the control systems developed by GE Appliances to enable response to demand response signals and the change in behavior of the appliance in response to the signal. These DR enabled appliances are simulated to estimate their capability to reduce peak demand and energy consumption.

  4. Midea Washing Appliance: Proposed Penalty (2011-CE-1903)

    Broader source: Energy.gov [DOE]

    DOE alleged in a Notice of Proposed Civil Penalty that Midea Washing Appliances Mfg. Co., Ltd. failed to certify a variety of dishwashers as compliant with the applicable water and energy conservation standards.

  5. Buying an Appliance this Holiday Season? ENERGY STAR Products...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Efficiency and Renewable Energy How can I participate? Look for the ENERGY STAR label to find energy-efficient appliances. It's the holiday season, which is a perfect time...

  6. Energy-Efficient Home Appliances Can Save You Money | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Efficiency and Renewable Energy How can I participate? Look for the EnergyGuide label to find out the cost of operating an appliance over the long term, and shop for ENERGY...

  7. Managing Supply Chain Key for Hawaii Appliance Rebate Program

    Broader source: Energy.gov [DOE]

    Hawaii's appliance rebate program delivered 4,300 rebates to Hawaiians in just three days. And on just the first day of program, almost 4,000 ENERGY STAR qualified refrigerators were sold.

  8. Microwave vs. Electric Kettle: Which Appliance Is in Hot Water...

    Broader source: Energy.gov (indexed) [DOE]

    which should heat your water this winter. No matter whether your hot drink of choice is tea, coffee, or cocoa, one of these appliances is more efficient than the other. But which...

  9. Modeling diffusion of electrical appliances in the residential sector

    SciTech Connect (OSTI)

    McNeil, Michael A.; Letschert, Virginie E.

    2009-11-22

    This paper presents a methodology for modeling residential appliance uptake as a function of root macroeconomic drivers. The analysis concentrates on four major energy end uses in the residential sector: refrigerators, washing machines, televisions and air conditioners. The model employs linear regression analysis to parameterize appliance ownership in terms of household income, urbanization and electrification rates according to a standard binary choice (logistic) function. The underlying household appliance ownership data are gathered from a variety of sources including energy consumption and more general standard of living surveys. These data span a wide range of countries, including many developing countries for which appliance ownership is currently low, but likely to grow significantly over the next decades as a result of economic development. The result is a 'global' parameterization of appliance ownership rates as a function of widely available macroeconomic variables for the four appliances studied, which provides a reliable basis for interpolation where data are not available, and forecasting of ownership rates on a global scale. The main value of this method is to form the foundation of bottom-up energy demand forecasts, project energy-related greenhouse gas emissions, and allow for the construction of detailed emissions mitigation scenarios.

  10. Electrical appliance energy consumption control methods and electrical energy consumption systems

    DOE Patents [OSTI]

    Donnelly, Matthew K. (Kennewick, WA); Chassin, David P. (Pasco, WA); Dagle, Jeffery E. (Richland, WA); Kintner-Meyer, Michael (Richland, WA); Winiarski, David W. (Kennewick, WA); Pratt, Robert G. (Kennewick, WA); Boberly-Bartis, Anne Marie (Alexandria, VA)

    2008-09-02

    Electrical appliance energy consumption control methods and electrical energy consumption systems are described. In one aspect, an electrical appliance energy consumption control method includes providing an electrical appliance coupled with a power distribution system, receiving electrical energy within the appliance from the power distribution system, consuming the received electrical energy using a plurality of loads of the appliance, monitoring electrical energy of the power distribution system, and adjusting an amount of consumption of the received electrical energy via one of the loads of the appliance from an initial level of consumption to an other level of consumption different than the initial level of consumption responsive to the monitoring.

  11. Electrical appliance energy consumption control methods and electrical energy consumption systems

    DOE Patents [OSTI]

    Donnelly, Matthew K. (Kennewick, WA); Chassin, David P. (Pasco, WA); Dagle, Jeffery E. (Richland, WA); Kintner-Meyer, Michael (Richland, WA); Winiarski, David W. (Kennewick, WA); Pratt, Robert G. (Kennewick, WA); Boberly-Bartis, Anne Marie (Alexandria, VA)

    2006-03-07

    Electrical appliance energy consumption control methods and electrical energy consumption systems are described. In one aspect, an electrical appliance energy consumption control method includes providing an electrical appliance coupled with a power distribution system, receiving electrical energy within the appliance from the power distribution system, consuming the received electrical energy using a plurality of loads of the appliance, monitoring electrical energy of the power distribution system, and adjusting an amount of consumption of the received electrical energy via one of the loads of the appliance from an initial level of consumption to an other level of consumption different than the initial level of consumption responsive to the monitoring.

  12. Data port security lock

    DOE Patents [OSTI]

    Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

    2008-06-24

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  13. Abstract-In this paper we evaluate the energy and economic consequences of appliance remanufacturing relative to purchasing

    E-Print Network [OSTI]

    Gutowski, Timothy

    appliances: refrigerator, dishwasher, and clothes washer. The results show that, despite savings achieved presented in this report constitute major residential appliances: refrigerator, dishwasher, and clothes

  14. An Analysis of the Price Elasticity of Demand for Household Appliances

    E-Print Network [OSTI]

    Dale, Larry

    2008-01-01

    and Appliance Price………………………………6 LIST OF TABLES Table 1.1estimates in this table. 7 Average brand price elasticityTable 2.2 Appliance Refrigerators Clothes Washers Dishwashers Economic Variables Price

  15. Realized and Projected Impacts of U.S. Energy Efficiency Standards for Residential and Commercial Appliances

    E-Print Network [OSTI]

    Meyers, Stephen P.

    2008-01-01

    into the Energy Policy Act of 1992, and updates becameEnergy Efficiency Standards for Residential Appliances: 2004 Update,Energy Efficiency Standards for Residential and Commercial Appliances Included in This Study Product Year Effective for Original Standard* and Updates

  16. Trends in the cost of efficiency for appliances and consumer electronics

    E-Print Network [OSTI]

    Desroches, Louis-Benoit

    2013-01-01

    energy efficiency programs around the world focus on consumer goods such as appliances, HVAC (heating, ventilation, and air conditioning)

  17. Nonserial Dynamic Programming with Applications in Smart Home Appliances Scheduling Part II: Nonserial Dynamic Programming

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    Nonserial Dynamic Programming with Applications in Smart Home Appliances Scheduling ­ Part II) is presented. The problem in this paper generalizes the smart home appliances scheduling problem introduced the following smart home appliances scheduling problem described in the companion paper [3], as the later

  18. Nonserial Dynamic Programming with Applications in Smart Home Appliances Scheduling Part I: Precedence Graph Simplification

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    Nonserial Dynamic Programming with Applications in Smart Home Appliances Scheduling ­ Part I-- In this and a companion paper a dynamic pro- gramming (DP) approach to solve a smart home appliances scheduling problem to the smart home appliances scheduling problem considered in [1], [2]. The problem seeks to determine

  19. McAfee, Inc. McAfee Web Gateway WG5000 and WG5500 Appliances

    E-Print Network [OSTI]

    McAfee, Inc. McAfee Web Gateway WG5000 and WG5500 Appliances Hardware Models: 5000, 5500; Firmware Policy, Version 1.9 August 17, 2012 McAfee Web Gateway WG5000 and WG5500 Appliances Page 2 of 32 © 2012............................................................................................................................4 2 MCAFEE WEB GATEWAY WG5000 AND WG5500 APPLIANCES ................................5 2.1 OVERVIEW

  20. Less Watts, More Performance: An Intelligent Storage Engine for Data Appliances

    E-Print Network [OSTI]

    Teubner, Jens

    how Ibex reduces data movement, CPU usage, and overall energy consumption in database appliances.lastname}@inf.ethz.ch Jens Teubner DBIS Group, Dept. of Computer Science TU Dortmund University, Germany jens Appliance, Energy, FPGA, Ibex 1. INTRODUCTION Modern data appliances such as IBM's Netezza [6] and Oracle

  1. International comparison of product certification and verification methods for appliances

    SciTech Connect (OSTI)

    Zhou, Nan; Romankiewicz, John; Fridley, David; Zheng, Nina

    2012-06-01

    Enforcement of appliance standards and consumer trust in appliance labeling are important foundations of growing a more energy efficient economy. Product certification and verification increase compliance rates which in turn increase both energy savings and consumer trust. This paper will serve two purposes: 1) to review international practices for product certification and verification as they relate to the enforcement of standards and labeling programs in the U.S., E.U., Australia, Japan, Canada, and China; and 2) to make recommendations for China to implement improved certification processes related to their mandatory standards and labeling program such as to increase compliance rates and energy savings potential.

  2. International Comparison of Product Certification and Verification Methods for Appliances

    SciTech Connect (OSTI)

    Zhou, Nan; Romankiewicz, John; Fridley, David; Zheng, Nina

    2012-06-01

    Enforcement of appliance standards and consumer trust in appliance labeling are important foundations of growing a more energy efficient economy. Product certification and verification increase compliance rates which in turn increase both energy savings and consumer trust. This paper will serve two purposes: 1) to review international practices for product certification and verification as they relate to the enforcement of standards and labeling programs in the U.S., E.U., Australia, Japan, Canada, and China; and 2) to make recommendations for China to implement improved certification processes related to their mandatory standards and labeling program such as to increase compliance rates and energy savings potential.

  3. Development based climate change adaptation and mitigation-conceptual...

    Open Energy Info (EERE)

    Topics: Adaptation, Co-benefits assessment, - Energy Access, - Energy Security, - Health Resource Type: Case studiesexamples, Lessons learnedbest practices, Publications...

  4. ISSUANCE 2015-06-08: Solicitation of Nominations for Membership on the Appliance Standards and Rulemaking Federal Advisory Committee

    Broader source: Energy.gov [DOE]

    Solicitation of Nominations for Membership on the Appliance Standards and Rulemaking Federal Advisory Committee

  5. Rebound Effect in Energy Efficient Appliance Adopting Households 

    E-Print Network [OSTI]

    Glenn, Jacob Matthew

    2014-12-10

    This paper uses data from smart meter technology to estimate the occurrence of energy rebound, a “substitution” and “income’ effect where the price-per-use of an appliance falls relative to its energy efficiency. This causes households to have more...

  6. Smart Meter Deployment Optimization for Efficient Electrical Appliance State Monitoring

    E-Print Network [OSTI]

    Wang, Yongcai

    in such buildings, researches in the field of smart building and smart grid are exploring an efficient energy high costs to the smart meter deploy- ment, data collection and system maintenance. In practiceSmart Meter Deployment Optimization for Efficient Electrical Appliance State Monitoring Xiaohong

  7. Chinese Home Appliance Manufacturing: A Case Study of TCL Corporation

    E-Print Network [OSTI]

    Brock, David

    Chinese Home Appliance Manufacturing: A Case Study of TCL Corporation Ping Wang The Ohio State of the Chinese economy. In general, it is hard to correlate the contribution of effective logistics systems the year 2020. Complicating matters, Chinese statistics show that for 2000 nearly 14.6 billion passengers

  8. Combustion Safety for Appliances Using Indoor Air (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2014-05-01

    This measure guideline covers how to assess and carry out the combustion safety procedures for appliances and heating equipment that uses indoor air for combustion in low-rise residential buildings. Only appliances installed in the living space, or in an area freely communicating with the living space, vented alone or in tandem with another appliance are considered here. A separate measure guideline addresses combustion appliances located either within the living space in enclosed closets or side rooms or outside the living space in an adjacent area like an attic or garage that use outdoor air for combustion. This document is for inspectors, auditors, and technicians working in homes where energy upgrades are being conducted whether or not air infiltration control is included in the package of measures being applied. In the indoor combustion air case, guidelines summarized here are based on language provided in several of the codes to establish minimum requirements for the space using simplified prescriptive measures. In addition, building performance testing procedures are provided by testing agencies. The codes in combination with the test procedures offer comprehensive combustion safety coverage to address safety concerns, allowing inexperienced residential energy retrofit inspectors to effectively address combustion safety issues and allow energy retrofits to proceed.

  9. Cost and Performance Comparison Of Stationary Hydrogen Fueling Appliances

    E-Print Network [OSTI]

    Cost and Performance Comparison Of Stationary Hydrogen Fueling Appliances Duane B. Myers, Gregory D.directedtechnologies.com/ pubs/DTI_Task2_Report.html. 1 Proceedings of the 2002 U.S. DOE Hydrogen Program Review NREL/CP-610 vehicles (FCV's) and the cost of hydrogen produced by these HFA's. In previous studies we evaluated

  10. A System for Smart Home Control of Appliances based on Timer and Speech Interaction

    E-Print Network [OSTI]

    Haque, S M Anamul; Islam, Md Ashraful

    2010-01-01

    The main objective of this work is to design and construct a microcomputer based system: to control electric appliances such as light, fan, heater, washing machine, motor, TV, etc. The paper discusses two major approaches to control home appliances. The first involves controlling home appliances using timer option. The second approach is to control home appliances using voice command. Moreover, it is also possible to control appliances using Graphical User Interface. The parallel port is used to transfer data from computer to the particular device to be controlled. An interface box is designed to connect the high power loads to the parallel port. This system will play an important role for the elderly and physically disable people to control their home appliances in intuitive and flexible way. We have developed a system, which is able to control eight electric appliances properly in these three modes.

  11. Appliance Efficiency Standards and Price Discrimination

    SciTech Connect (OSTI)

    Spurlock, Cecily Anna

    2013-05-08

    I explore the effects of two simultaneous changes in minimum energy efficiency and ENERGY STAR standards for clothes washers. Adapting the Mussa and Rosen (1978) and Ronnen (1991) second-degree price discrimination model, I demonstrate that clothes washer prices and menus adjusted to the new standards in patterns consistent with a market in which firms had been price discriminating. In particular, I show evidence of discontinuous price drops at the time the standards were imposed, driven largely by mid-low efficiency segments of the market. The price discrimination model predicts this result. On the other hand, in a perfectly competition market, prices should increase for these market segments. Additionally, new models proliferated in the highest efficiency market segment following the standard changes. Finally, I show that firms appeared to use different adaptation strategies at the two instances of the standards changing.

  12. Delegating Network Security with More Information

    E-Print Network [OSTI]

    Naous, Jad

    Network security is gravitating towards more centralized control. Strong centralization places a heavy burden on the administrator who has to manage complex security policies and be able to adapt to users' requests. To be ...

  13. Modeling of GE Appliances: Cost Benefit Study of Smart Appliances in Wholesale Energy, Frequency Regulation, and Spinning Reserve Markets

    SciTech Connect (OSTI)

    Fuller, Jason C.; Parker, Graham B.

    2012-12-31

    This report is the second in a series of three reports describing the potential of GE’s DR-enabled appliances to provide benefits to the utility grid. The first report described the modeling methodology used to represent the GE appliances in the GridLAB-D simulation environment and the estimated potential for peak demand reduction at various deployment levels. The third report will explore the technical capability of aggregated group actions to positively impact grid stability, including frequency and voltage regulation and spinning reserves, and the impacts on distribution feeder voltage regulation, including mitigation of fluctuations caused by high penetration of photovoltaic distributed generation. In this report, a series of analytical methods were presented to estimate the potential cost benefit of smart appliances while utilizing demand response. Previous work estimated the potential technical benefit (i.e., peak reduction) of smart appliances, while this report focuses on the monetary value of that participation. The effects on wholesale energy cost and possible additional revenue available by participating in frequency regulation and spinning reserve markets were explored.

  14. Pacific Northwest GridWise™ Testbed Demonstration Projects; Part II. Grid Friendly™ Appliance Project

    SciTech Connect (OSTI)

    Hammerstrom, Donald J.; Brous, Jerry; Chassin, David P.; Horst, Gale R.; Kajfasz, Robert; Michie, Preston; Oliver, Terry V.; Carlon, Teresa A.; Eustis, Conrad; Jarvegren, Olof M.; Marek, W.; Munson, Ryan L.; Pratt, Robert G.

    2007-10-01

    Fifty residential electric water heaters and 150 new residential clothes dryers were modified to respond to signals received from underfrequency, load-shedding appliance controllers. Each controller monitored the power-grid voltage signal and requested that electrical load be shed by its appliance whenever electric power-grid frequency fell below 59.95 Hz. The controllers and their appliances were installed and monitored for more than a year at residential sites at three locations in Washington and Oregon. The controllers and their appliances responded reliably to each shallow underfrequency event—an average of one event per day—and shed their loads for the durations of these events. Appliance owners reported that the appliance responses were unnoticed and caused little or no inconvenience for the homes’ occupants.

  15. An Analysis of the Price Elasticity of Demand for Household Appliances

    SciTech Connect (OSTI)

    Fujita, Kimberly; Dale, Larry; Fujita, K. Sydny

    2008-01-25

    This report summarizes our study of the price elasticity of demand for home appliances, including refrigerators, clothes washers, and dishwashers. In the context of increasingly stringent appliance standards, we are interested in what kind of impact the increased manufacturing costs caused by higher efficiency requirements will have on appliance sales. We begin with a review of existing economics literature describing the impact of economic variables on the sale of durable goods.We then describe the market for home appliances and changes in this market over the past 20 years, performing regression analysis on the shipments of home appliances and relevant economic variables including changes to operating cost and household income. Based on our analysis, we conclude that the demand for home appliances is price inelastic.

  16. Progress toward Producing Demand-Response-Ready Appliances

    SciTech Connect (OSTI)

    Hammerstrom, Donald J.; Sastry, Chellury

    2009-12-01

    This report summarizes several historical and ongoing efforts to make small electrical demand-side devices like home appliances more responsive to the dynamic needs of electric power grids. Whereas the utility community often reserves the word demand response for infrequent 2 to 6 hour curtailments that reduce total electrical system peak load, other beneficial responses and ancillary services that may be provided by responsive electrical demand are of interest. Historically, demand responses from the demand side have been obtained by applying external, retrofitted, controlled switches to existing electrical demand. This report is directed instead toward those manufactured products, including appliances, that are able to provide demand responses as soon as they are purchased and that require few, or no, after-market modifications to make them responsive to needs of power grids. Efforts to be summarized include Open Automated Demand Response, the Association of Home Appliance Manufacturer standard CHA 1, a simple interface being developed by the U-SNAP Alliance, various emerging autonomous responses, and the recent PinBus interface that was developed at Pacific Northwest National Laboratory.

  17. Laboratory Testing of Demand-Response Enabled Household Appliances

    SciTech Connect (OSTI)

    Sparn, B.; Jin, X.; Earle, L.

    2013-10-01

    With the advent of the Advanced Metering Infrastructure (AMI) systems capable of two-way communications between the utility's grid and the building, there has been significant effort in the Automated Home Energy Management (AHEM) industry to develop capabilities that allow residential building systems to respond to utility demand events by temporarily reducing their electricity usage. Major appliance manufacturers are following suit by developing Home Area Network (HAN)-tied appliance suites that can take signals from the home's 'smart meter,' a.k.a. AMI meter, and adjust their run cycles accordingly. There are numerous strategies that can be employed by household appliances to respond to demand-side management opportunities, and they could result in substantial reductions in electricity bills for the residents depending on the pricing structures used by the utilities to incent these types of responses. The first step to quantifying these end effects is to test these systems and their responses in simulated demand-response (DR) conditions while monitoring energy use and overall system performance.

  18. Laboratory Testing of Demand-Response Enabled Household Appliances

    SciTech Connect (OSTI)

    Sparn, B.; Jin, X.; Earle, L.

    2013-10-01

    With the advent of the Advanced Metering Infrastructure (AMI) systems capable of two-way communications between the utility's grid and the building, there has been significant effort in the Automated Home Energy Management (AHEM) industry to develop capabilities that allow residential building systems to respond to utility demand events by temporarily reducing their electricity usage. Major appliance manufacturers are following suit by developing Home Area Network (HAN)-tied appliance suites that can take signals from the home's 'smart meter,' a.k.a. AMI meter, and adjust their run cycles accordingly. There are numerous strategies that can be employed by household appliances to respond to demand-side management opportunities, and they could result in substantial reductions in electricity bills for the residents depending on the pricing structures used by the utilities to incent these types of responses.The first step to quantifying these end effects is to test these systems and their responses in simulated demand-response (DR) conditions while monitoring energy use and overall system performance.

  19. Evaluating the Safety of a Natural Gas Home Refueling Appliance (HRA)

    SciTech Connect (OSTI)

    Not Available

    2005-04-01

    A fact sheet summarizing the National Renewable Energy Laboratory safety evaluation of Phill, Fuelmaker Corporation's natural gas home refueling appliance, used to fill CNG vehicles at home.

  20. An Exploration of Innovation and Energy Efficiency in an Appliance Industry

    E-Print Network [OSTI]

    Taylor, Margaret

    2013-01-01

    in products and processes,” “innovation breakthroughs,” “and various innovation counts such as “new products andconduct of innovation in a single appliance ”product. ” The

  1. Realized and prospective impacts of U.S. energy efficiency standards for residential appliances: 2004 update

    E-Print Network [OSTI]

    Meyers, Stephen; McMahon, James; McNeil, Michael

    2005-01-01

    Energy Efficiency Standards for Residential Appliances : 2004 Updateenergy savings due to the original standard and any updatesor energy consumption and the actual values. For updates

  2. 2nd Semi-Annual Report to Congress on Appliance Energy-Efficiency...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Rulemakings - Implementation Report: Energy Conservation Standards Activities 3rd Semi-Annual Report to Congress on Appliance Energy-Efficiency Rulemakings -...

  3. 3rd Semi-Annual Report to Congress on Appliance Energy-Efficiency...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    3rd Semi-Annual Report to Congress on Appliance Energy-Efficiency Rulemakings - Implementation Report: Energy Conservation Standards Activities 3rd Semi-Annual Report to Congress...

  4. 4th Semi-Annual Report to Congress on Appliance Energy-Efficiency...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Secretary on February 2008. congressionalreport0208.pdf More Documents & Publications 3rd Semi-Annual Report to Congress on Appliance Energy-Efficiency Rulemakings -...

  5. 1st Semi-Annual Report to Congress on Appliance Energy-Efficiency...

    Broader source: Energy.gov (indexed) [DOE]

    Secretary on August 2006. implementationreport0806.pdf More Documents & Publications 3rd Semi-Annual Report to Congress on Appliance Energy-Efficiency Rulemakings -...

  6. 4th Semi-Annual Report to Congress on Appliance Energy-Efficiency...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Standards Activities 6th Semi-Annual Report to Congress on Appliance Energy Efficiency Rulemakings - Implementation Report: Energy Conservation Standards Activities 3rd...

  7. 1st Semi-Annual Report to Congress on Appliance Energy-Efficiency...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Rulemakings - Implementation Report: Energy Conservation Standards Activities 3rd Semi-Annual Report to Congress on Appliance Energy-Efficiency Rulemakings -...

  8. Energy-Efficient Appliances: Office of Building Technology, State and Community Programs (BTS) Technology Fact Sheet

    SciTech Connect (OSTI)

    2001-08-01

    Fact sheet for homeowners and contractors that explains the energy savings potential of efficient appliances, how to purchase them, and how to maintain them.

  9. Database Security: A Historical Perspective

    E-Print Network [OSTI]

    Lesov, Paul

    2010-01-01

    The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

  10. What can we learn from high-frequency appliance-level energy metering? Results from a field experiment

    E-Print Network [OSTI]

    Chen, VL; Delmas, MA; Kaiser, WJ; Locke, SL

    2015-01-01

    to consumers about their energy usage at the appliance levelWeekly summaries of total energy usage and appliance-levelsuch large variations in energy usage were primarily driven

  11. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    SciTech Connect (OSTI)

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01

    Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

  12. Breaking parameter modulated chaotic secure communication system

    E-Print Network [OSTI]

    G. Alvarez; F. Montoya; M. Romera; G. Pastor

    2003-11-20

    This paper describes the security weakness of a recently proposed secure communication method based on parameter modulation of a chaotic system and adaptive observer-based synchronization scheme. We show that the security is compromised even without precise knowledge of the chaotic system used.

  13. A Communication-Based Appliance Scheduling Scheme for Consumer-Premise Energy Management Systems

    E-Print Network [OSTI]

    Snyder, Larry

    A Communication-Based Appliance Scheduling Scheme for Consumer-Premise Energy Management Systems Scheme for Consumer-Premise Energy Management Systems Chen Chen, K.G. Nagananda, Gang Xiong, Shalinee" appliances which consume power as they desire. An optimization problem is formulated for the energy

  14. V-232: Cisco ASA Software TFTP Protocol Inspection Denial of...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SOLUTION: Update to a fixed version. Addthis Related Articles U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability V-071: Cisco ASA 1000V Cloud Firewall...

  15. Appliance energy efficiency in new home construction. Final report

    SciTech Connect (OSTI)

    Not Available

    1980-11-30

    A survey of 224 builders was conducted to which 160 builders responded. Each respondent completed between one and seven separate questionnaires. Each of the seven questionnaires were designed to collect information about one type of equipment or major appliance. These are: heat pump; heating system; air conditioner; domestic water heater; dishwasher; range; and refrigerator. Analysis of the resulting 406 questionnaires indicated that builders were primarily responsible for brand selection. These choices were made primarily without regard for the energy efficiency of the product. A similar apparent lack of consideration of energy efficiency during brand and model selection was found among home buyers and specialized subcontractors.

  16. The Demand Reduction Potential of Smart Appliances in U.S. Homes

    SciTech Connect (OSTI)

    Makhmalbaf, Atefe; Srivastava, Viraj; Parker, Graham B.

    2013-08-14

    The widespread deployment of demand respond (DR) enabled home appliances is expected to have significant reduction in the demand of electricity during peak hours. The work documented in this paper focuses on estimating the energy shift resulting from the installation of DR enabled smart appliances in the U.S. This estimation is based on analyzing the market for smart appliances and calculating the total energy demand that can potentially be shifted by DR control in appliances. Appliance operation is examined by considering their sub components individually to identify their energy consumptions and savings resulting from interrupting and shifting their load, e.g., by delaying the refrigerator defrost cycle. In addition to major residential appliances, residential pool pumps are also included in this study given their energy consumption profiles that make them favorable for DR applications. In the market analysis study documented in this paper, the U.S. Energy Information Administration's (EIA) Residential Energy Consumption Survey (RECS) and National Association of Home Builders (NAHB) databases are used to examine the expected life of an appliance, the number of appliances installed in homes constructed in 10 year intervals after 1940 and home owner income. Conclusions about the effectiveness of the smart appliances in reducing electrical demand have been drawn and a ranking of appliances in terms of their contribution to load shift is presented. E.g., it was concluded that DR enabled water heaters result in the maximum load shift; whereas, dishwashers have the highest user elasticity and hence the highest potential for load shifting through DR. This work is part of a larger effort to bring novel home energy management concepts and technologies to reduce energy consumption, reduce peak electricity demand, integrate renewables and storage technology, and change homeowner behavior to manage and consume less energy and potentially save consumer energy costs.

  17. Postal Security Device Security Policy

    E-Print Network [OSTI]

    Postal Security Device Security Policy FRAMA AG PSD - I Version: R01.06 Date: 25.05.2007 Doc.-ID: DE_FNKPSD_510_SPE File name: DE_FNKPSD_510_SPE_R0106_EN.Security Policy PSD Author: Bernd Zinke, Timo » Non-Confidential « #12;Security Policy FRAMA AG CH-3438 LAUPERSWIL / BERN TITLE: POSTAL SECURITY

  18. information security

    E-Print Network [OSTI]

    Faculty listing for "information security" ... 1167; Phone: +1 765 49-46022; Email: wagstaff@purdue.edu; Research Interests: number theory, information security.

  19. Energy Savings Potential and Research, Development, & Demonstration Opportunities for Commercial Building Appliances

    SciTech Connect (OSTI)

    Zogg, Robert; Goetzler, William; Ahlfeldt, Christopher; Hiraiwa, Hirokazu; Sathe, Amul; Sutherland, Timothy

    2009-12-01

    This study characterizes and assesses the appliances used in commercial buildings. The primary objectives of this study were to document the energy consumed by commercial appliances and identify research, development and demonstration (RD&D) opportunities for efficiency improvements, excluding product categories such as HVAC, building lighting, refrigeration equipment, and distributed generation systems. The study included equipment descriptions, characteristics of the equipment’s market, national energy consumption, estimates of technical potential for energy-saving technologies, and recommendations for U.S. Department of Energy programs that can promote energy savings in commercial appliances.

  20. List of Major Information Systems,National Nuclear Security Administra...

    Broader source: Energy.gov (indexed) [DOE]

    emerging information networking technology to production processes in support of the U.S. nuclear weapons stockpile. National Nuclear Security Administration ADaPT Network...

  1. Issues in federal preemption of state appliance energy efficiency regulations

    SciTech Connect (OSTI)

    Fang, J.M.; Balistocky, S.; Schaefler, A.M.

    1982-12-01

    The findings and conclusions of the analysis of the various issues involved in the federal preemption of state regulations for the DOE no standard rule on covered appliances are summarized. The covered products are: refrigerators, refrigerator-freezers, freezers, clothes dryers, kitchen ranges and ovens, water heaters (excluding heat pump water heaters), room air conditioners, central air conditioners (excluding heat pumps), and furnaces. A detailed discussion of the rationale for the positions of groups offering comment for the record is presneted. The pertinent categories of state and local regulations and programs are explained, then detailed analysis is conducted on the covered products and regulations. Issues relating to the timing of preemption of state regulations are discussed, as well as issues relating to burden of proof, contents of petitions for exemptions from preemption, criteria for evaluating petitions, and procedural and other issues. (LEW)

  2. 0 + 0 = 1 : the appliance model of selling software bundled with hardware

    E-Print Network [OSTI]

    Hein, Bettina

    2007-01-01

    The business model of selling software bundled with hardware is called the appliance model. As hardware becomes less and less expensive and open source software is being offered for free, the traditional business model of ...

  3. Impacts of Imported Liquefied Natural Gas on Residential Appliance Components: Literature Review

    SciTech Connect (OSTI)

    Lekov, Alex; Sturges, Andy; Wong-Parodi, Gabrielle

    2009-12-09

    An increasing share of natural gas supplies distributed to residential appliances in the U.S. may come from liquefied natural gas (LNG) imports. The imported gas will be of a higher Wobbe number than domestic gas, and there is concern that it could produce more pollutant emissions at the point of use. This report will review recently undertaken studies, some of which have observed substantial effects on various appliances when operated on different mixtures of imported LNG. While we will summarize findings of major studies, we will not try to characterize broad effects of LNG, but describe how different components of the appliance itself will be affected by imported LNG. This paper considers how the operation of each major component of the gas appliances may be impacted by a switch to LNG, and how this local impact may affect overall safety, performance and pollutant emissions.

  4. Impacts of Imported Liquefied Natural Gas on Residential Appliance Components: Literature Review

    E-Print Network [OSTI]

    Lekov, Alex

    2010-01-01

    we discuss several types of heat exchangers and the ventingThere are six main types of heat exchangers: (1) individualheat exchangers (found in appliances such as furnaces, boilers, and pool heaters) are variations of the individual section type

  5. Estimation of the Energy and Capacity Savings in Texas from Appliance Efficiency Standards 

    E-Print Network [OSTI]

    Verdict, M.

    1986-01-01

    The purpose of this presentation will be to assess the technical potential for energy and capacity savings in Texas by the year 2006 by the statewide adoption of minimum appliance efficiency standards equivalent to those recently adopted...

  6. Will You Be Purchasing New Appliances for a Rebate from Your...

    Energy Savers [EERE]

    from Your State? December 24, 2009 - 7:30am Addthis This week, you read about Amy's war with her dishwasher and how she plans to take advantage of her state's appliance rebate...

  7. Evaluation of advanced technologies for residential appliances and residential and commercial lighting

    SciTech Connect (OSTI)

    Turiel, I.; Atkinson, B.; Boghosian, S.; Chan, P.; Jennings, J.; Lutz, J.; McMahon, J.; Rosenquist, G.

    1995-01-01

    Section 127 of the Energy Policy Act requires that the Department of Energy (DOE) prepare a report to Congress on the potential for the development and commercialization of appliances that substantially exceed the present federal or state efficiency standards. Candidate high-efficiency appliances must meet several criteria including: the potential exists for substantial improvement (beyond the minimum established in law) of the appliance`s energy efficiency; electric, water, or gas utilities are prepared to support and promote the commercialization of such appliances; manufacturers are unlikely to undertake development and commercialization of such appliances on their own, or development and production would be substantially accelerated by support to manufacturers. This report describes options to improve the efficiency of residential appliances, including water heaters, clothes washers and dryers, refrigerator/freezers, dishwashers, space heating and cooling devices, as well as residential and commercial lighting products. Data from this report (particularly Appendix 1)were used to prepare the report to Congress mentioned previously. For the residential sector, national energy savings are calculated using the LBL Residential Energy Model. This model projects the number of households and appliance saturations over time. First, end-use consumption is calculated for a base case where models that only meet the standard replace existing models as these reach the end of their lifetime. Second, models with efficiencies equal to the technology under consideration replace existing models that reach the end of their lifetime. For the commercial sector, the COMMEND model was utilized to project national energy savings from new technologies. In this report, energy savings are shown for the period 1988 to 2015.

  8. Information Security: Coordination of Federal Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO...

  9. Information Security: Coordination of Federal Cyber Security...

    Office of Environmental Management (EM)

    Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

  10. Author: Duncan Woodhouse, Assistant Registrar for Information Security, Risk Management and Business Continuity Date Version Author Comments

    E-Print Network [OSTI]

    Davies, Christopher

    Author: Duncan Woodhouse, Assistant Registrar for Information Security, Risk Management Information Security Policy 2004 09/2008 D01 Duncan Woodhouse Adaption and consolidation of best practices Registrar for Information Security, Risk Management and Business Continuity 2 University of Warwick

  11. WHAT CAN WE LEARN FROM HIGH FREQUENCY APPLIANCE LEVEL ENERGY METERING? RESULTS FROM A FIELD EXPERIMENT

    E-Print Network [OSTI]

    Chen, Victor; Delmas, Magali A; Kaiser, William; Locke, Stephen

    2014-01-01

    the household electricity consumption in the EU, potentialon household electricity consumption: a tool for savinghourly appliance-level electricity consumption data for 124

  12. What can we learn from high-frequency appliance-level energy metering? Results from a field experiment

    E-Print Network [OSTI]

    Chen, VL; Delmas, MA; Kaiser, WJ; Locke, SL

    2015-01-01

    Newborough, M. , 2003. Dynamic energy-consumption indicatorsbehaviour and design. Energy Build. 35 (8), Please cite thisfrequency appliance-level energy metering? Results from a ?

  13. Material World: Forecasting Household Appliance Ownership in a Growing Global Economy

    SciTech Connect (OSTI)

    Letschert, Virginie; McNeil, Michael A.

    2009-03-23

    Over the past years the Lawrence Berkeley National Laboratory (LBNL) has developed an econometric model that predicts appliance ownership at the household level based on macroeconomic variables such as household income (corrected for purchase power parity), electrification, urbanization and climate variables. Hundreds of data points from around the world were collected in order to understand trends in acquisition of new appliances by households, especially in developing countries. The appliances covered by this model are refrigerators, lighting fixtures, air conditioners, washing machines and televisions. The approach followed allows the modeler to construct a bottom-up analysis based at the end use and the household level. It captures the appliance uptake and the saturation effect which will affect the energy demand growth in the residential sector. With this approach, the modeler can also account for stock changes in technology and efficiency as a function of time. This serves two important functions with regard to evaluation of the impact of energy efficiency policies. First, it provides insight into which end uses will be responsible for the largest share of demand growth, and therefore should be policy priorities. Second, it provides a characterization of the rate at which policies affecting new equipment penetrate the appliance stock. Over the past 3 years, this method has been used to support the development of energy demand forecasts at the country, region or global level.

  14. Adaptive Infrastructures Toward a Secure and

    E-Print Network [OSTI]

    Amin, S. Massoud

    Economic load dispatch 10 seconds to 1 hour; ongoing Thermodynamic changes from boiler control action (slow

  15. On the Semantic Security of Functional Encryption Schemes Manuel Barbosa1 and Pooya Farshim2

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    and impossibility results for adaptive token-extraction attack scenarios that shed further light on the potential the equivalence result of O'Neill between indistinguishability and semantic security to restricted adaptive token, and hence natural approaches to prove its (restricted) adaptive security fail. This complements the equiv

  16. ISSUANCE 2015-10-07: Appliance Standards and Rulemaking Federal Advisory Committee: Notice of Open Meetings Regarding The Dedicated Purpose Pool Pumps Working Group

    Broader source: Energy.gov [DOE]

    Appliance Standards and Rulemaking Federal Advisory Committee: Notice of Open Meetings Regarding The Dedicated Purpose Pool Pumps Working Group

  17. Building Storage Appliances for the Grid and Beyond John Bent, Andrea Arpaci-Dusseau, Remzi Arpaci-Dusseau, Miron Livny

    E-Print Network [OSTI]

    Wisconsin at Madison, University of

    Building Storage Appliances for the Grid and Beyond John Bent, Andrea Arpaci-Dusseau, Remzi Arpaci,dusseau,remzi,miron@cs.wisc.edu Abstract Current storage appliances have been traditionally de- signed to meet either the storage demands challenges to storage ap- pliances that would be used on the grid. NeST is a user-level software-only storage

  18. Building Storage Appliances for the Grid and Beyond John Bent, Andrea ArpaciDusseau, Remzi ArpaciDusseau, Miron Livny

    E-Print Network [OSTI]

    Wisconsin at Madison, University of

    Building Storage Appliances for the Grid and Beyond John Bent, Andrea Arpaci­Dusseau, Remzi Arpaci,dusseau,remzi,miron@cs.wisc.edu Abstract Current storage appliances have been traditionally de­ signed to meet either the storage demands challenges to storage ap­ pliances that would be used on the grid. NeST is a user­level software­only storage

  19. Global Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    weapons from the James Martin center for Nonproliferation Studies Homeland Security Digital Library HSDL is the nation's premier research collection of open-source resources...

  20. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  1. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  2. Modeling of GE Appliances in GridLAB-D: Peak Demand Reduction

    SciTech Connect (OSTI)

    Fuller, Jason C.; Vyakaranam, Bharat GNVSR; Prakash Kumar, Nirupama; Leistritz, Sean M.; Parker, Graham B.

    2012-04-29

    The widespread adoption of demand response enabled appliances and thermostats can result in significant reduction to peak electrical demand and provide potential grid stabilization benefits. GE has developed a line of appliances that will have the capability of offering several levels of demand reduction actions based on information from the utility grid, often in the form of price. However due to a number of factors, including the number of demand response enabled appliances available at any given time, the reduction of diversity factor due to the synchronizing control signal, and the percentage of consumers who may override the utility signal, it can be difficult to predict the aggregate response of a large number of residences. The effects of these behaviors can be modeled and simulated in open-source software, GridLAB-D, including evaluation of appliance controls, improvement to current algorithms, and development of aggregate control methodologies. This report is the first in a series of three reports describing the potential of GE's demand response enabled appliances to provide benefits to the utility grid. The first report will describe the modeling methodology used to represent the GE appliances in the GridLAB-D simulation environment and the estimated potential for peak demand reduction at various deployment levels. The second and third reports will explore the potential of aggregated group actions to positively impact grid stability, including frequency and voltage regulation and spinning reserves, and the impacts on distribution feeder voltage regulation, including mitigation of fluctuations caused by high penetration of photovoltaic distributed generation and the effects on volt-var control schemes.

  3. Safeguards and Security and Cyber Security RM

    Office of Environmental Management (EM)

    using security measures such as badging, pre-employment investigation and fitness for duty, training, and security awareness? Cyber Security CS-1 Has the project...

  4. Cyber Security | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    System-of-systems analysis Visualization tools for complex information Next-generation smart grid technologies Quantum computing, security, and data fusion For more information,...

  5. Secure Information Exchange Gateway for Electric Grid Operations

    SciTech Connect (OSTI)

    Robertson, F. Russell; Carroll, J. Ritchie; Sanders, William; Yardley, Timothy; Heine, Erich; Hadley, Mark; McKinnon, David; Motteler, Barbara; Giri, Jay; Walker, William; McCartha, Esrick

    2014-09-30

    The major objectives of the SIEGate project were to improve the security posture and minimize the cyber-attack surface of electric utility control centers and to reduce the cost of maintaining control-room-to-control-room information exchange. Major project goals included the design, development, testing, and commercialization of a single security-hardened appliance that could meet industry needs for resisting cyber-attacks while protecting the confidentiality and integrity of a growing volume of real-time information needed to ensure the reliability of the bulk electric system and interoperating with existing data formats and networking technologies. The SIEGate project has achieved its goals and objectives. The SIEGate Design Document, issued in March 2012, presented SIEGate use cases, provided SIEGate requirements, established SIEGate design principles, and prescribed design functionality of SIEGate as well as the components that make up SIEGate. SIEGate Release Version 1.0 was posted in January 2014. Release Version 1.0.83, which was posted on March 28, 2014, fixed many issues discovered by early adopters and added several new features. Release Candidate 1.1, which added additional improvements and bug fixes, was posted in June 2014. SIEGate executables have been downloaded more than 300 times. SIEGate has been tested at PJM, Entergy, TVA, and Southern. Security testing and analysis of SIEGate has been conducted at PNNL and PJM. Alstom has provided a summary of recommended steps for commercialization of the SIEGate Appliance and identified two deployment models with immediate commercial application.

  6. (MS WORD TEMPLATE for Submission in Fusion Engineering and Design) Security on the US Fusion Grid

    E-Print Network [OSTI]

    Thompson, Mary R.

    (MS WORD TEMPLATE for Submission in Fusion Engineering and Design) Security on the US Fusion Grid J, FusionGrid, grid computing 1. Introduction Critical to the success of any computational grid is security to improve security for the US Fusion Grid (FusionGrid) [1]. Collaboratory workers have adapted secure

  7. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  8. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    Information Security Group IY5512 Computer Security Part 7b: Windows securityPart 7b: Windows security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security Group) of Windows machines. 2 Information Security Group Objectives II · Focus on Active Directory, authentication

  9. Adaptive Sensitivity 1 Adaptive Sensitivity

    E-Print Network [OSTI]

    Ginosar, Ran

    1 Adaptive Sensitivity 1 Adaptive Sensitivity Ran Ginosar Introduction Solid state (and other) sensors have a limited dynamic range Din: where both thresholds are measured in terms of the light intensity (Dout is specified as the ratio of the output signals). Light Intensity Output Signal Saturation

  10. Feasibility of an appliance energy testing and labeling program for Sri Lanka

    SciTech Connect (OSTI)

    Biermayer, Peter; Busch, John; Hakim, Sajid; Turiel, Issac; du Pont, Peter; Stone, Chris

    2000-04-01

    A feasibility study evaluated the costs and benefits of establishing a program for testing, labeling and setting minimum efficiency standards for appliances and lighting in Sri Lanka. The feasibility study included: refrigerators, air-conditioners, flourescent lighting (ballasts & CFls), ceiling fans, motors, and televisions.

  11. Design Techniques for Sensor Appliances: Foundations and Light Compass Case Study

    E-Print Network [OSTI]

    Potkonjak, Miodrag

    sensors of the appliance, and (2) error minimization-based sensor data interpretation middleware. We have University of California, Los Angeles jwong@cs.ucla.edu Seapahn Megerian University of California, Los Angeles seapahn@cs.ucla.edu Miodrag Potkonjak University of California, Los Angeles miodrag

  12. Load control in low voltage level of the electricity grid using CHP appliances

    E-Print Network [OSTI]

    Hurink, Johann

    as a Virtual Power Plant to the electricity grid. In this work we focus on different algorithms to control is centrally generated in large power plants and in which distribution means distribution from these power.g.c.bosman@utwente.nl Abstract--The introduction of µCHP (Combined Heat and Power) appliances and other means of distributed

  13. Impact of domestic woodburning appliances on indoor air quality Corinne Mandin1

    E-Print Network [OSTI]

    Boyer, Edmond

    air pollution study (CITEPA), France * Corresponding email: Eva.Leoz@ineris.fr SUMMARY Data pollutants in ambient air. Consequently our study aims at describing both emission factors and inerisImpact of domestic woodburning appliances on indoor air quality Corinne Mandin1 , Jacques Ribéron2

  14. Standby and off-mode power demand of new appliances in the Anbal de Almeida

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Standby and off-mode power demand of new appliances in the market Aníbal de Almeida ISR regulation to limit the standby and off-mode power consumption of non-networked household electronic involved in the project. Standby and off-mode values by product categories are analyzed and compared

  15. An Effective Architecture for Automated Appliance Management System Applying Ontology-Based Cloud Discovery

    E-Print Network [OSTI]

    Buyya, Rajkumar

    (SOA) application, while Cloud focuses on Web 2.0 and SOA technology. Although Clouds adopted some Appliances; Semantic Web Service; Web Service Modeling Ontology (WSMO); Service- Level Agreements (SLA); Open technologies. There are already more than twenty definitions for Cloud computing [1]. Among them, Ian Foster

  16. Contactless Sensing of Appliance State Transitions Through Variations in Electromagnetic Fields

    E-Print Network [OSTI]

    Rowe, Anthony

    as to track the associated energy consumption. Our EMF sensors are able to detect significant power state, we present a contactless electromagnetic field (EMF) sensor that can detect appliance power consump transitions. In this paper, we present an inexpensive contactless electromagnetic field (EMF) event

  17. Measure Guideline: Combustion Safety for Natural Draft Appliances Using Indoor Air

    SciTech Connect (OSTI)

    Brand, L.

    2014-04-01

    This measure guideline covers how to assess and carry out the combustion safety procedures for appliances and heating equipment that uses indoor air for combustion in low-rise residential buildings. Only appliances installed in the living space, or in an area freely communicating with the living space, vented alone or in tandem with another appliance are considered here. A separate measure guideline addresses combustion appliances located either within the living space in enclosed closets or side rooms or outside the living space in an adjacent area like an attic or garage that use outdoor air for combustion. This document is for inspectors, auditors, and technicians working in homes where energy upgrades are being conducted whether or not air infiltration control is included in the package of measures being applied. In the indoor combustion air case, guidelines summarized here are based on language provided in several of the codes to establish minimum requirements for the space using simplified prescriptive measures. In addition, building performance testing procedures are provided by testing agencies. The codes in combination with the test procedures offer comprehensive combustion safety coverage to address safety concerns, allowing inexperienced residential energy retrofit inspectors to effectively address combustion safety issues and allow energy retrofits to proceed.

  18. 2014-06-06 Appliance Standards and Rulemaking Federal Advisory Committee; Preliminary Agenda

    Broader source: Energy.gov [DOE]

    This document is a preliminary agenda for the Appliance Standards and Rulemaking Federal Advisory Committee open meeting being held on June 6, 2014 from 1:00 p.m.-5:00 p.m. (EST) at the U.S. Department of Energy, Forrestal Building, Room 8E-089, 1000 Independence Avenue SW., Washington, DC 20585.

  19. Energy and CO2 efficient scheduling of smart appliances in active houses equipped with batteries

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    Energy and CO2 efficient scheduling of smart appliances in active houses equipped with batteries the electricity bill and the CO2 emissions. Mathematically, the scheduling problem is posed as a multi that the new formulation can decrease both the CO2 emissions and the electricity bill. Furthermore, a survey

  20. Energy-Harvesting Thermoelectric Sensing for Unobtrusive Water and Appliance Metering

    E-Print Network [OSTI]

    Cafarella, Michael J.

    Energy-Harvesting Thermoelectric Sensing for Unobtrusive Water and Appliance Metering Bradford that meters using the same thermoelectric generator with which it powers itself. In short, the rate at which be harvested with a thermoelectric generator (TEG) to power a sensor node. TEGs utilize the Seebeck effect

  1. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  2. Secure PVM

    SciTech Connect (OSTI)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  3. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  4. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  5. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  6. Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D mSecurity Security

  7. July 11 Public Meeting: Physical Characterization of Grid-Connected Commercial And Residential Building End-Use Equipment And Appliances

    Broader source: Energy.gov [DOE]

    These documents contain the three slide decks presented at the public meeting on the Physical Characterization of Grid-Connected Commercial and Residential Buildings End-Use Equipment and Appliances, held on July 11, 2014 in Washington, DC.

  8. NATURAL GAS VARIABILITY IN CALIFORNIA: ENVIRONMENTAL IMPACTS AND DEVICE PERFORMANCE EXPERIMENTAL EVALUATION OF POLLUTANT EMISSIONS FROM RESIDENTIAL APPLIANCES

    E-Print Network [OSTI]

    Singer, Brett C.

    2010-01-01

    of variations in natural gas composition and physical 2.1.2. Fuel Gas Compositions Both domestic natural gas and natural gas appliances vary with (are affected by) variability in fuel  composition 

  9. Use of Residential Smart Appliances for Peak-Load Shifting and Spinning Reserves Cost/Benefit Analysis

    SciTech Connect (OSTI)

    Sastry, Chellury; Pratt, Robert G.; Srivastava, Viraj; Li, Shun

    2010-12-01

    In this report, we present the results of an analytical cost/benefit study of residential smart appliances from a utility/grid perspective in support of a joint stakeholder petition to the ENERGY STAR program within the Environmental Protection Agency (EPA) and Department of Energy (DOE). The goal of the petition is in part to provide appliance manufacturers incentives to hasten the production of smart appliances. The underlying hypothesis is that smart appliances can play a critical role in addressing some of the societal challenges, such as anthropogenic global warming, associated with increased electricity demand, and facilitate increased penetration of renewable sources of power. The appliances we consider include refrigerator/freezers, clothes washers, clothes dryers, room air-conditioners, and dishwashers. The petition requests the recognition that providing an appliance with smart grid capability, i.e., products that meet the definition of a smart appliance, is at least equivalent to a corresponding five percent in operational machine efficiencies. It is then expected that given sufficient incentives and value propositions, and suitable automation capabilities built into smart appliances, residential consumers will be adopting these smart appliances and will be willing participants in addressing the aforementioned societal challenges by more effectively managing their home electricity consumption. The analytical model we utilize in our cost/benefit analysis consists of a set of user-definable assumptions such as the definition of on-peak (hours of day, days of week, months of year), the expected percentage of normal consumer electricity consumption (also referred to as appliance loads) that can shifted from peak hours to off-peak hours, the average power rating of each appliance, etc. Based on these assumptions, we then formulate what the wholesale grid operating-cost savings, or benefits, would be if the smart capabilities of appliances were invoked, and some percentage of appliance loads were shifted away from peak hours to run during off-peak hours, and appliance loads served power-system balancing needs such as spinning reserves that would otherwise have to be provided by generators. The rationale is that appliance loads can be curtailed for about ten minutes or less in response to a grid contingency without any diminution in the quality of service to the consumer. We then estimate the wholesale grid operating-cost savings based on historical wholesale-market clearing prices (location marginal and spinning reserve) from major wholesale power markets in the United States. The savings derived from the smart grid capabilities of an appliance are then compared to the savings derived from a five percent increase in traditional operational machine efficiencies, referred to as cost in this report, to determine whether the savings in grid operating costs (benefits) are at least as high as or higher than the operational machine efficiency credit (cost).

  10. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio August 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Security

  11. INSTITUTE FOR CYBER SECURITY Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio August-world impact #12;INSTITUTE FOR CYBER SECURITY Institute for Cyber Security Founded June 2007: still in start

  12. NSM Secure UI Crypto Module Security Policy

    E-Print Network [OSTI]

    NSM Secure UI Crypto Module Security Policy Version: 1.4 Revision Date: April 1, 2010 This document. #12;McAfee, Inc NSM Secure UI Crypto Module Security Policy Page 2 of 15 CHANGE RECORD Revision Date Module Security Policy Page 3 of 15 Contents 1 Module Overview

  13. Security for grids

    E-Print Network [OSTI]

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-01-01

    differences between Grid security and host or site securityof requirements for Grid security in order to achieve thecompletely. Index Terms — Grid security, authentication,

  14. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  15. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  16. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6. Canceled by Admin Chg 2 dated 5-15-15.

  17. Field monitoring of a variable-speed integrated heat pump/water-heating appliance

    SciTech Connect (OSTI)

    Fanney, A.H. [National Inst. of Standards and Technology, Gaithersburg, MD (United States). Building and Fire Research Lab.

    1995-12-31

    A variable-speed integrated heat pump/water-heating appliance was monitored for two years while meeting the space-conditioning and water-heating needs of an occupied residence. Experimental results are presented that show the total energy consumed by the residence was significantly reduced compared to previous years in which electric base-board heat, a wood stove, and window air conditioners were used. During the two space-heating seasons, the variable-speed integrated heat pump/water-heating appliance used 60% less energy than would have been consumed by an electric furnace with the same air distribution system and a storage-type electric water heater. The monthly space-cooling-only coefficients of performance (COP) ranged from 2.50 to 4.03, whereas the monthly space-heating-only coefficients of performance ranged from a low of 0.91 to a high of 3.33. A proposed index to quantify the overall system performance of integrated water-heating/space-conditioning appliances, referred to as the combined performance factor, ranged from 1.55 to 3.50. The majority of larger values occurred during months in which space cooling dominated. The combined performance factor for the entire two-year study was 2.45. A conventional watt-hour meter supplied by the local electrical utility and an electronic digital power analyzer were used to measure the energy consumption of the variable-speed heat pump to discern if variable-speed equipment introduces errors in conventional utility metering equipment. Measurements made using the two instruments were in excellent agreement. The monthly energy consumption and peak electrical demands of the residence, integrated heat pump/water-heating appliance, supplemental space heater, and water heater are discussed. The influence of outdoor temperature on electrical power demand is presented.

  18. GE Appliance Park Louisville, KY Plant Wide Assessment Final Report October 25th, 2007

    SciTech Connect (OSTI)

    Chandon Rao; Richard Urschel

    2007-10-25

    Used a team of experts to analyze and model major systems at a large industrial appliance manufacturer. During the data gathering stage, the team specifically looked for baselining the efficiency of the systems as well as developing short term and longer term efficiency projects. Electrical distribution, Compressed air generation and thermal heat recovery for the production facility and front office heating and cooling optimization were all baselined during the study.

  19. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  20. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  1. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  2. Faculty Information Security Guide

    E-Print Network [OSTI]

    Faculty Information Security Guide Dartmouth Your information is vitally important to your teaching protect your information. THE DARTMOUTH INFORMATION SECURITY COMMITTEE The Dartmouth Information Security Committee (DISC) meets monthly to assess vulnerabilities of information security, and to develop and revise

  3. SELECTING INFORMATION TECHNOLOGY SECURITY

    E-Print Network [OSTI]

    April 2004 SELECTING INFORMATION TECHNOLOGY SECURITY PRODUCTS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Information technology security prod ucts are essential to better secure infor mation technology (IT) systems

  4. Towards a Security Engineering Process Model for Electronic Business Processes

    E-Print Network [OSTI]

    Eichler, Jörn

    2012-01-01

    Business process management (BPM) and accompanying systems aim at enabling enterprises to become adaptive. In spite of the dependency of enterprises on secure business processes, BPM languages and techniques provide only little support for security. Several complementary approaches have been proposed for security in the domain of BPM. Nevertheless, support for a systematic procedure for the development of secure electronic business processes is still missing. In this paper, we pinpoint the need for a security engineering process model in the domain of BPM and identify key requirements for such process model.

  5. Technology Solutions Case Study: Combustion Safety for Appliances Using Indoor Air

    SciTech Connect (OSTI)

    2014-05-01

    This case study describes how to assess and carry out the combustion safety procedures for appliances and heating equipment that uses indoor air for combustion in low-rise residential buildings. Only appliances installed in the living space, or in an area freely communicating with the living space, vented alone or in tandem with another appliance are considered here. This document is for inspectors, auditors, and technicians working in homes where energy upgrades are being conducted whether or not air infiltration control is included in the package of measures being applied. In the indoor combustion air case, guidelines summarized here are based on language provided in several of the codes to establish minimum requirements for the space using simplified prescriptive measures. In addition, building performance testing procedures are provided by testing agencies. The codes in combination with the test procedures offer comprehensive combustion safety coverage to address safety concerns, allowing inexperienced residential energy retrofit inspectors to effectively address combustion safety issues and allow energy retrofits to proceed.

  6. Agenda for Public Meeting on the Physical Characterization of Grid-Connected Commercial and Residential Buildings End-Use Equipment and Appliances

    Broader source: Energy.gov [DOE]

    Download the agenda below for the July 11 Public Meeting on the Physical Characterization of Grid-Connected Commercial and  Residential Buildings End-Use Equipment and Appliances.

  7. Impact of Natural Gas Appliances on Pollutant Levels in California Homes

    SciTech Connect (OSTI)

    Mullen, Nasim A.; Li, Jina; Singer, Brett C.

    2012-12-01

    This report presents results from the first year of a 2-year study, investigating associations of five air pollutants (CO, NO2, NOX, formaldehyde and acetaldehyde) with the presence of natural gas appliances in California homes. From November 2011 to March 2012, pollutant concentration and occupant activity data were collected in 155 homes for 6-day periods. The sample population included both single-family (68%) and multi-family (32%) dwellings, with 87% having at least one gas appliance and 77% having an unvented gas cooking appliance. The geometric mean (GM) NO2 levels measured in the kitchen, bedroom and outside of homes were similar at values of 15, 12 and 11 ppb, respectively. In contrast, the GM NOx levels measured in the kitchen and bedroom of homes were much higher than levels measured outdoors, at levels of 42 and 41 ppb, compared to 19 ppb, respectively. Roughly 10% of sampled homes had 6-day average NO2 levels that exceeded the outdoor annual average limit set by the California Ambient Air Quality Standards (CAAQS) (30 ppb). The GMs of the highest 1-h and 8-h CO level measured in homes were 2.5 and 1.1 ppm, respectively. Four homes had a 1-h or 8-h concentration that exceeded the outdoor limits set by the CAAQS. The GM formaldehyde and acetaldehyde concentrations measured in homes were 15 and 7 ppb, respectively. Roughly 95% of homes had average formaldehyde levels indoors that exceeded the Chronic Reference Exposure Level set by the California EPA (7 ppb). Concentrations of NO2 and NOx, and to a lesser extent CO were associated with use of gas appliances, particularly unvented gas cooking appliances. Based on first principles, it is expected that effective venting of cooking pollutant emissions at the source will lead to a reduction of pollutant concentrations. However, no statistical association was detected between kitchen exhaust fan use and pollutant concentrations in homes in this study where gas cooking occurred frequently. The lack of statistical

  8. Mitigation and Adaptation Strategies for Global Change

    E-Print Network [OSTI]

    concerns about rising energy demand and cost, diminishing oil reserves, and climate change, Central a critical analysis of this experience focusing on non-technical barriers to investment. Survey results America . Caribbean basin initiative . Trade and investment . Energy security Mitig Adapt Strateg Glob

  9. Nuclear security

    SciTech Connect (OSTI)

    Not Available

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected.

  10. Adaptive sampler

    DOE Patents [OSTI]

    Watson, B.L.; Aeby, I.

    1980-08-26

    An adaptive data compression device for compressing data is described. The device has a frequency content, including a plurality of digital filters for analyzing the content of the data over a plurality of frequency regions, a memory, and a control logic circuit for generating a variable rate memory clock corresponding to the analyzed frequency content of the data in the frequency region and for clocking the data into the memory in response to the variable rate memory clock.

  11. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W. (Albuquerque, NM)

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  12. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. (The original DOE O 471.6 canceled DOE M 470.4-4A, except for Section D). Admin Chg 2, dated 5-15-15, supersedes Admin Chg 1. Certified 5-21-2015.

  13. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security's IT Security Procedures require that non-public University information, including social security numbers and professional information in a secure and appropriate manner. #12;

  14. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  15. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  16. Electronic security device

    DOE Patents [OSTI]

    Eschbach, Eugene A. (Richland, WA); LeBlanc, Edward J. (Kennewick, WA); Griffin, Jeffrey W. (Kennewick, WA)

    1992-01-01

    The present invention relates to a security device having a control box (12) containing an electronic system (50) and a communications loop (14) over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system (50) and a detection module (72) capable of registering changes in the voltage and phase of the signal transmitted over the loop.

  17. Electronic security device

    DOE Patents [OSTI]

    Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

    1992-03-17

    The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.

  18. 2014 Headquarters Facilities Master Security Plan- Chapter 14, Cyber Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security Describes the DOE Headquarters Cyber Security Program.

  19. The 7th IEEE International Conference on Software Security and Reliability

    E-Print Network [OSTI]

    Sandhu, Ravi

    : Attributes, Automation and Adaptation Ravi Sandhu Lutcher Brown Endowed Chair in Cyber Security Department of the center pieces of cyber security. This talk will focus on three necessary characteristics of access this vision a reality. About the speaker Ravi Sandhu is Executive Director of the Institute for Cyber Security

  20. 2014 Headquarters Facilities Master Security Plan- Chapter 3, Personnel Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security Describes DOE Headquarters Personnel Security procedures for acquiring, maintaining, and passing security clearances.

  1. Using Operational Security (OPSEC) to Support a Cyber Security...

    Energy Savers [EERE]

    Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

  2. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 supersedes DOE O 472.2 Admin Chg 1.

  3. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 cancels DOE O 472.2 Admin Chg 1.

  4. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Infrastructure Demonstration for Energy reliability and Security) (web link) program to demonstrate: · Cyber-securityEnergy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security

  5. Climate Change and National Security

    SciTech Connect (OSTI)

    Malone, Elizabeth L.

    2013-02-01

    Climate change is increasingly recognized as having national security implications, which has prompted dialogue between the climate change and national security communities – with resultant advantages and differences. Climate change research has proven useful to the national security community sponsors in several ways. It has opened security discussions to consider climate as well as political factors in studies of the future. It has encouraged factoring in the stresses placed on societies by climate changes (of any kind) to help assess the potential for state stability. And it has shown that, changes such as increased heat, more intense storms, longer periods without rain, and earlier spring onset call for building climate resilience as part of building stability. For the climate change research community, studies from a national security point of view have revealed research lacunae, for example, such as the lack of usable migration studies. This has also pushed the research community to consider second- and third-order impacts of climate change, such as migration and state stability, which broadens discussion of future impacts beyond temperature increases, severe storms, and sea level rise; and affirms the importance of governance in responding to these changes. The increasing emphasis in climate change science toward research in vulnerability, resilience, and adaptation also frames what the intelligence and defense communities need to know, including where there are dependencies and weaknesses that may allow climate change impacts to result in security threats and where social and economic interventions can prevent climate change impacts and other stressors from resulting in social and political instability or collapse.

  6. Max Tech and Beyond: Maximizing Appliance and Equipment Efficiency by Design

    SciTech Connect (OSTI)

    Desroches, Louis-Benoit; Garbesi, Karina

    2011-07-20

    It is well established that energy efficiency is most often the lowest cost approach to reducing national energy use and minimizing carbon emissions. National investments in energy efficiency to date have been highly cost-effective. The cumulative impacts (out to 2050) of residential energy efficiency standards are expected to have a benefit-to-cost ratio of 2.71:1. This project examined energy end-uses in the residential, commercial, and in some cases the industrial sectors. The scope is limited to appliances and equipment, and does not include building materials, building envelopes, and system designs. This scope is consistent with the scope of DOE's appliance standards program, although many products considered here are not currently subject to energy efficiency standards. How much energy could the United States save if the most efficient design options currently feasible were adopted universally? What design features could produce those savings? How would the savings from various technologies compare? With an eye toward identifying promising candidates and strategies for potential energy efficiency standards, the Max Tech and Beyond project aims to answer these questions. The analysis attempts to consolidate, in one document, the energy savings potential and design characteristics of best-on-market products, best-engineered products (i.e., hypothetical products produced using best-on-market components and technologies), and emerging technologies in research & development. As defined here, emerging technologies are fundamentally new and are as yet unproven in the market, although laboratory studies and/or emerging niche applications offer persuasive evidence of major energy-savings potential. The term 'max tech' is used to describe both best-engineered and emerging technologies (whichever appears to offer larger savings). Few best-on-market products currently qualify as max tech, since few apply all available best practices and components. The three primary analyses presented in this report are: Nevertheless, it is important to analyze best-on-market products, since data on truly max tech technologies are limited. (1) an analysis of the cross-cutting strategies most promising for reducing appliance and equipment energy use in the U.S.; (2) a macro-analysis of the U.S. energy-saving potential inherent in promising ultra-efficient appliance technologies; and (3) a product-level analysis of the energy-saving potential.

  7. Appliance Upgrades to Consider for Next Tax Season | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:FinancingPetroleum Based Fuels Research at 1 TableC Appendix C Letter from JohnNovemberAppliance

  8. 2nd Semi-Annual Report to Congress on Appliance Energy-Efficiency

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann JacksonDepartment| Department ofApplianceU.S. Departmentthreethe 8:00AM EDT toRulemakings

  9. 3rd Semi-Annual Report to Congress on Appliance Energy-Efficiency

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann JacksonDepartment| Department ofApplianceU.S. DepartmentthreetheRulemakings -

  10. 4th Semi-Annual Report to Congress on Appliance Energy-Efficiency

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann JacksonDepartment| Department ofApplianceU.S. DepartmentthreetheRulemakings

  11. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia, and reactorsystemoverviews. Training in Action: Gulf Nuclear Energy InfrastructureInstitute In2011,SandiateamedwiththeNuclearSecurity energy safety, security,safeguards,andnonproliferation. Training Sandia National Laboratories experts

  12. Designing security into software

    E-Print Network [OSTI]

    Zhang, Chang Tony

    2006-01-01

    When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

  13. Proposed platform for improving grid security by trust management system

    E-Print Network [OSTI]

    Siadat, Safieh; Mohsenzadeh, Mehran

    2009-01-01

    With increasing the applications of grid system, the risk in security field is enhancing too. Recently Trust management system has been recognized as a noticeable approach in enhancing of security in grid systems. In this article due to improve the grid security a new trust management system with two levels is proposed. The benefits of this platform are adding new domain in grid system, selecting one service provider which has closest adaption with user requests and using from domains security attribute as an important factor in computing the trust value.

  14. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  15. Security | Department of Energy

    Office of Environmental Management (EM)

    Security Security Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top...

  16. Advancing Global Nuclear Security

    Broader source: Energy.gov [DOE]

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  17. Appliances, Lighting, Electronics, and Miscellaneous EquipmentElectricity Use in New Homes

    SciTech Connect (OSTI)

    Brown, Richard E.; Rittelman, William; Parker, Danny; Homan,Gregory

    2007-02-28

    The "Other" end-uses (appliances, lighting, electronics, andmiscellaneous equipment) continue to grow. This is particularly true innew homes, where increasing floor area and amenities are leading tohigher saturation of these types of devices. This paper combines thefindings of several field studies to assess the current state ofknowledge about the "Other" end-uses in new homes. The field studiesinclude sub-metered measurements of occupied houses in Arizona, Florida,and Colorado, as well as device-level surveys and power measurements inunoccupied new homes. We find that appliances, lighting, electronics, andmiscellaneous equipment can consume from 46 percent to 88 percent ofwhole-house electricity use in current low-energy homes. Moreover, theannual consumption for the "Other" end-uses is not significantly lower innew homes (even those designed for low energy use) compared to existinghomes. The device-level surveys show that builder-installed equipment isa significant contributor to annual electricity consumption, and certaindevices that are becoming more common in new homes, such as structuredwiring systems, contribute significantly to this power consumption. Thesefindings suggest that energy consumption by these "Other" end uses isstill too large to allow cost-effective zero-energy homes.

  18. Rebates, loans, and consumers` choice of appliance efficiency level: Combining stated and revealed-preference data

    SciTech Connect (OSTI)

    Train, K.E.; Atherton, T.

    1995-12-31

    Residential customers` choice of efficiency level for appliances, and their participation in demand-side management (DSM) programs, are examined using data on customers` stated preferences in hypothetical (i.e., conjoint-type) situations and their revealed preferences in real-world choices. The analysis provides information on customers` willingness to pay for energy savings, the importance of rebates in customers` decisions, and customers` response to DSM programs that offer loans for purchases of high-efficiency appliances. An estimated model is used to forecast the decisions of customers under: higher rebates, replacement of rebates with finance programs, offering of loans and rebates as alternative options for customers, and the elimination of DSM programs. We find that attractive loans (e.g., low interest rates, loan repayment periods) are necessary to have the same effect as rebates. Programs that offer customers the option of loans or rebates are found to be far more effective than programs that offer only loans or only rebates. 12 refs., 5 figs.

  19. A crossover design study to evaluate the effectiveness of appliance inspection and servicing for lowering indoor nitrogen dioxide concentrations

    SciTech Connect (OSTI)

    Colome, S.D. ); Billick, I.H. ); Baker, P.E.; Beals, S.A.; Rubio, S.A.; Cunningham, S.J. ); Wilson, A.L. )

    1988-01-01

    Some researchers have suggested that natural gas appliances are significant contributors to indoor air pollution. Indoor unvented combustion appliances, such as gas-fired ranges, unvented space heaters, and portable kerosene space heaters, have been associated with a wide variety of pollutants, including carbon monoxide (CO), nitric oxide (NO), nitrogen dioxide (NO{sub 2}), sulfur dioxide (SO{sub 2}), formaldehyde (HCHO), and respirable particles. Previous indoor air quality studies have demonstrated that indoor NO{sub 2} concentrations often exceed outdoor ambient levels when gas- burning appliances are used. Cooking with gas has been the focus of many of these studies, although other unvented appliances, such as space-heaters, have also been associated with elevated NO{sub 2} concentrations. Some epidemiologic studies of exposure to NO{sub 2} in homes with gas ranges have indicated a higher prevalence of respiratory symptoms and illness. However, other studies contradicted these findings and failed to show any significant effects associated with gas cooking.

  20. A retrospective investigation of energy efficiency standards: Policies may have accelerated long term declines in appliance costs

    SciTech Connect (OSTI)

    Van Buskirk, R. D.; Kantner, C. L. S.; Gerke, B. F.; Chu, S.

    2014-11-14

    We perform a retrospective investigation of multi-decade trends in price and life-cycle cost (LCC) for home appliances in periods with and without energy efficiency (EE) standards and labeling polices. In contrast to the classical picture of the impact of efficiency standards, the introduction and updating of appliance standards is not associated with a long-term increase in purchase price; rather, quality-adjusted prices undergo a continued or accelerated long-term decline. In addition, long term trends in appliance LCCs—which include operating costs—consistently show an accelerated long term decline with EE policies. We also show that the incremental price of efficiency improvements has declined faster than the baseline product price for selected products. These observations are inconsistent with a view of EE standards that supposes a perfectly competitive market with static supply costs. These results suggest that EE policies may be associated with other forces at play, such as innovation and learning-by-doing in appliance production and design, that can affect long term trends in quality-adjusted prices and LCCs.

  1. 282 IEEE TRANSACTIONS ON SMART GRID, VOL. 5, NO. 1, JANUARY 2014 A Distributed Algorithm of Appliance Scheduling for

    E-Print Network [OSTI]

    Nehorai, Arye

    , Student Member, IEEE, and Arye Nehorai, Fellow, IEEE Abstract--Demand side management encourages the users of Appliance Scheduling for Home Energy Management System Phani Chavali, Student Member, IEEE, Peng Yang. In this paper, we propose a distributed framework for the demand response based on cost minimiza- tion. Each

  2. A retrospective investigation of energy efficiency standards: Policies may have accelerated long term declines in appliance costs

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Van Buskirk, R. D.; Kantner, C. L. S.; Gerke, B. F.; Chu, S.

    2014-11-14

    We perform a retrospective investigation of multi-decade trends in price and life-cycle cost (LCC) for home appliances in periods with and without energy efficiency (EE) standards and labeling polices. In contrast to the classical picture of the impact of efficiency standards, the introduction and updating of appliance standards is not associated with a long-term increase in purchase price; rather, quality-adjusted prices undergo a continued or accelerated long-term decline. In addition, long term trends in appliance LCCs—which include operating costs—consistently show an accelerated long term decline with EE policies. We also show that the incremental price of efficiency improvements has declinedmore »faster than the baseline product price for selected products. These observations are inconsistent with a view of EE standards that supposes a perfectly competitive market with static supply costs. These results suggest that EE policies may be associated with other forces at play, such as innovation and learning-by-doing in appliance production and design, that can affect long term trends in quality-adjusted prices and LCCs.« less

  3. Faculty Information Security Guide

    E-Print Network [OSTI]

    Myers, Lawrence C.

    society. www.ists.dartmouth.edu THE DARTMOUTH CYBER SECURITY INITIATIVE The Dartmouth Cyber Security, TECHNOLOGY, AND SOCIETY THE DARTMOUTH CYBER SECURITY INITIATIVE #12;The number of laptop thefts at Dartmouth, and Society; and the Dartmouth Cyber Security Initiative offer the following solutions: · Whole

  4. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  5. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  6. APPLIANCE STANDARDS

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Equipment General Service Incandescent Lamps General Service Fluorescent Lamps Small Electric Motors Electric Motors Water Heaters Furnace Fans Distribution Transformers Water...

  7. APPLIANCE STANDARDS

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach HomeA Better Anode Design to Improve4AJ01) (See Energy Level79AJ01)19^560AMERICA'S,A DISTRIBUTION

  8. Energy-efficiency labels and standards: A guidebook for appliances, equipment and lighting

    SciTech Connect (OSTI)

    McMahon, James E.; Wiel, Stephen

    2001-02-16

    Energy-performance improvements in consumer products are an essential element in any government's portfolio of energy-efficiency and climate change mitigation programs. Governments need to develop balanced programs, both voluntary and regulatory, that remove cost-ineffective, energy-wasting products from the marketplace and stimulate the development of cost-effective, energy-efficient technology. Energy-efficiency labels and standards for appliances, equipment, and lighting products deserve to be among the first policy tools considered by a country's energy policy makers. The U.S. Agency for International Development (USAID) and the United Nations Foundation (UNF) recognize the need to support policy makers in their efforts to implement energy-efficiency standards and labeling programs and have developed this guidebook, together with the Collaborative Labeling and Appliance Standards Program (CLASP), as a primary reference. This guidebook was prepared over the course of the past year with significant contribution from the authors and reviewers mentioned previously. Their diligent participation has made this the international guidance tool it was intended to be. The lead authors would also like to thank the following individuals for their support in the development, production, and distribution of the guidebook: Marcy Beck, Elisa Derby, Diana Dhunke, Ted Gartner, and Julie Osborn of Lawrence Berkeley National Laboratory as well as Anthony Ma of Bevilacqua-Knight, Inc. This guidebook is designed as a manual for government officials and others around the world responsible for developing, implementing, enforcing, monitoring, and maintaining labeling and standards-setting programs. It discusses the pros and cons of adopting energy-efficiency labels and standards and describes the data, facilities, and institutional and human resources needed for these programs. It provides guidance on the design, development, implementation, maintenance, and evaluation of the programs and on the design of the labels and standards themselves. In addition, it directs the reader to references and other resources likely to be useful in conducting the activities described and includes a chapter on energy policies and programs that complement appliance efficiency labels and standards. This guidebook attempts to reflect the essential framework of labeling and standards programs. It is the intent of the authors and sponsors to distribute copies of this book worldwide at no charge for the general public benefit. The guidebook is also available on the web at www.CLASPonline.org and can be downloaded to be used intact or piecemeal for whatever beneficial purposes readers may conceive.

  9. Page 1Securing the Microsoft Cloud Securing the

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Page 1Securing the Microsoft Cloud Securing the Microsoft Cloud #12;Page 2Securing the Microsoft to have confidence in Microsoft as their preferred cloud provider. Our security policies and practices their security and compliance related needs. Securing the Microsoft Cloud #12;Page 3Securing the Microsoft Cloud

  10. Field monitoring of a variable-speed integrated heat pump/water heating appliance

    SciTech Connect (OSTI)

    Fanney, A.H.

    1993-06-01

    The report describes the residence, heat pump system, and monitoring equipment. Results are presented which include comparison of the total electrical energy consumption of the residence prior to and after installation of the heat pump system, the portion of energy used by each end use within the residence, a comparison of the heat pump's energy consumption using a conventional watthour meter and an electronic digital power analyzer, and the hourly electrical demands imposed on the utility. The thermal performance of the heat pump system is reported on a monthly, seasonal, and annual basis using conventional performance indicators in addition to using an index, proposed by NIST, which quantifies the overall system performance of integrated appliances.

  11. Evaluation of Waste Heat Recovery and Utilization from Residential Appliances and Fixtures

    SciTech Connect (OSTI)

    Tomlinson, John J; Christian, Jeff; Gehl, Anthony C

    2012-09-01

    Executive Summary In every home irrespective of its size, location, age, or efficiency, heat in the form of drainwater or dryer exhaust is wasted. Although from a waste stream, this energy has the potential for being captured, possibly stored, and then reused for preheating hot water or air thereby saving operating costs to the homeowner. In applications such as a shower and possibly a dryer, waste heat is produced at the same time as energy is used, so that a heat exchanger to capture the waste energy and return it to the supply is all that is needed. In other applications such as capturing the energy in drainwater from a tub, dishwasher, or washing machine, the availability of waste heat might not coincide with an immediate use for energy, and consequently a heat exchanger system with heat storage capacity (i.e. a regenerator) would be necessary. This study describes a two-house experimental evaluation of a system designed to capture waste heat from the shower, dishwasher clothes washer and dryer, and to use this waste heat to offset some of the hot water energy needs of the house. Although each house was unoccupied, they were fitted with equipment that would completely simulate the heat loads and behavior of human occupants including operating the appliances and fixtures on a demand schedule identical to Building American protocol (Hendron, 2009). The heat recovery system combined (1) a gravity-film heat exchanger (GFX) installed in a vertical section of drainline, (2) a heat exchanger for capturing dryer exhaust heat, (3) a preheat tank for storing the captured heat, and (4) a small recirculation pump and controls, so that the system could be operated anytime that waste heat from the shower, dishwasher, clothes washer and dryer, and in any combination was produced. The study found capturing energy from the dishwasher and clothes washer to be a challenge since those two appliances dump waste water over a short time interval. Controls based on the status of the dump valve on these two appliances would have eliminated uncertainty in knowing when waste water was flowing and the recovery system operated. The study also suggested that capture of dryer exhaust heat to heat incoming air to the dryer should be examined as an alternative to using drying exhaust energy for water heating. The study found that over a 6-week test period, the system in each house was able to recover on average approximately 3000 W-h of waste heat daily from these appliance and showers with slightly less on simulated weekdays and slightly more on simulated weekends which were heavy wash/dry days. Most of these energy savings were due to the shower/GFX operation, and the least savings were for the dishwasher/GFX operation. Overall, the value of the 3000 W-h of displaced energy would have been $0.27/day based on an electricity price of $.09/kWh. Although small for today s convention house, these savings are significant for a home designed to approach maximum affordable efficiency where daily operating costs for the whole house are less than a dollar per day. In 2010 the actual measured cost of energy in one of the simulated occupancy houses which waste heat recovery testing was undertaken was $0.77/day.

  12. Nuclear Security Summit | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Summit | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  13. Building Extensible and Secure Networks

    E-Print Network [OSTI]

    Popa, Lucian

    2011-01-01

    adoption of cloud computing is security, as customers oftenpreserving security when migrating to the cloud computingto the security principals used in the cloud access control

  14. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    for Environment and National Security Scripps Institution ofMultiplying Threats to National Security Higher temperaturesefforts to protect national security. Page 2 The U.S. Armed

  15. Sandia Energy - Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessment Home Climate & Earth Systems WaterEnergy Nexus Water Monitoring & Treatment Technology Security Risk Assessment Security Risk Assessmentcwdd2015-05-04T21:...

  16. 2014-04-30 Public Meeting Agenda: Physical Characterization of Smart and Grid-Connected Commercial and Residential Buildings End-Use Equipment and Appliances

    Broader source: Energy.gov [DOE]

    This document is the agenda for the Physical Characterization of Smart and Grid-Connected Commercial and Residential Buildings End-Use Equipment and Appliances public meeting being held on April 30, 2014.

  17. 2014-04-30 Public Meeting Presentation Slides: Physical Characterization of Smart and Grid-Connected Commercial and Residential Buildings End-Use Equipment and Appliances

    Broader source: Energy.gov [DOE]

    These documents contain slide decks presented at the Physical Characterization of Smart and Grid-Connected Commercial and Residential Buildings End-Use Equipment and Appliances public meeting held on April 30, 2014.

  18. Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES

    E-Print Network [OSTI]

    Newby, Gregory B.

    Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES Gregory B. Newby School an active role in information security. INTRODUCTION By most accounts, the proliferation of the Internet of information security, making concrete recommendations for safeguarding information and information access

  19. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  20. Office of Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  1. INFRASTRUCTURE SECURITY & ENERGY

    E-Print Network [OSTI]

    Schrijver, Karel

    INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Real Time Monitoring of Energy Infrastructure Status Patrick Willging, PE Office of Electricity Delivery and Energy Reliability #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY

  2. nevada national security site

    National Nuclear Security Administration (NNSA)

    7%2A en Nevada National Security Site operator recognized for green fleet http:www.nnsa.energy.govblognevada-national-security-site-operator-recognized-green-fleet

    The...

  3. Powering a Home with Just 25 Watts of Solar PV. Super-Efficient Appliances Can Enable Expanded Off-Grid Energy Service Using Small Solar Power Systems

    SciTech Connect (OSTI)

    Phadke, Amol A.; Jacobson, Arne; Park, Won Young; Lee, Ga Rick; Alstone, Peter; Khare, Amit

    2015-04-01

    Highly efficient direct current (DC) appliances have the potential to dramatically increase the affordability of off-grid solar power systems used for rural electrification in developing countries by reducing the size of the systems required. For example, the combined power requirement of a highly efficient color TV, four DC light emitting diode (LED) lamps, a mobile phone charger, and a radio is approximately 18 watts and can be supported by a small solar power system (at 27 watts peak, Wp). Price declines and efficiency advances in LED technology are already enabling rapidly increased use of small off-grid lighting systems in Africa and Asia. Similar progress is also possible for larger household-scale solar home systems that power appliances such as lights, TVs, fans, radios, and mobile phones. When super-efficient appliances are used, the total cost of solar home systems and their associated appliances can be reduced by as much as 50%. The results vary according to the appliances used with the system. These findings have critical relevance for efforts to provide modern energy services to the 1.2 billion people worldwide without access to the electrical grid and one billion more with unreliable access. However, policy and market support are needed to realize rapid adoption of super-efficient appliances.

  4. Security system signal supervision

    SciTech Connect (OSTI)

    Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  5. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  6. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    Pew Project on National Security, Energy and Climate http://of climate change, energy security and economic stability.DoD is improving U.S. energy security and national security.

  7. Secure Core Contact Information

    E-Print Network [OSTI]

    Secure Core Contact Information C. E. Irvine irvine@nps.edu 831-656-2461 Department of Computer for the secure management of local and/or remote information in multiple contexts. The SecureCore project Science Graduate School of Operations and Information Sciences www.cisr.nps.edu Project Description

  8. Information Security Guide

    E-Print Network [OSTI]

    Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

  9. cyber security guru

    E-Print Network [OSTI]

    Sandhu, Ravi

    cyber security guru By: Virginia Scott Posted: 4/17/07 UTSA has received a grant from the Texas Emerging Fund to create an institute for cyber security research. According to UTSA industry and educational initiatives in Texas. The creation of UTSA's Institute for Cyber Security Research

  10. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Energy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security

  11. Generalized Adaptive A* Xiaoxun Sun

    E-Print Network [OSTI]

    Yeoh, William

    Generalized Adaptive A* Xiaoxun Sun USC Computer Science Los Angeles, California xiaoxuns spaces changes. Adaptive A* [7] is a Cite as: Generalized Adaptive A*, Xiaoxun Sun, Sven Koenig

  12. Analysis of Potential Energy Saving and CO2 Emission Reduction of Home Appliances and Commercial Equipments in China

    SciTech Connect (OSTI)

    Zhou, Nan; Fridley, David; McNeill, Michael; Zheng, Nina; Letschert, Virginie; Ke, Jing; Saheb, Yamina

    2010-06-07

    China is now the world's largest producer and consumer of household appliances and commercial equipment. To address the growth of electricity use of the appliances, China has implemented a series of minimum energy performance standards (MEPS) for 30 appliances, and voluntary energy efficiency label for 40 products. Further, in 2005, China started a mandatory energy information label that covers 19 products to date. However, the impact of these standard and labeling programs and their savings potential has not been evaluated on a consistent basis. This research involved modeling to estimate the energy saving and CO{sub 2} emission reduction potential of the appliances standard and labeling program for products for which standards are currently in place, or under development and those proposed for development in 2010. Two scenarios that have been developed differ primarily in the pace and stringency of MEPS development. The 'Continued Improvement Scenario' (CIS) reflects the likely pace of post-2009 MEPS revisions, and the likely improvement at each revision step considering the technical limitation of the technology. The 'Best Practice Scenario' (BPS) examined the potential of an achievement of international best practice MEPS in 2014. This paper concludes that under the 'CIS' of regularly scheduled MEPS revisions to 2030, cumulative electricity consumption could be reduced by 9503 TWh, and annual CO{sub 2} emissions would be 16% lower than in the frozen efficiency scenario. Under a 'BPS' scenario for a subset of products, cumulative electricity savings would be 5450 TWh and annual CO{sub 2} emissions reduction would be 35% lower than in the frozen scenario.

  13. TOWARD HIGHLY SECURE AND AUTONOMIC COMPUTING SYSTEMS: A HIERARCHICAL APPROACH

    SciTech Connect (OSTI)

    Lee, Hsien-Hsin S

    2010-05-11

    The overall objective of this research project is to develop novel architectural techniques as well as system software to achieve a highly secure and intrusion-tolerant computing system. Such system will be autonomous, self-adapting, introspective, with self-healing capability under the circumstances of improper operations, abnormal workloads, and malicious attacks. The scope of this research includes: (1) System-wide, unified introspection techniques for autonomic systems, (2) Secure information-flow microarchitecture, (3) Memory-centric security architecture, (4) Authentication control and its implication to security, (5) Digital right management, (5) Microarchitectural denial-of-service attacks on shared resources. During the period of the project, we developed several architectural techniques and system software for achieving a robust, secure, and reliable computing system toward our goal.

  14. Augmentation of adaptation data 

    E-Print Network [OSTI]

    Vipperla, Ravi Chander; Renals, Steve; Frankel, Joe

    2010-01-01

    Linear regression based speaker adaptation approaches can improve Automatic Speech Recognition (ASR) accuracy significantly for a target speaker. However, when the available adaptation data is limited to a few seconds, the ...

  15. CS2SAT: THE CONTROL SYSTEMS CYBER SECURITY SELF-ASSESSMENT TOOL

    SciTech Connect (OSTI)

    Kathleen A. Lee

    2008-01-01

    The Department of Homeland Security National Cyber Security Division has developed the Control System Cyber Security Self-Assessment Tool (CS2SAT) that provides users with a systematic and repeatable approach for assessing the cyber-security posture of their industrial control system networks. The CS2SAT was developed by cyber security experts from Department of Energy National Laboratories and with assistance from the National Institute of Standards and Technology. The CS2SAT is a desktop software tool that guides users through a step-by-step process to collect facility-specific control system information and then makes appropriate recommendations for improving the system’s cyber-security posture. The CS2SAT provides recommendations from a database of industry available cyber-security practices, which have been adapted specifically for application to industry control system networks and components. Each recommendation is linked to a set of actions that can be applied to remediate-specific security vulnerabilities.

  16. Analysis of Potential Energy Saving and CO2 Emission Reduction of Home Appliances and Commercial Equipments in China

    SciTech Connect (OSTI)

    Zhou, Nan; Fridley, David; McNeil, Michael; Zheng, Nina; Letschert, Virginie; Ke, Jing

    2011-04-01

    China has implemented a series of minimum energy performance standards (MEPS) for over 30 appliances, voluntary energy efficiency label for 40 products and a mandatory energy information label that covers 19 products to date. However, the impact of these programs and their savings potential has not been evaluated on a consistent basis. This paper uses modeling to estimate the energy saving and CO{sub 2} emission reduction potential of the appliances standard and labeling program for products for which standards are currently in place, under development or those proposed for development in 2010 under three scenarios that differ in the pace and stringency of MEPS development. In addition to a baseline 'Frozen Efficiency' scenario at 2009 MEPS level, the 'Continued Improvement Scenario' (CIS) reflects the likely pace of post-2009 MEPS revisions, and the likely improvement at each revision step. The 'Best Practice Scenario' (BPS) examined the potential of an achievement of international best practice efficiency in broad commercial use today in 2014. This paper concludes that under 'CIS', cumulative electricity consumption could be reduced by 9503 TWh, and annual CO{sub 2} emissions of energy used for all 37 products would be 16% lower than in the frozen efficiency scenario. Under a 'BPS' scenario for a subset of products, cumulative electricity savings would be 5450 TWh and annual CO{sub 2} emissions reduction of energy used for 11 appliances would be 35% lower.

  17. NATURAL GAS VARIABILITY IN CALIFORNIA: ENVIRONMENTAL IMPACTS AND DEVICE PERFORMANCE EXPERIMENTAL EVALUATION OF POLLUTANT EMISSIONS FROM RESIDENTIAL APPLIANCES

    SciTech Connect (OSTI)

    Singer, Brett C.; Apte, Michael G.; Black, Douglas R.; Hotchi, Toshifumi; Lucas, Donald; Lunden, Melissa M.; Mirer, Anna G.; Spears, Michael; Sullivan, Douglas P.

    2009-12-01

    The effect of liquefied natural gas on pollutant emissions was evaluated experimentally with used and new appliances in the laboratory and with appliances installed in residences, targeting information gaps from previous studies. Burner selection targeted available technologies that are projected to comprise the majority of installed appliances over the next decade. Experiments were conducted on 13 cooktop sets, 12 ovens, 5 broiler burners, 5 storage water heaters, 4 forced air furnaces, 1 wall furnace, and 6 tankless water heaters. Air-free concentrations and fuel-based emission factors were determined for carbon monoxide, nitrogen oxides, nitrogen dioxide, and the number of (predominantly ultrafine) particles over complete burns?including transient effects (device warm-up and intermittent firing of burners) following ignition--and during more stable end-of-burn conditions. Formaldehyde was measured over multi-burn cycles. The baseline fuel was Northern California line gas with Wobbe number (a measure of fuel energy delivery rate) of 1320-1340; test fuels had Wobbe numbers of roughly 1390 and 1420, and in some cases 1360. No ignition or operational problems were observed during test fuel use. Baseline emissions varied widely across and within burner groups and with burner operational mode. Statistically significant emissions changes were observed for some pollutants on some burners.

  18. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W.

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  19. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  20. Distributed, Secure Load Balancing with Skew, Heterogeneity, and Churn

    E-Print Network [OSTI]

    Distributed, Secure Load Balancing with Skew, Heterogeneity, and Churn Jonathan Ledlie and Margo rates of node join and leave (churn), and wide variation in node network and storage capacity be heavy-tailed, and because node availability and churn rates may change over time. Learning to adapt

  1. Impacts of China's Current Appliance Standards and LabelingProgram to 2020

    SciTech Connect (OSTI)

    Fridley, David; Aden, Nathaniel; Zhou, Nan; Lin, Jiang

    2007-03-03

    The report summarizes the history and nature of China sstandardsand labeling program in the Introduction in Section 1. Trends indomestic production, exports, penetration rates, unit energy consumptionand the history of S&L technical levels by product are discussed ingreat detail in Section 2. The national energy impactsanalysis found inSection 3 concludes that overall China s standards and labeling programsreduce total electricity consumption in 2020 by an annual 106 TWh, or 16percent of what would otherwise been expected in that year in the absenceof standards and labeling programs.In total, the report concludes thatthe S&L programs currently in place in China are expected to save acumulative 1143 TWh by 2020, or 9 percent of the cumulative consumptionof residential electricity to that year. In 2020 alone, annual savingsare expected to be equivalent to 11 percent of residential electricityuse. In average generation terms, this is equivalent to 27 1-GW coalfired plants that would have required around 75 million tonnes of coal tooperate.In comparison, savings from the US appliance standards programalone is expected to save 10 percent of residential electricityconsumption in 2020.

  2. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security.cuny.edu Published: November 2014 Holiday Season Phishing Scams and Malware Campaigns CUNY/CIS Information Security.cuny.edu under "CUNY Issued Security Advisories" Visit the Federal Trade Commission's Consumer Information page

  3. INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY

    E-Print Network [OSTI]

    Subramanian, Sriram

    - 1 ­ INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable ­ INFORMATION SECURITY POLICY.doc Introduction Why Information Security? The access, availability

  4. GAANN -Computer Systems Security GAANN Computer Systems Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important is critical October 7, 2009 GAANN ­ Computer Systems Security 1 #12;GAANN - Computer Systems Security

  5. Federated Cloud Security Architecture for Secure and Agile Clouds

    E-Print Network [OSTI]

    Xu, Shouhuai

    Federated Cloud Security Architecture for Secure and Agile Clouds Weiliang Luo, Li Xu, Zhenxin Zhan. This chapter introduces the novel federated cloud security architecture that includes proactive cloud defense technologies for secure and agile cloud development. The federated security architecture consists of a set

  6. Where computer security meets national security1 Helen Nissenbaum

    E-Print Network [OSTI]

    Nissenbaum, Helen

    of International Relations. Key words: cyber-security, computer security, securitization Introduction OverWhere computer security meets national security1 Helen Nissenbaum Department of Culture conceptions of security in contemporary concerns over the vulnerability of computers and networks to hostile

  7. Towards Secure Information Sharing Models for Community Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu, Ram Krishnan and Gregory B. White Institute for Cyber Security University of Texas at San Antonio #12;Secure Information ­ Security mechanisms such as authentication, cryptography, trusted hardware, etc. #12;Community Cyber

  8. An Adaptive Approach to Energy Security and Assurance

    SciTech Connect (OSTI)

    Naqvi, Dr. Waseem; Fernandez, Steven J

    2009-01-01

    The North American power network has been called the world s largest, most complex machine. This network represents an enormous continent-wide investment, including over 15,000 generators in 10,000 power plants, and miles of transmission lines, distribution networks, and control systems. It has long been recognized that existing power-delivery systems are vulnerable to natural disasters and adversarial attack. The next generation of control systems must simultaneously protect against these disruptions while integrating new generation sources and maintaining active, automated control of the grid. The grid s interconnectedness needed to provide smart grid control also increases its vulnerability to interconnect-wide disruptions that are initiated locally. While strong centralized control is essential to reliable operations, this control requires multiple, high-data-rate, two-way communication links, a powerful central computing facility, and an elaborate operation-control center, all of which present vulnerabilities. It is clearly impossible to completely protect such a widespread and complex system. The key to maintaining the integrity of this network lies in the ability to identify its critical elements and to then effectively protect these elements. This identification and targeted protection will enable parts of the network to remain operational and even automatically reconfigure in the event of local failures or threats of failure, providing dependable continuity of service. The bold concept proposed here is the communication, predictive models and fast controls that eliminate the need to protect all components from emergent contingencies, but to reconfigure actively to maintain critical functions. The transformation from laboratory applications to larger than micro grid areas will require the next generation of energy technologies.

  9. Adapting technology to keep the national infrastructure safe and secure

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsicloudden DocumentationAccommodationsRegister / Vol. 72, No. 39Washington |AdamAdam

  10. Implementing Advances in Transport Security Technologies | Department...

    Office of Environmental Management (EM)

    Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies More...

  11. Cyber Security & Smart Grid 

    E-Print Network [OSTI]

    Shapiro, J.

    2011-01-01

    and interoperability ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Vulnerabilities In The Legacy Power Grid ? SCADA Security ? Supervisory Control and Data Acquisition (SCADA) systems are used extensively to control and monitor the national... & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart Grid Networks...

  12. Supervisory Industrial Security Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as the Deputy Assistant Manager for Safeguards, Security, and Emergency Management sharing the overall responsibility for execution of the...

  13. Oil Security Metrics Model

    SciTech Connect (OSTI)

    Greene, David L.; Leiby, Paul N.

    2005-03-06

    A presentation to the IWG GPRA USDOE, March 6, 2005, Washington, DC. OSMM estimates oil security benefits of changes in the U.S. oil market.

  14. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  15. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:www.nnsa.energy.govaboutusourprogramsnuclearsecurity

  16. Natlonal Nuclear Security Admlnlstratlon

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Natlonal Nuclear Security Admlnlstratlon Washington, DC 20585 January 18, 2007 OFFICE OF THE ADMINISTRATOR MEMORANDUM FOR The Deputy Secretary FROM: SUBJECT: Linton F. Brooks...

  17. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Washington, DC 20585 MEMORANDUM FOR THE ADMINISTRATOR FROM: THEODORE D. SHERRY II 4 flA. * -. SUBJECT: REFERENCE: NATIONAL SECURITY ENTI's'E FIELD COUNCIL CHAIR ACTION:...

  18. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    30 nonprofit organizations to receive monetary donations from Los Alamos National Security, LLC June 25, 2012 Recognizing employee and retiree volunteer efforts LOS ALAMOS, NEW...

  19. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01

    Information and communication systems’ securityTrust: An Element of Information Security,” in Security andInternational Journal of Information Security, vol. 4, pp.

  20. August 2003 IT SECURITY METRICS

    E-Print Network [OSTI]

    August 2003 IT SECURITY METRICS Elizabeth B. Lennon, Editor Information Technology Laboratory approach to measuring information security. Evaluating security at the sys tem level, IT security metrics and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

  1. Cloud Security by Max Garvey

    E-Print Network [OSTI]

    Tolmach, Andrew

    Cloud Security Survey by Max Garvey #12;Cloudy Cloud is Cloudy What is the cloud? On Demand Service, performance SECaaS - Cloud hosted security measures Certifications - measurements for cloud security. #12;Cloud Questions If you have $0 security budget, could cloud be a security improvement? Who owns the data

  2. Security Division 2007 Annual Report

    E-Print Network [OSTI]

    research programs. These programs, which include Cyber Security, Pervasive Information TechnologiesComputer Security Division 2007 Annual Report #12;TAble of ConTenTS Welcome Division Organization The Computer Security Division Responds to the Federal Information Security Management Act of 2002 Security

  3. 2014 Headquarters Facilities Master Security Plan- Chapter 1, Physical Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security Describes DOE Headquarters Physical Security procedures related to badges, inspections, access controls, visitor controls, and removal of government property.

  4. Headquarters Facilities Master Security Plan - Chapter 10, Security...

    Office of Environmental Management (EM)

    be completed each year by all those who hold a security clearance; and the Security Termination Briefing, which is conducted when a person no longer requires a security clearance....

  5. A Global Review of Incentive Programs to Accelerate Energy-Efficient Appliances and Equipment

    SciTech Connect (OSTI)

    de la Rue du Can, Stephane; Phadke, Amol; Leventis, Greg; Gopal, Anand

    2013-08-01

    Incentive programs are an essential policy tool to move the market toward energy-efficient products. They offer a favorable complement to mandatory standards and labeling policies by accelerating the market penetration of energy-efficient products above equipment standard requirements and by preparing the market for increased future mandatory requirements. They sway purchase decisions and in some cases production decisions and retail stocking decisions toward energy-efficient products. Incentive programs are structured according to their regulatory environment, the way they are financed, by how the incentive is targeted, and by who administers them. This report categorizes the main elements of incentive programs, using case studies from the Major Economies Forum to illustrate their characteristics. To inform future policy and program design, it seeks to recognize design advantages and disadvantages through a qualitative overview of the variety of programs in use around the globe. Examples range from rebate programs administered by utilities under an Energy-Efficiency Resource Standards (EERS) regulatory framework (California, USA) to the distribution of Eco-Points that reward customers for buying efficient appliances under a government recovery program (Japan). We found that evaluations have demonstrated that financial incentives programs have greater impact when they target highly efficient technologies that have a small market share. We also found that the benefits and drawbacks of different program design aspects depend on the market barriers addressed, the target equipment, and the local market context and that no program design surpasses the others. The key to successful program design and implementation is a thorough understanding of the market and effective identification of the most important local factors hindering the penetration of energy-efficient technologies.

  6. Max Tech Appliance Design: Potential for Maximizing U.S. Energy Savings through Standards

    SciTech Connect (OSTI)

    Garbesi, Karina; Desroches, Louis-Benoit; Bolduc, Christopher; Burch, Gabriel; Hosseinzadeh, Griffin; Saltiel, Seth

    2011-05-06

    This study surveyed the technical potential for efficiency improvements in 150 categories of appliances and equipment representing 33 quads of primary energy use across the US economy in 2010 and (1) documented efficient product designs, (2) identified the most promising cross-cutting strategies, and (3) ranked national energy savings potential by end use. Savings were estimated using a method modeled after US Department of Energy priority-setting reports - simplified versions of the full technical and economic analyses performed for rulemakings. This study demonstrates that large savings are possible by replacing products at the end-of-life with ultra-efficient models that use existing technology. Replacing the 50 top energy-saving end-uses (constituting 30 quads of primary energy consumption in 2010) with today's best-on-market equivalents would save {approx}200 quads of US primary energy over 30 years (25% of consumption anticipated there from). For the 29 products for maximum feasible savings potential could be estimated, the savings were twice as high. These results demonstrate that pushing ultra-efficient products to market could significantly escalate carbon emission reductions and is a viable strategy for sustaining large emissions reductions through standards. The results of this analysis were used by DOE for new coverage prioritization, to identify key opportunities for product prototyping and market development, and will leverage future standards rulemakings by identifying the full scope of maximum feasible technology options. High leverage products include advances lighting systems, HVAC, and televisions. High leverage technologies include electronic lighting, heat pumps, variable speed motors, and a host of controls-related technologies.

  7. The Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure Computing Corporation

    E-Print Network [OSTI]

    Andersen, Dave

    Computing Corporation Stephen Smalley, Peter Loscocco National Security Agency Mike Hibler, David AndersenThe Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure be flexible in their support for security policies, providing sufficient mechanisms for supporting the wide

  8. Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you not findGeoscience/EnvironmentGlobal Security Global Security We

  9. Security Cases | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Cases Security Cases RSS June 19, 2015 PSH-15-0011 - In the Matter of Personnel Security Hearing On June 19, 2015, an OHA Administrative Judge (AJ) issued a decision in...

  10. Computer Security Incident Handling Guide

    E-Print Network [OSTI]

    Computer Security Incident Handling Guide Recommendationsof the National Institute of Standards Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD Tom Millar United States Computer Emergency Readiness Team National Cyber Security Division

  11. Security Policy: Radio Network Controller

    E-Print Network [OSTI]

    Security Policy: Radio Network Controller Encryption Module Controller (RNC EMC) Cryptographic, 2007 Security Policy: RNC EMC Page 1 of 22 #12;Security Policy: RNC EMC Page 2 of 22 #12;Table...........................................................14 7. IDENTIFICATION AND AUTHENTICATION POLICY

  12. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  13. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  14. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND 2012-1670P Ensuring the Safe Containment

  15. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear

  16. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  17. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Supersedes DOE P 470.1.

  18. CIOs Uncensored: Security Smarts.

    SciTech Connect (OSTI)

    Johnson, Gerald R.

    2008-02-25

    This commentary for the CIOs Uncensored section of InformationWeek will discuss PNNL’s “defense in depth” approach to cyber security. It will cover external and internal safeguards, as well as the all-important role of employees in the cyber security equation. For employees are your greatest vulnerability – and your last line of defense.

  19. Engineering secure software 

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01

    -the-fact fixes in the form of software patches. The root causes for security problems in software are explored. A survey of research attempts at engineering secure software is presented. The techniques discussed range from those that are very similar...

  20. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  1. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Energy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W the computational, physics

  2. Household`s choices of efficiency levels for appliances: Using stated- and revealed-preference data to identify the importance of rebates and financing arrangements

    SciTech Connect (OSTI)

    Train, K.; Atherton, T.

    1994-11-01

    We examine customers` choice between standard and high-efficiency equipment, and the impact of utility incentives such as rebates and loans on this decision. Using data from interviews with 400 households, we identify the factors that customers consider in their choice of efficiency level for appliances and the relative importance of these factors. We build a model that describes customers` choices and can be used to predict choices in future situations under changes in the attributes of appliances and in the utility`s DSM and as part of the appliance-choice component of utilities` end-use forecasting systems. As examples, the model is used to predict the impacts of: doubling the size of rebates, replacing rebates with financing programs, and offering loans and rebates as alternative options for customers.

  3. On the secure obfuscation of deterministic finite automata.

    SciTech Connect (OSTI)

    Anderson, William Erik

    2008-06-01

    In this paper, we show how to construct secure obfuscation for Deterministic Finite Automata, assuming non-uniformly strong one-way functions exist. We revisit the software protection approaches originally proposed by [5, 10, 12, 17] and revise them to the current obfuscation setting of Barak et al. [2]. Under this model, we introduce an efficient oracle that retains some 'small' secret about the original program. Using this secret, we can construct an obfuscator and two-party protocol that securely obfuscates Deterministic Finite Automata against malicious adversaries. The security of this model retains the strong 'virtual black box' property originally proposed in [2] while incorporating the stronger condition of dependent auxiliary inputs in [15]. Additionally, we show that our techniques remain secure under concurrent self-composition with adaptive inputs and that Turing machines are obfuscatable under this model.

  4. International Nuclear Security

    SciTech Connect (OSTI)

    Doyle, James E.

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  5. Smart-Grid Security Issues

    SciTech Connect (OSTI)

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  6. Secure Virtualization with Formal Methods

    E-Print Network [OSTI]

    Sturton, Cynthia

    2013-01-01

    cloud computing, virtualization software has a variety of security-cloud computing, researchers have proposed using system virtualization software as a platform to increase the security

  7. Program Areas | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Organizations National Security Home | Science & Discovery | National Security | Program Areas SHARE Program Areas image Oak Ridge National Laboratory (ORNL) has a robust...

  8. Office of Secure Transportation Activities

    Office of Environmental Management (EM)

    6th, 2012 WIPP Knoxville, TN OFFICE OF SECURE TRANSPORTATION Agency Integration Briefing Our Mission To provide safe and secure ground and air transportation of nuclear weapons,...

  9. Security Rulemaking | Department of Energy

    Office of Environmental Management (EM)

    Activities Transportation Security Rulemaking Activities at the U.S. Nuclear Regulatory Commission NRC Transportation Security (Part 73 SNF Update and Part 37 Category 1...

  10. National Nuclear Security Administration Overview

    Office of Environmental Management (EM)

    May 11, 2011 Ahmad Al-Daouk Manager, National Security Department (NSD) National Nuclear Security Administration (NNSA) Service Center - Albuquerque, NM May 11, 2011 - Page 2...

  11. Engineering Adaptive Web Applications

    E-Print Network [OSTI]

    Dolog, Peter

    Engineering Adaptive Web Applications Von Fakultät für Elektrotechnik und Informatik der Peter Dolog Engineering Adaptive Web Applications Dr. rer. nat. Dissertation 2006 #12;#12;Zusammenfassung: Nutzer von Web-Anwendungen stammen sich aus verschiedensten Nut- zergruppen, die sich in ihrem

  12. III International Climate Change Adaptation Adaptation Futures 2014

    E-Print Network [OSTI]

    1 III International Climate Change Adaptation Conference Adaptation Futures 2014 12-16 Maio 2014 sucesso da primeira conferęncia Climate Adaptation Futures realizada em Queensland, Austrália, em 2010 e

  13. On Building Secure SCADA Systems using Security Eduardo B. Fernandez

    E-Print Network [OSTI]

    Wu, Jie

    On Building Secure SCADA Systems using Security Patterns Eduardo B. Fernandez Dept. of Comp. Sci, also known as the supervisory, control, and data acquisition (SCADA) system. On the other hand systems. This paper aims to propose methods to build a secure SCADA system using security patterns

  14. INSTITUTE FOR CYBER SECURITY Application-Centric Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Dr. Robert W. Gracy Vice President

  15. INSTITUTE FOR CYBER SECURITY Application-Centric Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

  16. Towards Secure Information Sharing Models for Community Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu Dept. of Computer Science Institute for Cyber Security University of Texas at San Antonio Email: ravi.sandhu@utsa.edu Ram Krishnan Dept. of Electrical and Computer Engineering Institute for Cyber Security University

  17. INSTITUTE FOR CYBER SECURITY Application-Centric Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio June 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Dr. Robert W. Gracy Vice President

  18. 1Computer Security Shambhu Upadhyaya Cyber Security @CEISARE

    E-Print Network [OSTI]

    Upadhyaya, Shambhu

    , there are 100+ centers ­ Based on curriculum mapping to CNSS (committee of National Security Standards) 4011 at Google (2010) · Threats to national security ­ Insider attacks ­ Examples: Bradley Manning leaked1Computer Security Shambhu Upadhyaya Cyber Security @CEISARE Professor S. Upadhyaya Department

  19. A SECURE EUROPE IN A BETTER WORLD EUROPEAN SECURITY STRATEGY

    E-Print Network [OSTI]

    Sussex, University of

    EN A SECURE EUROPE IN A BETTER WORLD EUROPEAN SECURITY STRATEGY Brussels, 12 December 2003 #12;1 EN's complex problems on its own Introduction Europe has never been so prosperous, so secure nor so free problems on its own. Europe still faces security threats and challenges. The outbreak of conflict

  20. SecuritySmart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D mSecurity SecuritySecuritySmart

  1. 2014 Headquarters Facilities Master Security Plan- Chapter 8, Operations Security Program

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program Describes the DOE Headquarters Operations Security (OPSEC) Program.

  2. 2014 Headquarters Facilities Master Security Plan- Chapter 10, Security Awareness Program

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program Describes the DOE Headquarters Security Awareness Program

  3. BROADER National Security Missions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Metal Chips (U) Uranium Trioxide (UO 3 ) UO 2 (NO 3 ) 2 Ur anyl Nitrate Ammonium Uranyl Carbonate (NH 4 ) 2 UO 2 (CO 3 ) 4 DEVELOP NEW NATIONAL SECURITY MISSIONS Y-12 has...

  4. AMALGAMATED SECURITY COMMUNITIES

    E-Print Network [OSTI]

    Harvey, Andrew Stephen

    2011-08-31

    This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

  5. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-25

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  6. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-01-22

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  7. Operations Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-04-30

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  8. ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1

    E-Print Network [OSTI]

    Su, Xiao

    ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1 Information................................................................................................................................................................................3 Information Security Policy...............................................................................................................................................4 Information Security Policy Management

  9. Policy Paper 35: Energy and Security in Northeast Asia: Fueling Security

    E-Print Network [OSTI]

    Calder, Kent; Fesharaki, Fereidun; Shirk, Susan L.; Stankiewicz, Michael

    1998-01-01

    Deese (editors). Energy and Security. 3. Fereidun Fesharaki,Energy and Security in Northeast Asia: Fueling Security Anrising energy demand. Energy and Security in Northeast Asia

  10. Secure Quantum Key Distribution

    E-Print Network [OSTI]

    Hoi-Kwong Lo; Marcos Curty; Kiyoshi Tamaki

    2015-05-20

    Secure communication plays a crucial role in the Internet Age. Quantum mechanics may revolutionise cryptography as we know it today. In this Review Article, we introduce the motivation and the current state of the art of research in quantum cryptography. In particular, we discuss the present security model together with its assumptions, strengths and weaknesses. After a brief introduction to recent experimental progress and challenges, we survey the latest developments in quantum hacking and counter-measures against it.

  11. Incidents of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-17

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  12. Security systems engineering overview

    SciTech Connect (OSTI)

    Steele, B.J.

    1996-12-31

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).

  13. Climate Change Adaptation

    Broader source: Energy.gov [DOE]

    DOE is adapting to climate change by applying a risk-based resiliency approach to identify and minimize climate-related vulnerabilities across all DOE policies, programs and activities.

  14. Rethinking adaptive reuse

    E-Print Network [OSTI]

    Benardete, Emma A., 1973-

    2002-01-01

    Adaptive reuse of manufacturing plants in post-industrial countries has become an increasing trend. In the United States, evidence of our industrial past is present in both urban and rural landscapes. The appearance of ...

  15. Postmodern film adaptation 

    E-Print Network [OSTI]

    Brannon, Courtney Elizabeth

    2013-02-22

    Chapter one explores the reflexive nature of Stephen Daldry's The Hours (2002) as an adaptation from two previous novels: Virginia Woolf's Mrs. Dalloway and Michael Cunningham's The Hours. Through the motif of mirror images, the film consciously...

  16. Climate Change Adaptation Planning

    Office of Energy Efficiency and Renewable Energy (EERE)

    This course provides an introduction to planning for climate change impacts, with examples of tribes that have been going through the adaptation planning process. The course is intended for tribal...

  17. QoS-aware Deployment of Network of Virtual Appliances across Multiple Clouds Amir Vahid Dastjerdi, Saurabh Kumar Garg, and Rajkumar Buyya

    E-Print Network [OSTI]

    Buyya, Rajkumar

    , Department of Computer Science and Software Engineering, The University of Melbourne, Parkville, VIC 3010-based. They take into account Quality of Service (QoS) criteria such as reliability, data communication cost problems such as root privilege requirements and library dependencies, virtual appliance technology

  18. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or â?? tunnelsâ?ť, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

  19. Adaptive versus non-adaptive strategies for quantum channel discrimination

    E-Print Network [OSTI]

    Watrous, John

    Adaptive versus non-adaptive strategies for quantum channel discrimination Aram W. Harrow Avinatan-adaptive strategies for quantum channel discrimination. In particular, we give a pair of entanglement- breaking channels that can be perfectly discriminated by means of an adaptive strategy that re- quires just two

  20. Vehicle security apparatus and method

    DOE Patents [OSTI]

    Veligdan, James T. (Manorville, NY)

    1996-02-13

    A vehicle security apparatus for use in a motor vehicle, the apparatus comprising an optical key, a receptacle, a receiver and at least one optical fiber. The optical key has a transmitter having at least one first preprogrammed coded signal stored in a first electric circuit. The receptacle receives the optical key and at least one transmittable coded optical signal from the transmitter corresponding to the at least one preprogrammed coded signal stored in the first electric circuit. The receiver compares the at least one transmittable coded optical signal to at least one second preprogrammed coded signal stored in a second electric circuit and the receiver is adapted to trigger switching effects for at least one of enabling starting the motor vehicle and starting the motor vehicle upon determination that the at least one transmittable coded optical signal corresponds to the at least one second preprogrammed signal in the second electric circuit. The at least one optical fiber is operatively connected between the receptacle and the receiver for carrying the optical signal from the receptacle to the receiver. Also disclosed is a method for permitting only authorized use of a motor vehicle.

  1. Vehicle security apparatus and method

    DOE Patents [OSTI]

    Veligdan, J.T.

    1996-02-13

    A vehicle security apparatus for use in a motor vehicle is disclosed, the apparatus comprising an optical key, a receptacle, a receiver and at least one optical fiber. The optical key has a transmitter having at least one first preprogrammed coded signal stored in a first electric circuit. The receptacle receives the optical key and at least one transmittable coded optical signal from the transmitter corresponding to the at least one preprogrammed coded signal stored in the first electric circuit. The receiver compares the at least one transmittable coded optical signal to at least one second preprogrammed coded signal stored in a second electric circuit and the receiver is adapted to trigger switching effects for at least one of enabling starting the motor vehicle and starting the motor vehicle upon determination that the at least one transmittable coded optical signal corresponds to the at least one second preprogrammed signal in the second electric circuit. The at least one optical fiber is operatively connected between the receptacle and the receiver for carrying the optical signal from the receptacle to the receiver. Also disclosed is a method for permitting only authorized use of a motor vehicle. 7 figs.

  2. Energy-Efficiency Labels and Standards: A Guidebook forAppliances, Equipment, and Lighting - 2nd Edition

    SciTech Connect (OSTI)

    Wiel, Stephen; McMahon, James E.

    2005-04-28

    Energy-performance improvements in consumer products are an essential element in any government's portfolio of energy-efficiency and climate change mitigation programs. Governments need to develop balanced programs, both voluntary and regulatory, that remove cost-ineffective, energy-wasting products from the marketplace and stimulate the development of cost-effective, energy-efficient technology. Energy-efficiency labels and standards for appliances, equipment, and lighting products deserve to be among the first policy tools considered by a country's energy policy makers. The U.S. Agency for International Development (USAID) and several other organizations identified on the cover of this guidebook recognize the need to support policy makers in their efforts to implement energy-efficiency standards and labeling programs and have developed this guidebook, together with the Collaborative Labeling and Appliance Standards Program (CLASP), as a primary reference. This second edition of the guidebook was prepared over the course of the past year, four years after the preparation of the first edition, with a significant contribution from the authors and reviewers mentioned previously. Their diligent participation helps maintain this book as the international guidance tool it has become. The lead authors would like to thank the members of the Communications Office of the Environmental Energy Technologies Division, Lawrence Berkeley National Laboratory for their support in the development, production, and distribution of the guidebook. This guidebook is designed as a manual for government officials and others around the world responsible for developing, implementing, enforcing, monitoring, and maintaining labeling and standards setting programs. It discusses the pros and cons of adopting energy-efficiency labels and standards and describes the data, facilities, and institutional and human resources needed for these programs. It provides guidance on the design, development, implementation, maintenance, and evaluation of the programs and on the design of the labels and standards themselves. In addition, it directs the reader to references and other resources likely to be useful in conducting the activities described and includes a chapter on energy policies and programs that complement appliance efficiency labels and standards. This guidebook attempts to reflect the essential framework of labeling and standards programs. It is the intent of the authors and sponsor to distribute copies of this book worldwide, at no charge, for the general public benefit. The guidebook is also available on the web at www.clasponline.org and may be downloaded to be used intact or piecemeal for whatever beneficial purposes readers may conceive.

  3. IY5512: Part 1 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    IY5512: Part 1 1 Information Security Group IY5512 Computer Security Part 1: Introduction to computer security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security) ... 2 Information Security Group Agenda · Overview · Security goals · Security approaches ­ prevention

  4. Promoting India's development: energy security and climate security are convergent goals

    SciTech Connect (OSTI)

    Rajan, Gupta; Shankar, Harihar; Joshi, Sunjoy

    2009-01-01

    This paper investigates three aspects of the energy-climate challenges faced by India. First, we examine energy security in light of anticipated growth in power generation in response to the national goal of maintaining close to 10% growth in GDP. Second, we examine possible options for mitigation and adaptation to climate change for India that it can take to the coming Copenhagen meeting on climate change. Lastly, we introduce an open web based tool for analyzing and planning global energy systems called the Global Energy Observatory (GEO).

  5. Unconditionally Secure Quantum Signatures

    E-Print Network [OSTI]

    Ryan Amiri; Erika Andersson

    2015-08-08

    Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern communications. They allow for the exchange of messages from one sender to multiple recipients, with the guarantees that messages cannot be forged or tampered with and that messages also can be forwarded from one recipient to another without compromising their validity. Signatures are different from, but no less important than encryption, which ensures the privacy of a message. Commonly used signature protocols - signatures based on the Rivest-Adleman-Shamir (RSA) algorithm, the digital signature algorithm (DSA), and the elliptic curve digital signature algorithm (ECDSA) - are only computationally secure, similar to public key encryption methods. In fact, since these rely on the difficulty of finding discrete logarithms or factoring large primes, it is known that they will become completely insecure with the emergence of quantum computers. We may therefore see a shift towards signature protocols that will remain secure even in a post-quantum world. Ideally, such schemes would provide unconditional or information-theoretic security. In this paper, we aim to provide an accessible and comprehensive review of existing unconditionally secure signature schemes for signing classical messages, with a focus on unconditionally secure quantum signature schemes.

  6. Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDidDevelopment Top Scientific Impact Since its SearchSecurity

  7. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D m r345 UnlimitedSecure

  8. national security campus | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouthReporteeo | National Nuclear Securityhr | Nationalnational security

  9. Tag: security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorking With U.S. Coal StocksSuppliers Tag: Supplierssecurity Tag: security

  10. physical security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorkingLosThe 26thI D- 6 0 4 2 r m m m m port m fm f mphysical security |

  11. Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

    Office of Environmental Management (EM)

    4, Cyber Security Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2015 2015 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security...

  12. Some Thoughts on Teaching Secure Programming

    E-Print Network [OSTI]

    Bishop, Matt

    2013-01-01

    Teaching Context in Information Security,” ACM Journal onWorld Conference on Information Security Education pp. 23–Colloquium on Information Systems Security Education (CISSE)

  13. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01

    Analysis of Information Security Games, Proceedings of theon the Economics of Information Security WEIS’, Hanover, NH,on the Economics of Information Security’. Anderson, R. and

  14. Securities Class Actions and Bankrupt Companies

    E-Print Network [OSTI]

    Park, James J.

    2014-01-01

    the utility of securities class actions. Certainly, contextthe merit of securities class actions. UCLA | SCHOOL OF LAWof James J. Park, Securities Class Actions and Bankrupt

  15. Security enhanced with increased vehicle inspections

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security enhanced with increased vehicle inspections Security measures increase as of March: vehicle inspections won't delay traffic New increased security procedures meet LANL's...

  16. Review of digital image security in Dermatology

    E-Print Network [OSTI]

    Nielson, Colton; West, Cameron; Shimizu, Ikue

    2015-01-01

    encrypted communications, cloud security breaches, and phonebreaches in security demonstrate, such cloud storage ofand security rules 22 Audits of CSP data center operations and cloud

  17. Integrated Security System | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems architecture Integrated...

  18. Data security on the national fusion grid

    E-Print Network [OSTI]

    Burruss, Justine R.; Fredian, Tom W.; Thompson, Mary R.

    2005-01-01

    of any computational grid is security. Effective sharing oflike ITER. Keywords: security, FusionGrid, grid computing 1.A Security Architecture for Computational Grids,” Proc. 5th

  19. Security on the US Fusion Grid

    E-Print Network [OSTI]

    Burruss, Justin R.; Fredian, Tom W.; Thompson, Mary R.

    2005-01-01

    of any computational grid is security. Effective sharing oflike ITER. Keywords: security, FusionGrid, grid computing 1.A Security Architecture for Computational Grids,” Proc. 5th

  20. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01

    CERT. (2010, Dec) Technical Cyber Security Alerts. [Online].a broad overview of cyber security incidents in the laststrategic war and viable cyber security solutions should be

  1. Mathematical and Statistical Opportunities in Cyber Security

    E-Print Network [OSTI]

    Meza, Juan

    2009-01-01

    development approach to cyber security. Report submitted to2007. Committee on Improving Cyber- security Research in theOpportunities in Cyber Security ? Juan Meza † Scott

  2. Security and United States Immigration Policy

    E-Print Network [OSTI]

    Totten, Robbie James

    2012-01-01

    2009 [1981]. American National Security, 6th ed. Baltimore,1977. Economic Issues and National Security. Lawrence, KS:Immigration and National Security. Westport, CT: Praeger

  3. Office of Security Assessments | Department of Energy

    Energy Savers [EERE]

    Security Assessments Office of Security Assessments MISSION The Office of Security Assessments is responsible for the independent evaluation of the effectiveness of safeguards and...

  4. The use of negotiated agreements to improve efficiency of end-use appliances: First results from the European experience

    SciTech Connect (OSTI)

    Bertoldi, P.; Bowie, R.; Hagen, L.

    1998-07-01

    The European Union is pursuing measures to improve end-use equipment efficiency through a variety of policy instruments, in particular for domestic appliances. One of the most effective methods to achieve market transformation is through minimum efficiency performance standards (MEPS). However, after the difficulties and controversy following the adoption of legislation for MEPS for domestic refrigerators/freezers, a new policy instrument, i.e. negotiated agreements by manufacturers, has been investigated and tested for two type of appliances: domestic washing machines and TVs and VCRs. Based on the positive experience of the above two agreements, other products (e.g. dryers, dishwasher, electric water heaters, etc.) will be the subject of future negotiated agreements. Based on the results of the two negotiated agreements, this paper describes the energy efficiency potential, the procedures, and the advantages and disadvantages of negotiated agreements compared to legislated mandatory for MEPS, as developed in the European context. The paper concludes that negotiated agreements are a viable policy option, which allow flexibility in the implementation of the efficiency targets and therefore the adoption of cost-effective solutions for manufacturers. In addition, negotiated agreements can be implemented more quickly compared to mandatory MEPS and they allow a closer monitoring of the results. The main question asked in the paper is whether the negotiated agreements can deliver the results in the long term compared to what could be achieved through legislation. The European experience indicates that this instrument can deliver the results and that it offer a number of advantages compared to MEPS.

  5. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Broader source: Energy.gov (indexed) [DOE]

    A vulnerability was reported in Cisco Secure Access Control System. A remote user can change the passwords of arbitrary users. PLATFORM: Cisco Secure ACS versions 5.1 patch 3, 4,...

  6. AUDIT REPORT Security at the Nevada National Security Site

    Broader source: Energy.gov (indexed) [DOE]

    Security at the Nevada National Security Site OAS-L-15-06 May 2015 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections . Department of Energy...

  7. Security Requirements Engineering Support for Security-Annotated Business Processes

    E-Print Network [OSTI]

    Security Requirements Engineering Support for Security-Annotated Business Processes Elda Paja1 that business analysts are not secu- rity experts and assume that this will be bolted on later. Fortunately

  8. Savings Potential of ENERGY STAR(R) External Power Adapters andBattery Chargers

    SciTech Connect (OSTI)

    Webber, Carrie; Korn, David; Sanchez, Marla

    2007-02-28

    External power adapters may lose 10 to 70 percent of theenergy they consume, dissipated as heat rather than converted into usefulenergy. Battery charging systems have more avenues for losses: inaddition to power conversion losses, power is consumed by the chargingcircuitry, and additional power may be needed after the battery is fullcharged to balance self-discharge. In 2005, the Environmental ProtectionAgency launched a new ENERGY STAR(R) label for external power supplies(EPSs) that convert line-voltage AC electricity into low-voltage DCelectricity for certain electronic devices. The specification includedpower supplies for products with battery charging functions (e.g. laptopsand cell phones), but excluded others. In January 2006, a separatespecification was issued for battery charging systems contained primarilyin small household appliances and power tools. In addition to the ENERGYSTAR(R) label, the state of California will implement minimum energyperformance standards for EPSs in 2007, and similar standards for EPSsand battery chargers are in development at the national level.Many of theproducts covered by these policies use relatively little power and havemodest per-unit savings potential compared to conventional energyefficiency targets. But with an estimated 1.5 billion adapters and 230million battery charging systems in use in the United States, theaggregate savings potential is quite high. This paper presents estimatesof the savings potential for external power adapters and battery chargingsystems through 2025.

  9. Technical Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2015-09-02

    This order implements the Department of Energy (DOE) Technical Security Program (TSP). This program represents the convergence of two distinct disciplines: Counterintelligence (CI) and Security Countermeasures. The elements of the TSP are driven by national level, interagency programs that are codified in various laws, Executive Orders, national polices and directives. Supersedes DOE M 470.4-4A Chg 1, dated 10-12-2010, Section D – Technical Surveillance Countermeasures (Official Use Only) and classified annex (Secret); and DOE M 205.1-3 (Official Use Only) and Part II (Secret), dated 4-17-2006.

  10. Nevada National Security Site

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD |UpdatedSecurity|National

  11. Global Material Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia NationalSecurityNuclear SecurityOfficesPrograms

  12. Secure Storage Architectures

    SciTech Connect (OSTI)

    Aderholdt, Ferrol; Caldwell, Blake A; Hicks, Susan Elaine; Koch, Scott M; Naughton, III, Thomas J; Pogge, James R; Scott, Stephen L; Shipman, Galen M; Sorrillo, Lawrence

    2015-01-01

    The purpose of this report is to clarify the challenges associated with storage for secure enclaves. The major focus areas for the report are: - review of relevant parallel filesystem technologies to identify assets and gaps; - review of filesystem isolation/protection mechanisms, to include native filesystem capabilities and auxiliary/layered techniques; - definition of storage architectures that can be used for customizable compute enclaves (i.e., clarification of use-cases that must be supported for shared storage scenarios); - investigate vendor products related to secure storage. This study provides technical details on the storage and filesystem used for HPC with particular attention on elements that contribute to creating secure storage. We outline the pieces for a a shared storage architecture that balances protection and performance by leveraging the isolation capabilities available in filesystems and virtualization technologies to maintain the integrity of the data. Key Points: There are a few existing and in-progress protection features in Lustre related to secure storage, which are discussed in (Chapter 3.1). These include authentication capabilities like GSSAPI/Kerberos and the in-progress work for GSSAPI/Host-keys. The GPFS filesystem provides native support for encryption, which is not directly available in Lustre. Additionally, GPFS includes authentication/authorization mechanisms for inter-cluster sharing of filesystems (Chapter 3.2). The limitations of key importance for secure storage/filesystems are: (i) restricting sub-tree mounts for parallel filesystem (which is not directly supported in Lustre or GPFS), and (ii) segregation of hosts on the storage network and practical complications with dynamic additions to the storage network, e.g., LNET. A challenge for VM based use cases will be to provide efficient IO forwarding of the parallel filessytem from the host to the guest (VM). There are promising options like para-virtualized filesystems to help with this issue, which are a particular instances of the more general challenge of efficient host/guest IO that is the focus of interfaces like virtio. A collection of bridging technologies have been identified in Chapter 4, which can be helpful to overcome the limitations and challenges of supporting efficient storage for secure enclaves. The synthesis of native filesystem security mechanisms and bridging technologies led to an isolation-centric storage architecture that is proposed in Chapter 5, which leverages isolation mechanisms from different layers to facilitate secure storage for an enclave. Recommendations: The following highlights recommendations from the investigations done thus far. - The Lustre filesystem offers excellent performance but does not support some security related features, e.g., encryption, that are included in GPFS. If encryption is of paramount importance, then GPFS may be a more suitable choice. - There are several possible Lustre related enhancements that may provide functionality of use for secure-enclaves. However, since these features are not currently integrated, the use of Lustre as a secure storage system may require more direct involvement (support). (*The network that connects the storage subsystem and users, e.g., Lustre s LNET.) - The use of OpenStack with GPFS will be more streamlined than with Lustre, as there are available drivers for GPFS. - The Manilla project offers Filesystem as a Service for OpenStack and is worth further investigation. Manilla has some support for GPFS. - The proposed Lustre enhancement of Dynamic-LNET should be further investigated to provide more dynamic changes to the storage network which could be used to isolate hosts and their tenants. - The Linux namespaces offer a good solution for creating efficient restrictions to shared HPC filesystems. However, we still need to conduct a thorough round of storage/filesystem benchmarks. - Vendor products should be more closely reviewed, possibly to include evaluation of performance/protection of select products. (Note, we are investigation the opti

  13. SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011

    E-Print Network [OSTI]

    SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011 Choose brands and models of mobile devices that have the options referenced below. Use all available security options that your or sensitive university information in un-approved off-campus services, such as public cloud based services

  14. Wireless Security: Secure and Public Networks Villanova University

    E-Print Network [OSTI]

    36 Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer Science kory.kirk@villanova.edu www.korykirk.com/ Abstract Due to the increasing amount of wireless, train stations and cafes, there is a need for a wireless protocol that allows public access to secure

  15. ISSUANCE 2015-08-19: Appliance Standards and Rulemaking Federal Advisory Committee: Notice of Intent to Establish the Dedicated Purpose Pool Pumps Working Group to Negotiate a Notice of Proposed Rulemaking (NOPR) for Energy Conservation Standards

    Broader source: Energy.gov [DOE]

    Appliance Standards and Rulemaking Federal Advisory Committee: Notice of Intent to Establish the Dedicated Purpose Pool Pumps Working Group to Negotiate a Notice of Proposed Rulemaking (NOPR) for Energy Conservation Standards

  16. NISTIR 7497 Security Architecture Design

    E-Print Network [OSTI]

    NISTIR 7497 Security Architecture Design Process for Health Information Exchanges (HIEs) Matthew Scholl Kevin Stine Kenneth Lin Daniel Steinberg #12;NISTIR 7497 Security Architecture Design Process Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899 Kenneth Lin

  17. Departmental Personnel Security- Clearance Automation

    Broader source: Energy.gov [DOE]

    The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

  18. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  19. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

  20. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  1. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  2. Research Data Data Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    Research Data Data Security Survey Collection FAQs Q: I am not a UConn Health Center employee; can multiple projects that share common data? Yes. As long as the projects have common fields as you would in SurveyMonkey; data forms, e.g. Case Report Forms (CRF); or a combination of both. For any

  3. Transmission Line Security Monitor

    ScienceCinema (OSTI)

    None

    2013-05-28

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  4. ARMY Energy Security Considerations

    E-Print Network [OSTI]

    energy waste in existing facilities; Increase energy efficiency in renovation and new constructionARMY Energy Security Considerations Don Juhasz, PE, CEM HQDA, OACSIM, DAIM-FDF Telephone: (703-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 Army Energy · · · · FOREIGN OIL 2

  5. National Security System Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-03-08

    The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

  6. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

  7. Transmission Line Security Monitor

    SciTech Connect (OSTI)

    2011-01-01

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  8. Metaphors for cyber security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  9. Safeguards and Security Program References

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

  10. Supporting Organizations | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the following three organizations: Measurement Science and Systems Engineering Division Nuclear Security and Isotope Technology Division Computational Sciences and Engineering...

  11. Protocol, Security Assistance- January 2007

    Broader source: Energy.gov [DOE]

    Provide timely technical assistance and system support to Field and HQ Elements to enhance site safeguards and security.

  12. Critical Infrastructure and Cyber Security 

    E-Print Network [OSTI]

    Doll, Abby; Pirrong, Renee; Jennings, Matthew; Stasny, George; Giblin, Andy; Shaffer, Steph; Anderson, Aimee

    2011-01-01

    cyber security. They designated responsibility for cyber-security to the newly formed Department of Homeland Security, a duty that has continued to today 3. The group was tasked with creating a method of protecting the critical components.... 2010. 15 Mar. 2011. http://www.d tic.mil/doctrine/new_pubs/jp1_02.pdf 10 Comments on the Economic and Security Implications Of Recent Developments in the World Oil Market , 107th Cong. (2000) (testimony of Robert E. Ebel). http...

  13. Safeguard Security and Awareness Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-10-02

    Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

  14. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

  15. INFORMATION SECURITY University Policy No: IM7800

    E-Print Network [OSTI]

    Victoria, University of

    Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

  16. Future of Access Control: Attributes, Automation, Adaptation

    E-Print Network [OSTI]

    Sandhu, Ravi

    , Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber Security University of Texas at San Security 1 #12;The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber Security University of Texas

  17. Adaptation and adaptability : expectant design for resilience in coastal urbanity

    E-Print Network [OSTI]

    Ruskeepää, Laura A. Delaney (Laura Ashley Delaney)

    2011-01-01

    What is the nature of and possibility for urban resiliency through adaptation? Adaptation implies responsiveness to phenomena that are disruptive to a system's functioning; it is a willful evolution in response to changed ...

  18. CONTRIBUTED Adaptive Stochastic Control

    E-Print Network [OSTI]

    Powell, Warren B.

    sources, many forms of energy storage, and microgrid management (see Fig. 1). Computationally, controlling that are extremely close to optimal. We then address the problem of energy storage (e.g., in a large batteryCONTRIBUTED P A P E R Adaptive Stochastic Control for the Smart Grid The main theme of this paper

  19. Adaptive parallel computing with

    E-Print Network [OSTI]

    Pernet, Clément

    was prototyped #12;Urbana / dec 2009 9 C++ Elision struct Fibonacci { void operator()( int n, a1::Shared_wint1, a1::Shared_rint> sr2 ) { result.write( sr1.read() + sr2.read() ); } } #12;Urbana / dec 2009 10 C;Urbana / dec 2009 3 ·To mutually adapt application and scheduling · Extension to target GPU & MPSoC Kaapi

  20. Adaptive sequential controller

    DOE Patents [OSTI]

    El-Sharkawi, Mohamed A. (Renton, WA); Xing, Jian (Seattle, WA); Butler, Nicholas G. (Newberg, OR); Rodriguez, Alonso (Pasadena, CA)

    1994-01-01

    An adaptive sequential controller (50/50') for controlling a circuit breaker (52) or other switching device to substantially eliminate transients on a distribution line caused by closing and opening the circuit breaker. The device adaptively compensates for changes in the response time of the circuit breaker due to aging and environmental effects. A potential transformer (70) provides a reference signal corresponding to the zero crossing of the voltage waveform, and a phase shift comparator circuit (96) compares the reference signal to the time at which any transient was produced when the circuit breaker closed, producing a signal indicative of the adaptive adjustment that should be made. Similarly, in controlling the opening of the circuit breaker, a current transformer (88) provides a reference signal that is compared against the time at which any transient is detected when the circuit breaker last opened. An adaptive adjustment circuit (102) produces a compensation time that is appropriately modified to account for changes in the circuit breaker response, including the effect of ambient conditions and aging. When next opened or closed, the circuit breaker is activated at an appropriately compensated time, so that it closes when the voltage crosses zero and opens when the current crosses zero, minimizing any transients on the distribution line. Phase angle can be used to control the opening of the circuit breaker relative to the reference signal provided by the potential transformer.

  1. Information Technology Security Assessment Framework

    E-Print Network [OSTI]

    Federal Information Technology Security Assessment Framework November 28, 2000 Prepared (NIST) Computer Security Division #12;Overview Information and the systems that process it are among and maintain a program to adequately secure its information and system assets. Agency programs must: 1) assure

  2. January 2005 INTEGRATING IT SECURITY

    E-Print Network [OSTI]

    in a cost- effective manner. The implementation of IT security and capital planning practices withinJanuary 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS released Special Publication (SP) 800-65, Inte grating IT Security into the Capital Planning and Investment

  3. Guidelines on Security and Privacy

    E-Print Network [OSTI]

    Guidelines on Security and Privacy in Public Cloud Computing WayneJansen TimothyGrance Special Publication 800-144 #12;ii NIST Special Publication 800-144 Guidelines on Security and Privacy in Public Cloud and Ramaswamy Chandramouli, also from NIST, provided input on cloud security in early drafts. Thanks also go

  4. Adaptive versus non-adaptive strategies for quantum channel discrimination

    E-Print Network [OSTI]

    Aram W. Harrow; Avinatan Hassidim; Debbie W. Leung; John Watrous

    2009-09-01

    We provide a simple example that illustrates the advantage of adaptive over non-adaptive strategies for quantum channel discrimination. In particular, we give a pair of entanglement-breaking channels that can be perfectly discriminated by means of an adaptive strategy that requires just two channel evaluations, but for which no non-adaptive strategy can give a perfect discrimination using any finite number of channel evaluations.

  5. Secretary Richardson Accepts Recommendations for Improving Security...

    National Nuclear Security Administration (NNSA)

    Secretary Richardson Accepts Recommendations for Improving Security at Nuclear Weapons Laboratories | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS...

  6. Waste Isolation Pilot Plant Transportation Security

    Office of Environmental Management (EM)

    Senior Management Operational Management Implementation OOB NTP Transportation Logistics OSO Operations Management Organization Security WIPP Security Conditions * TRU Waste...

  7. National Nuclear Security Administration Overview | Department...

    Office of Environmental Management (EM)

    Administration Overview National Nuclear Security Administration Overview National Nuclear Security Administration Overview More Documents & Publications National Transportation...

  8. Security Science & Technology | Nuclear Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Science & Technology Border Security Comprehensive Vulnerability and Threat Analysis Consequence Management, Safeguards, and Non-Proliferation Tools Export...

  9. Independent Oversight Review, National Nuclear Security Administration...

    Office of Environmental Management (EM)

    Nuclear Security Administration Production Office - February 2014 Independent Oversight Review, National Nuclear Security Administration Production Office - February 2014 February...

  10. Enhancing Transportation Energy Security through Advanced Combustion...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Transportation Energy Security through Advanced Combustion and Fuels Technologies Enhancing Transportation Energy Security through Advanced Combustion and Fuels Technologies 2005...

  11. III International Climate Change Adaptation Adaptation Futures 2014

    E-Print Network [OSTI]

    1 III International Climate Change Adaptation Conference Adaptation Futures 2014 12-16 May 2014 of Research on Climate Change Vulnerability, Impacts and Adaptation (PROVIA), the Co and reports from the conference in newspapers 93 #12;4 1. INTRODUCTION Climate

  12. ON AN ADAPTIVE CONTROL ALGORITHM FOR ADAPTIVE OPTICS APPLICATIONS

    E-Print Network [OSTI]

    ON AN ADAPTIVE CONTROL ALGORITHM FOR ADAPTIVE OPTICS APPLICATIONS MOODY T. CHU Abstract. The wavefront aberrations induced by atmospheric turbulence can severely degrade the performance of an optical imaging system. Adaptive optics refers to the process of removing unwanted wave front distortions

  13. ON AN ADAPTIVE CONTROL ALGORITHM FOR ADAPTIVE OPTICS APPLICATIONS

    E-Print Network [OSTI]

    ON AN ADAPTIVE CONTROL ALGORITHM FOR ADAPTIVE OPTICS APPLICATIONS MOODY T. CHU \\Lambda Abstract. The wavefront aberrations induced by atmospheric turbulence can severely degrade the performance of an optical imaging system. Adaptive optics refers to the process of removing unwanted wave front distortions

  14. Development of an Automated Security Risk Assessment Methodology Tool for Critical Infrastructures.

    SciTech Connect (OSTI)

    Jaeger, Calvin D.; Roehrig, Nathaniel S.; Torres, Teresa M.

    2008-12-01

    This document presents the security automated Risk Assessment Methodology (RAM) prototype tool developed by Sandia National Laboratories (SNL). This work leverages SNL's capabilities and skills in security risk analysis and the development of vulnerability assessment/risk assessment methodologies to develop an automated prototype security RAM tool for critical infrastructures (RAM-CITM). The prototype automated RAM tool provides a user-friendly, systematic, and comprehensive risk-based tool to assist CI sector and security professionals in assessing and managing security risk from malevolent threats. The current tool is structured on the basic RAM framework developed by SNL. It is envisioned that this prototype tool will be adapted to meet the requirements of different CI sectors and thereby provide additional capabilities.

  15. SECURITY TECHNIQUES Chris J Mitchell1

    E-Print Network [OSTI]

    Mitchell, Chris

    SECURITY TECHNIQUES Chris J Mitchell1 Introduction In this paper we consider the range of security security has been exerted. However, the techniques described are of general applicability by a security technique; in doing so we will distinguish between security features and security techniques (or

  16. Security and Privacy in the Networked World

    E-Print Network [OSTI]

    Sandhu, Ravi

    -World Impact! Perennial State of Cyber Security Micro-security Macro-security #12; What is the value of being Cyber Security Conundrum #12;Cyber security as reconciliation of tradeoffs Finding Goldilocks Holistic1 Security and Privacy in the Networked World Prof. Ravi Sandhu Executive Director and Endowed

  17. The unreasonable ineffectiveness of security engineering

    E-Print Network [OSTI]

    Pavlovic, Dusko

    of security does not apply only to software, as we also speak of bank security, national security, secureThe unreasonable ineffectiveness of security engineering: An overview Dusko Pavlovic Kestrel" [32]. After several decades of security research, we are tempted to ask the opposite question: Are we

  18. IY5512: Part 2 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    ; ­ introduction to security evaluation criteria. Information Security Group Agenda · Design principles · DesignIY5512: Part 2 1 Information Security Group IY5512 Computer Security Part 2: Design & evaluation · This part of the course covers: ­ fundamental security design principles; ­ a security design methodology

  19. Climate Change, Adaptation, and Development

    E-Print Network [OSTI]

    Cole, Daniel H.

    2008-01-01

    Climate Change, Adaptation, and Development Daniel H. Cole*THE COSTS OF CLIMATE CHANGE . ADAPTATIONCONVENTION ON CLIMATE CHANGE . IV. A.

  20. FOILFEST :community enabled security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr.

    2005-09-01

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

  1. 2014-08-07 Issuance: Appliance Standards and Rulemaking Federal Advisory Committee (ASRAC)- Manufactured Housing Working Group; Notice of Open Meeting

    Broader source: Energy.gov [DOE]

    This document is a pre-publication Federal Register notice of open meeting regarding the Appliance Standards and Rulemaking Federal Advisory Committee (ASRAC) - Manufactured Housing Working Group on August 7, 2014. Though it is not intended or expected, should any discrepancy occur between the document posted here and the document published in the Federal Register, the Federal Register publication controls. This document is being made available through the Internet solely as a means to facilitate the public's access to this document.

  2. April 30 Public Meeting: Physical Characterization of Smart and Grid-Connected Commercial and Residential Building End-Use Equipment and Appliances

    Broader source: Energy.gov [DOE]

    These documents contain slide decks presented at the Physical Characterization of Smart and Grid-Connected Commercial and Residential Buildings End-Use Equipment and Appliances public meeting held on April 30, 2014. The first document includes the first presentation from the meeting: DOE Vision and Objectives. The second document includes all other presentations from the meeting: Terminology and Definitions; End-User and Grid Services; Physical Characterization Framework; Value, Benefits & Metrics.

  3. COSC 472 Network Security Annie Lu 1 COSC 472 Network Security

    E-Print Network [OSTI]

    Lu, Enyue "Annie"

    Network Security Annie Lu Background · Information Security requirements have changed in recent times to protect data during transmission #12;COSC 472 Network Security Annie Lu 6 Security · Information Security Security Annie Lu Computer Security · the protection afforded to an automated information system in order

  4. The Cyber Security Crisis

    ScienceCinema (OSTI)

    Spafford, Eugene [Purdue University, West Lafayette, Indiana, United States

    2009-09-01

    Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

  5. Adaptive control for accelerators

    DOE Patents [OSTI]

    Eaton, Lawrie E. (Los Alamos, NM); Jachim, Stephen P. (Los Alamos, NM); Natter, Eckard F. (Santa Fe, NM)

    1991-01-01

    An adaptive feedforward control loop is provided to stabilize accelerator beam loading of the radio frequency field in an accelerator cavity during successive pulses of the beam into the cavity. A digital signal processor enables an adaptive algorithm to generate a feedforward error correcting signal functionally determined by the feedback error obtained by a beam pulse loading the cavity after the previous correcting signal was applied to the cavity. Each cavity feedforward correcting signal is successively stored in the digital processor and modified by the feedback error resulting from its application to generate the next feedforward error correcting signal. A feedforward error correcting signal is generated by the digital processor in advance of the beam pulse to enable a composite correcting signal and the beam pulse to arrive concurrently at the cavity.

  6. Security seal. [Patent application

    DOE Patents [OSTI]

    Gobeli, G.W.

    1981-11-17

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  7. Security Administration Production Office,

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D m r345Secure

  8. Building a Secure and Privacy-Preserving Smart Grid Cornell University

    E-Print Network [OSTI]

    Jelasity, Márk

    in the electrical power grid promise to create a more efficient, cost-effective, and adaptable smart grid. HoweverBuilding a Secure and Privacy-Preserving Smart Grid Ken Birman Cornell University Márk Jelasity, naive implementations of smart grid data collection could jeopardize the privacy of consumers

  9. 2014 Headquarters Facilities Master Security Plan- Chapter 11, Incidents of Security Concern

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 11, Incidents of Security Concern Describes DOE Headquarters procedures for reporting, investigating, and correcting Incidents of Security Concern.

  10. NNSA Co-Hosts Nuclear Security Summit Workshop on Maritime Security...

    National Nuclear Security Administration (NNSA)

    Co-Hosts Nuclear Security Summit Workshop on Maritime Security with UK | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

  11. TED AND KARYN HUME CENTER FOR NATIONAL SECURITY AND TECHNOLOGY

    E-Print Network [OSTI]

    Ha, Dong S.

    Networks, Crypto, Formal Methods, Cloud, IPv6, Hardware Security, Visualization, Policy/Law Applications Security IPv6 Security Cloud Security and Privacy Secure Virtualization Anonymous Computation VisualizationTED AND KARYN HUME CENTER FOR NATIONAL SECURITY AND TECHNOLOGY Cybersecurity: Observations

  12. Adaptive optical filter

    DOE Patents [OSTI]

    Whittemore, Stephen Richard

    2013-09-10

    Imaging systems include a detector and a spatial light modulator (SLM) that is coupled so as to control image intensity at the detector based on predetermined detector limits. By iteratively adjusting SLM element values, image intensity at one or all detector elements or portions of an imaging detector can be controlled to be within limits. The SLM can be secured to the detector at a spacing such that the SLM is effectively at an image focal plane. In some applications, the SLM can be adjusted to impart visible or hidden watermarks to images or to reduce image intensity at one or a selected set of detector elements so as to reduce detector blooming

  13. Information Systems and Computing/Office of Information Security www.upenn.edu/computing/security security@isc.upenn.edu

    E-Print Network [OSTI]

    Fang-Yen, Christopher

    ". And Penn actually offers a couple of "home grown" cloud services for secure file sharing and transferInformation Systems and Computing/Office of Information Security www.upenn.edu/computing/security security@isc.upenn.edu "phishing"...? Information Systems and Computing/Office of Information Security

  14. Aviation security: A system's perspective

    SciTech Connect (OSTI)

    Martin, J.P.

    1988-01-01

    For many years the aviation industry and airports operated with security methods and equipment common to most other large industrial complexes. At that time, the security systems primarily provided asset and property protection. However, soon after the first aircraft hijacking the focus of security shifted to emphasize the security requirements necessary for protecting the traveling public and the one feature of the aviation industry that makes it unique---the airplane. The airplane and its operation offered attractive opportunities for the homesick refugee, the mentally unstable person and the terrorist wanting to make a political statement. The airport and its aircraft were the prime targets requiring enhanced security against this escalated threat. In response, the FAA, airport operators and air carriers began to develop plans for increasing security and assigning responsibilities for implementation.

  15. East Asian Security in 2025 

    E-Print Network [OSTI]

    Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

    2008-01-01

    Are • Reagan Heavin – Energy • Adam Hudson – State Capacity • Brandon Krueger – Military • Sean O’Neil – Demographics • Griffin Rozell – Balance of Power • Matt Suma – Economy East Asian Security in 2025 China: Competition, Cooperation, Plateau? Reagan Heavin... Adam Hudson Brandon Krueger Sean O’Neil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda • Conclusions • Projections • Drivers • Four Outcomes • Questions East Asian Security in 2025 Conclusions • China will rise to great power...

  16. Cyberspace security system

    DOE Patents [OSTI]

    Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

    2014-06-24

    A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

  17. Noise Secured Internet

    E-Print Network [OSTI]

    Geraldo A. Barbosa

    2006-02-28

    This work shows how a secure Internet can be implemented through a fast key distribution system that uses physical noise to protect the transmitted information. Starting from a shared random sequence $K_0$ between two (or more) users, longsequences $R$ of random bits can be shared. The signals sent over the Internet are deterministic but have a built-in Nature-made uncertainty that protects the shared sequences. After privacy amplification the shared $R$ random bits --encrypted by noise-- are subsequently utilized in one-time-pad data ciphering.

  18. Security | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDidDevelopment Top Scientific Impact Since its SearchSecurity Enhancing

  19. Energy Security Center

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES October 27th, 2010 Thanks forEnergy ScienceEnergy Security

  20. Energy Security Council

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES October 27th, 2010 Thanks forEnergy ScienceEnergy Security

  1. Security, Safety and Health

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergy BillsNo.Hydrogen4 » Searchwith First JamesofAward509 WeekSecurity8, Fourth

  2. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput AnalysisSinkholeCapabilities GeneralWake-ImagingNotSecurity Home

  3. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput AnalysisSinkholeCapabilities GeneralWake-ImagingNotSecurity Home

  4. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National NuclearSecurityor

  5. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National

  6. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19, 2001 Energy

  7. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19, 2001 Energy24,

  8. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19, 2001

  9. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19, 2001Y-12

  10. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you notHeatMaRIEdioxide capture CS SeminarsNRELNuclear Security

  11. Energy Security Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submitKansasCommunities EnergyU.S. DOE Office of99SavingTrilateralUnionSecurity

  12. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II)GeothermalFuel MagnetizationTransportationVideos HomePower HomeSecurity

  13. dnn | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration (DOENNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, Shaping the future of nuclear...

  14. Web Engineering Security: Essential Elements

    E-Print Network [OSTI]

    Glisson, W.B.; Welland, R.; The Second International Conference on Availability, Reliability and Security (ARES).; 2007.; Vienna, Austria pp 707-714 IEEE [More Details

    Glisson,W.B. Welland,R. The Second International Conference on Availability, Reliability and Security (ARES). 2007. Vienna, Austria pp 707-714 IEEE

  15. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    CLIMATE CHANGE Multiplying Threats to National Securityfor the impacts of climate change on national security. Pagea warming world. Page 11 “Climate change acts as a threat

  16. testmenu | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    testmenu | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  17. taiwan | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    taiwan | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  18. Energy Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    through these relationships that will transition into technologies that address DOE Roadmap challenges. R&D Activities: Real-time digital simulator Advanced security...

  19. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

  20. Cyber Security | More Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant,...