National Library of Energy BETA

Sample records for address secure file

  1. NNSA Administrator Addresses the Next Generation of Nuclear Security Professionals: Part 2

    ScienceCinema (OSTI)

    Thomas D'Agostino

    2010-09-01

    Administrator Thomas DAgostino of the National Nuclear Security Administration addressed the next generation of nuclear security professionals during the opening session of todays 2009 Department of Energy (DOE) Computational Science Graduate Fellowship Annual Conference. Administrator DAgostino discussed NNSAs role in implementing President Obamas nuclear security agenda and encouraged the computing science fellows to consider careers in nuclear security.

  2. NNSA Administrator Addresses the Next Generation of Nuclear Security Professionals: Part 1

    ScienceCinema (OSTI)

    Thomas D'Agostino

    2010-09-01

    Administrator Thomas DAgostino of the National Nuclear Security Administration addressed the next generation of nuclear security professionals during the opening session of todays 2009 Department of Energy (DOE) Computational Science Graduate Fellowship Annual Conference. Administrator DAgostino discussed NNSAs role in implementing President Obamas nuclear security agenda and encouraged the computing science fellows to consider careers in nuclear security.

  3. Optimizing File Availability in a Secure Serverless Distributed File System John R. Douceur and Roger P. Wattenhofer

    E-Print Network [OSTI]

    Optimizing File Availability in a Secure Serverless Distributed File System John R. Douceur, and availability by storing replicas of each file on multiple machines. It continuously monitors machine availability and relocates replicas as necessary to maximize the effective availability of the system. We

  4. Address:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsicloudden DocumentationAccommodationsRegister / Vol. 72, No.Resources |AdditiveAddress:

  5. Strategies to Address Identified Education Gaps in the Preparation of a National Security Workforce

    SciTech Connect (OSTI)

    None

    2008-06-30

    This report will discuss strategies available to address identified gaps and weaknesses in education efforts aimed at the preparation of a skilled and properly trained national security workforce.The need to adequately train and educate a national security workforce is at a critical juncture. Even though there are an increasing number of college graduates in the appropriate fields, many of these graduates choose to work in the private sector because of more desirable salary and benefit packages. This is contributing to an inability to fill vacant positions at NNSA resulting from high personnel turnover from the large number of retirements. Further, many of the retirees are practically irreplaceable because they are Cold War scientists that have experience and expertise with nuclear weapons.

  6. CITI Technical Report 01-6 SC-CFS: Smartcard Secured Cryptographic File System

    E-Print Network [OSTI]

    Honeyman, Peter

    CITI Technical Report 01-6 SC-CFS: Smartcard Secured Cryptographic File System Naomaru Itoi Center;le system, are not perfect against these attacks. We have developed SC-CFS, a #12;le system that encrypts #12;les and takes advantage of a smartcard for per-#12;le key generation. SC-CFS counters password

  7. OHA Security Cases Archive File | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties -DepartmentAvailable forSite |n t78 I.(NationalOE'sOHA Security Cases

  8. How to file a FOIA request for NASA Agency records A FOIA request for NASA Agency records must include the requester's name and mailing address, a description of

    E-Print Network [OSTI]

    How to file a FOIA request for NASA Agency records A FOIA request for NASA Agency records must is submitted online via the NASA FOIA website, the required information must be completed. Do not include a social security number on any correspondence with the FOIA office. NASA does not have a central location

  9. How to file a FOIA request for NASA Agency records A FOIA request for NASA Agency records must include the requester's name and mailing address, a description of

    E-Print Network [OSTI]

    How to file a FOIA request for NASA Agency records A FOIA request for NASA Agency records must is submitted online via the NASA FOIA website, the required information must be completed. Do not include a social security number on any correspondence with the FOIA office. NASA has a central location

  10. REVIEW OF THE POTENTIAL OF NUCLEAR HYDROGEN FOR ADDRESSING ENERGY SECURITY AND CLIMATE CHANGE

    SciTech Connect (OSTI)

    James E. O'Brien

    2010-06-01

    Nuclear energy has the potential to exert a major positive impact on energy security and climate change by coupling it to the transportation sector, primarily through hydrogen production. In the short term, this coupling will provide carbon-free hydrogen for upgrading increasingly lower quality petroleum resources such as oil sands, offsetting carbon emissions associated with steam methane reforming. In the intermediate term, nuclear hydrogen will be needed for large-scale production of infrastructure-compatible synthetic liquid fuels. In the long term, there is great potential for the use of hydrogen as a direct vehicle fuel, most likely in the form of light-duty pluggable hybrid hydrogen fuel cell vehicles. This paper presents a review of the potential benefits of large-scale nuclear hydrogen production for energy security (i.e. displacing imported petroleum) and reduction of greenhouse gas emissions. Lifecycle benefits of nuclear energy in this context are presented, with reference to recent major publications on this topic. The status of US and international nuclear hydrogen research programs are discussed. Industry progress toward consumer-grade hydrogen fuel cell vehicles are also be examined.

  11. PSH-12-0055- In the Matter of Personnel Security Hearing

    Broader source: Energy.gov [DOE]

    The individual is employed by a Department of Energy (DOE) contractor, and was granted a security clearance in connection with that employment. On October 11, 2011, the individual filed for personal bankruptcy under Chapter 7 of the federal bankruptcy laws. Upon being apprised of this, the local security office (LSO) summoned the individual for an interview with a personnel security specialist in order to address the security concerns raised by this filing.

  12. Security

    Broader source: Energy.gov [DOE]

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  13. Postal Security Device Security Policy

    E-Print Network [OSTI]

    Postal Security Device Security Policy FRAMA AG PSD - I Version: R01.06 Date: 25.05.2007 Doc.-ID: DE_FNKPSD_510_SPE File name: DE_FNKPSD_510_SPE_R0106_EN.Security Policy PSD Author: Bernd Zinke, Timo » Non-Confidential « #12;Security Policy FRAMA AG CH-3438 LAUPERSWIL / BERN TITLE: POSTAL SECURITY

  14. SECURE MODIFICATION TO A FILE PROTECTION SYSTEM THAT USES A FINGERPRINT IDENTIFICATION TECHNIQUE

    E-Print Network [OSTI]

    , kindness, and friendship. Also, I would like to give special thanks to my family, especially my mother, executive members, and/or scientists of a company. The main purpose is to help a company maintain problems. People are afraid that someone could steal their data or hack into their systems. Data security

  15. UNIX file permissions

    E-Print Network [OSTI]

    ... out sensitive information (like promotion documents and qualifier exams). ... about security, you will want to change your "umask" line in your .cshrc file.

  16. Idaho National Laboratory/Nuclear Power Industry Strategic Plan for Light Water Reactor Research and Development An Industry-Government Partnership to Address Climate Change and Energy Security

    SciTech Connect (OSTI)

    Electric Power Research

    2007-11-01

    The dual issues of energy security and climate change mitigation are driving a renewed debate over how to best provide safe, secure, reliable and environmentally responsible electricity to our nation. The combination of growing energy demand and aging electricity generation infrastructure suggests major new capacity additions will be required in the years ahead.

  17. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The vendor has issued a fix: 1. Cisco Secure ACS version 5.1: File 5-1-0-44-6.tar.gpg - ACS 5.1.0.44 cumulative patch 6 2. Cisco Secure ACS version 5.2: File...

  18. Information Systems and Computing/Office of Information Security www.upenn.edu/computing/security security@isc.upenn.edu

    E-Print Network [OSTI]

    Fang-Yen, Christopher

    ". And Penn actually offers a couple of "home grown" cloud services for secure file sharing and transferInformation Systems and Computing/Office of Information Security www.upenn.edu/computing/security security@isc.upenn.edu "phishing"...? Information Systems and Computing/Office of Information Security

  19. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  20. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  1. INFORMATION SECURITY University Policy No: IM7800

    E-Print Network [OSTI]

    Victoria, University of

    Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

  2. Addressing the workforce pipeline challenge

    SciTech Connect (OSTI)

    Leonard Bond; Kevin Kostelnik; Richard Holman

    2006-11-01

    A secure and affordable energy supply is essential for achieving U.S. national security, in continuing U.S. prosperity and in laying the foundations to enable future economic growth. To meet this goal the next generation energy workforce in the U.S., in particular those needed to support instrumentation, controls and advanced operations and maintenance, is a critical element. The workforce is aging and a new workforce pipeline, to support both current generation and new build has yet to be established. The paper reviews the challenges and some actions being taken to address this need.

  3. New partnership uses advanced computer science modeling to address...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    partnership uses advanced computer science modeling to address climate change | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing...

  4. Carver File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File Storage File Storage Disk Quota Change Request Form Carver File Systems Carver has 3 kinds of file systems available to users: home directories, scratch directories and...

  5. Euclid File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File storage File storage Disk Quota Change Request Form Euclid File Systems Euclid has 3 kinds of file systems available to users: home directories, scratch directories and...

  6. PETER DAVID JOHNSON Home Address: Work Address

    E-Print Network [OSTI]

    Johnson, Peter D.

    for the Advancement of Science 2009 Outstanding Referee, Journals of the American Physical Society 2011 APS Oliver E1 PETER DAVID JOHNSON Home Address: Work Address: 4 Terrell Lane CMPMSD Stony Brook Physics 510B NY 11790 Brookhaven National Laboratory USA Upton NY 11973 Education 1972 B.Sc. Physics, Imperial College

  7. Energy Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    through these relationships that will transition into technologies that address DOE Roadmap challenges. R&D Activities: Real-time digital simulator Advanced security...

  8. A Metadata-Rich File System

    SciTech Connect (OSTI)

    Ames, S; Gokhale, M B; Maltzahn, C

    2009-01-07

    Despite continual improvements in the performance and reliability of large scale file systems, the management of file system metadata has changed little in the past decade. The mismatch between the size and complexity of large scale data stores and their ability to organize and query their metadata has led to a de facto standard in which raw data is stored in traditional file systems, while related, application-specific metadata is stored in relational databases. This separation of data and metadata requires considerable effort to maintain consistency and can result in complex, slow, and inflexible system operation. To address these problems, we have developed the Quasar File System (QFS), a metadata-rich file system in which files, metadata, and file relationships are all first class objects. In contrast to hierarchical file systems and relational databases, QFS defines a graph data model composed of files and their relationships. QFS includes Quasar, an XPATH-extended query language for searching the file system. Results from our QFS prototype show the effectiveness of this approach. Compared to the defacto standard, the QFS prototype shows superior ingest performance and comparable query performance on user metadata-intensive operations and superior performance on normal file metadata operations.

  9. Franklin File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Files systems Files systems NERSC's global home and project file systems are available on Franklin. Additionally, Franklin has over 400 TB of locally attached high-performance...

  10. File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES OctoberEvan Racah861MayArtQuestionsFieldFiji Fiji IsFileFileFile

  11. Farm Tractors in Kansas: How to Perfect a Security Interest

    E-Print Network [OSTI]

    Johnstun, Aaron J.; Ware, Stephen J.

    2009-01-01

    certificate-of-title statute, a different rule applies. For example, in all fifty states, motor vehicles are subject to a certificate- of-title statute. 8 The UCC provides that security interests in such collateral are perfected not by filing a financing... security interest in a motor vehicle be noted on the certificate of title. 11 Accordingly, the filing of a financing statement is not necessary or effective to perfect a security interest in a Missouri motor vehicle. By contrast, notation...

  12. National Security Issues the U.S. Faces Today 

    E-Print Network [OSTI]

    Scowcroft, Brent

    2015-06-04

    Brent Scowcroft addresses the biggest security challenges the United States faces in/from each major region of the world.

  13. An Operations Research approach to aviation security

    E-Print Network [OSTI]

    Martonosi, Susan Elizabeth

    2005-01-01

    Since the terrorist attacks of September 11, 2001, aviation security policy has remained a focus of national attention. We develop mathematical models to address some prominent problems in aviation security. We explore ...

  14. A Cryptographic File System for Unix AT&T Bell Laboratories

    E-Print Network [OSTI]

    Pommerening, Klaus - Institute of Medical Biostatistics, Epidemiology, and Informatics & Fachbereich 08

    File System (CFS) pushes encryption services into the file system itself. CFS supports secure storage intervention; cleartext is never stored on a disk or sent to a remote file server. CFS can use any available of the key. This paper describes the design and implementation of CFS under Unix. Encryption techniques

  15. Developmental Integrative BiologyCyber Security UNT is recognized by the National Security Agency and the Department of

    E-Print Network [OSTI]

    Tarau, Paul

    security. Information and computer security, trust and information assurance, systems architecture to identify and address a range of changing information sources and security vulnerabilities. UNT brings experts to address next generation challenges. The UNT-based Center for Information and Computer Security

  16. File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES OctoberEvan Racah861MayArtQuestionsFieldFiji Fiji IsFileFile

  17. Files systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES OctoberEvan Racah861MayArtQuestionsFieldFiji FijiO FileFiles

  18. Building Name: ____________________________________________ Address: __________________________________________ Completed by: ___________________________________________ Date: ______________ File Number: ___________________

    E-Print Network [OSTI]

    input? s Fuel or combustion odors Cooling Tower s Clean? no leaks or overflow? Slime or algae growth air s Actual temperatures supply air mixed air return air outdoor air Coils s Heating fluid discharge temperature T cooling fluid discharge temperature T s Controls (describe) s Condition (note date) Humidifier

  19. Addressing Water Contamination

    E-Print Network [OSTI]

    Loewith, Robbie

    Addressing Water Contamination without Using Chemicals For more information contact WIPO at: World challenge Farmers and gardeners apply pesticides to their crops. Contaminated waters are released when-off contaminates local water supplies and pollutes the environment. As a consequence a range of pesticides may

  20. Cyber Security via Signaling Games: Toward a Science of Cyber Security

    E-Print Network [OSTI]

    Mishra, Bud

    Cyber Security via Signaling Games: Toward a Science of Cyber Security W. Casey, J.A. Morales, T to address various cyber security problems involving exchange of information (asymmetrically). This research challenge in defining a science of cyber-security derives from the peculiar aspects of the field

  1. Database Security: A Historical Perspective

    E-Print Network [OSTI]

    Lesov, Paul

    2010-01-01

    The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

  2. TIGER:Thermal-Aware File Assignment in Storage Clusters

    E-Print Network [OSTI]

    Qin, Xiao

    TIGER:Thermal-Aware File Assignment in Storage Clusters Ajit Chavan, Xunfei Jiang, Mohemmad I/O performance. I. INTRODUCTION Thermal management for power-dense storage clusters can address cooling problems. The following three factors make thermal-aware file assign- ment desirabe and practical for storage clusters

  3. Energy Efficient Prefetching with Buffer Disks for Cluster File Systems

    E-Print Network [OSTI]

    Qin, Xiao

    Energy Efficient Prefetching with Buffer Disks for Cluster File Systems Adam Manzanares, Xiaojun the energy- efficiency of large scale parallel storage systems. To address these issues we introduce EEVFS (Energy Efficient Virtual File System), which is able to manage data placement and disk states to help

  4. Scalable Security for Petascale Parallel File Systems

    E-Print Network [OSTI]

    Leung, Andrew W.; Miller, Ethan L; Jones, Stephanie

    2007-01-01

    capabilities, high-performance computing, scalabilityin recent years. High performance computing (HPC) scienti?cLarge-scale high performance computing often involves

  5. Scalable Security for Petascale Parallel File Systems

    E-Print Network [OSTI]

    Leung, Andrew W.; Miller, Ethan L; Jones, Stephanie

    2007-01-01

    high performance storage systems. In Proc. 2nd Workshop onobject disks. In Proc. Mass Storage Systems and TechnologiesProc. Conf. on Mass Storage Systems and Technologies, 2005.

  6. information security

    E-Print Network [OSTI]

    Faculty listing for "information security" ... 1167; Phone: +1 765 49-46022; Email: wagstaff@purdue.edu; Research Interests: number theory, information security.

  7. TO: FILE

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouth DakotaRobbins and700, 1. .&. ' , c 1 1; -.ll 1q4207---TO: FILE

  8. TO: FILE

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouth DakotaRobbins and700, 1. .&. ' , c 1 1; -.ll, TO: FILE

  9. TO: FILE

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouth DakotaRobbins and700, 1. .&. ' , c 1 1; -.ll, TO: FILE3

  10. TO: FILE

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouth DakotaRobbins and700, 1. .&. ' , c 1 1; -.ll, TO: FILE3F&i

  11. File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES OctoberEvan Racah861MayArtQuestionsFieldFiji Fiji IsFile Systems

  12. File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES OctoberEvan Racah861MayArtQuestionsFieldFiji Fiji IsFile

  13. FERC Filing

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submitKansasCommunitiesofExtrans - PermeationGovernment | Department ofFerc Filing

  14. Information Security: Coordination of Federal Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO...

  15. Information Security: Coordination of Federal Cyber Security...

    Office of Environmental Management (EM)

    Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

  16. Akbar Siami Namin Business Address

    E-Print Network [OSTI]

    Gelfond, Michael

    Analysis Energy-aware Software Engineering Cyber Security and Secure Programming Empirical Software ­ 05 / 06 National Research Council Canada (NRC) 05 / 05 ­ 05 / 06 Visiting Researcher Education 01, TX, USA, 79414 (325) 260 - 5882 Research Interests Software Engineering Software Testing and Program

  17. Washington and Lee University Guidance on Information Security

    E-Print Network [OSTI]

    Marsh, David

    Washington and Lee University Guidance on Information Security This guidance addresses common issues that have come up during information security discussions with offices and departments across, Information Security Program Committee Chair (sdittman@wlu.edu) or Dean Tallman, Information Security Officer

  18. Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions

    E-Print Network [OSTI]

    Plusquellic, James

    of New Mexico ABSTRACT This paper addresses a new threat to the security of integrated circuits (ICs) used in safety critical, security and military systems. The migration of IC fabrication to low

  19. On formal and automatic security verification of WSN transport protocols

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On formal and automatic security verification of WSN transport protocols Ta Vinh Thong1 thong, we address the problem of formal and automated security verification of WSN transport protocols

  20. Argonne Director Eric Isaacs addresses the National Press Club

    ScienceCinema (OSTI)

    Eric Isaccs

    2010-01-08

    Argonne Director Eric Isaacs addresses the National Press Club on 9/15/2009. To build a national economy based on sustainable energy, the nation must first "reignite its innovation ecology," he said. Issacs makes the case for investing in science to secure America's future.

  1. Aligning Technology Solutions to Address Over-the-Horizon Threats

    E-Print Network [OSTI]

    Aligning Technology Solutions to Address Over-the-Horizon Threats As the world's geopolitical for the U.S. Government bridging the gap between policy development and technology implementation WHAT WE-the-horizon security threats and issues Analysis results to support U.S. policymakers and the science and technology

  2. Security systems engineering overview

    SciTech Connect (OSTI)

    Steele, B.J.

    1996-12-31

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).

  3. Standard interface file handbook

    SciTech Connect (OSTI)

    Shapiro, A.; Huria, H.C. )

    1992-10-01

    This handbook documents many of the standard interface file formats that have been adopted by the US Department of Energy to facilitate communications between and portability of, various large reactor physics and radiation transport software packages. The emphasis is on those files needed for use of the VENTURE/PC diffusion-depletion code system. File structures, contents and some practical advice on use of the various files are provided.

  4. Statement to the IAEA International Conference on Nuclear Security...

    Broader source: Energy.gov (indexed) [DOE]

    energy is a key part of addressing climate change, and ensuring nuclear security is integral to the expansion of carbon-free nuclear generation. On climate change, President...

  5. FAQS Reference Guide – Safeguards and Security General Technical Base

    Office of Energy Efficiency and Renewable Energy (EERE)

    This reference guide addresses the competency statements in the July 2009 edition of DOE-STD-1123-2009, Safeguards and Security General Technical Base Qualification Standard.

  6. Global Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    weapons from the James Martin center for Nonproliferation Studies Homeland Security Digital Library HSDL is the nation's premier research collection of open-source resources...

  7. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  8. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  9. Safeguards and Security and Cyber Security RM

    Office of Environmental Management (EM)

    using security measures such as badging, pre-employment investigation and fitness for duty, training, and security awareness? Cyber Security CS-1 Has the project...

  10. CLIMATE CHANGE AND INTERNATIONAL PEACE AND SECURITY

    E-Print Network [OSTI]

    CLIMATE CHANGE AND INTERNATIONAL PEACE AND SECURITY: Possible Roles for the U.N. Security Council in Addressing Climate Change By Dane Warren July 2015 #12;© 2015 Sabin Center for Climate Change Law, Columbia Law School The Sabin Center for Climate Change Law develops legal techniques to fight climate change

  11. Security Services Discovery by ATM Endsystems

    SciTech Connect (OSTI)

    Sholander, Peter; Tarman, Thomas

    1999-07-15

    This contribution proposes strawman techniques for Security Service Discovery by ATM endsystems in ATM networks. Candidate techniques include ILMI extensions, ANS extensions and new ATM anycast addresses. Another option is a new protocol based on an IETF service discovery protocol, such as Service Location Protocol (SLP). Finally, this contribution provides strawman requirements for Security-Based Routing in ATM networks.

  12. Addressing the Need for Independence in the CSE Model

    SciTech Connect (OSTI)

    Abercrombie, Robert K; Ferragut, Erik M; Sheldon, Frederick T; Grimaila, Michael R

    2011-01-01

    Abstract Information system security risk, defined as the product of the monetary losses associated with security incidents and the probability that they occur, is a suitable decision criterion when considering different information system architectures. Risk assessment is the widely accepted process used to understand, quantify, and document the effects of undesirable events on organizational objectives so that risk management, continuity of operations planning, and contingency planning can be performed. One technique, the Cyberspace Security Econometrics System (CSES), is a methodology for estimating security costs to stakeholders as a function of possible risk postures. In earlier works, we presented a computational infrastructure that allows an analyst to estimate the security of a system in terms of the loss that each stakeholder stands to sustain, as a result of security breakdowns. Additional work has applied CSES to specific business cases. The current state-of-the-art of CSES addresses independent events. In typical usage, analysts create matrices that capture their expert opinion, and then use those matrices to quantify costs to stakeholders. This expansion generalizes CSES to the common real-world case where events may be dependent.

  13. Cyber Security | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    System-of-systems analysis Visualization tools for complex information Next-generation smart grid technologies Quantum computing, security, and data fusion For more information,...

  14. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or â?? tunnelsâ?ť, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

  15. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  16. Register file soft error recovery

    DOE Patents [OSTI]

    Fleischer, Bruce M.; Fox, Thomas W.; Wait, Charles D.; Muff, Adam J.; Watson, III, Alfred T.

    2013-10-15

    Register file soft error recovery including a system that includes a first register file and a second register file that mirrors the first register file. The system also includes an arithmetic pipeline for receiving data read from the first register file, and error detection circuitry to detect whether the data read from the first register file includes corrupted data. The system further includes error recovery circuitry to insert an error recovery instruction into the arithmetic pipeline in response to detecting the corrupted data. The inserted error recovery instruction replaces the corrupted data in the first register file with a copy of the data from the second register file.

  17. A Cloud-Oriented Cross-Domain Security Architecture

    E-Print Network [OSTI]

    A Cloud-Oriented Cross-Domain Security Architecture Thuy D. Nguyen, Mark A. Gondree, David J to support a cloud of cross-domain services, hosted within a federation of multilevel secure (MLS) MYSEA}@nps.edu Abstract--The Monterey Security Architecture addresses the need to share high-value data across multiple

  18. Secure and Efficient Proof of Storage with Deduplication Qingji Zheng

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    to the success of cloud storage. So far, security and efficiency of cloud storage have been separately Security Keywords cloud storage, outsourced storage, proof of storage, dedu- plication, integrity checking. This has led to studies on cloud stor- age security and efficiency, which are, however, addressed

  19. Efficient and Secure Data Storage Operations for Mobile Cloud Computing

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Efficient and Secure Data Storage Operations for Mobile Cloud Computing Zhibin Zhou and Dijiang, users' concerns about data security are the main obstacles that impede cloud computing from being widely architectures are needed to address the security concerns of users for using cloud computing techniques

  20. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    Information Security Group IY5512 Computer Security Part 7b: Windows securityPart 7b: Windows security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security Group) of Windows machines. 2 Information Security Group Objectives II · Focus on Active Directory, authentication

  1. Addressing Deferred Maintenance, Infrastructure Costs, and Excess...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addressing Deferred Maintenance, Infrastructure Costs, and Excess Facilities at Portsmouth and Paducah Addressing Deferred Maintenance, Infrastructure Costs, and Excess Facilities...

  2. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  3. Secure PVM

    SciTech Connect (OSTI)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  4. Fast and Secure Magnetic WORM Storage Systems Yongge Wang and Yuliang Zheng

    E-Print Network [OSTI]

    Wang, Yongge

    Fast and Secure Magnetic WORM Storage Systems Yongge Wang and Yuliang Zheng Department of Software on the existence of trustworthy log files. Current storage systems for such log files are generally prone, as well as the demand for trustworthy storage systems, it is timely to design and develop fast storage

  5. Avfs: An On-Access Anti-Virus File System Yevgeniy Miretskiy, Abhijith Das, Charles P. Wright, and Erez Zadok

    E-Print Network [OSTI]

    Zadok, Erez

    Avfs: An On-Access Anti-Virus File System Yevgeniy Miretskiy, Abhijith Das, Charles P. Wright (Security 2004) Abstract Viruses and other malicious programs are an ever- increasing threat to current to combat. Most cur- rent virus scanners perform scanning only when a file is opened, closed, or executed

  6. Silver Lining: Enforcing Secure Information Flow at the Cloud Edge Safwan Mahmud Khan, Kevin W. Hamlen and Murat Kantarcioglu

    E-Print Network [OSTI]

    Hamlen, Kevin W.

    Silver Lining: Enforcing Secure Information Flow at the Cloud Edge Safwan Mahmud Khan, Kevin W to the cloud kernel software, OS/hypervisor, VM, or cloud file system, SilverLine automatically in-lines secure information flow security for Hadoop clouds with easy maintainability (through modularity) and low overhead

  7. DEPARTMENT OF DEPARTMENTAL MANAGEMENT ADDRESS

    E-Print Network [OSTI]

    Knowles, David William

    in this department. And the Advanced Energy Initiative, which proposes to significantly increase our national investment in alternative fuel and clean energy technologies. It's about a 22 percent increase up to a levelU.S. DEPARTMENT OF ENERGY DEPARTMENTAL MANAGEMENT ADDRESS WITH SECRETARY OF ENERGY SAMUEL W. BODMAN

  8. Incrementally Deployable Source Address Validity

    E-Print Network [OSTI]

    Lowd, Daniel

    ID-SAVE: Incrementally Deployable Source Address Validity Enforcement Toby Ehrenkranz ://netsec.cs.uoregon.edu #12;Ehrenkranz WiP ID-SAVE What's The Problem? While routers know which direction a packet should are unreliable ID-SAVE attacks this root cause! 1 #12;Ehrenkranz WiP ID-SAVE ID-SAVE Basics Create and maintain

  9. State of the Lab Address

    ScienceCinema (OSTI)

    King, Alex

    2013-03-01

    In his third-annual State of the Lab address, Ames Laboratory Director Alex King called the past year one of "quiet but strong progress" and called for Ames Laboratory to continue to build on its strengths while responding to changing expectations for energy research.

  10. State of the Lab Address

    SciTech Connect (OSTI)

    King, Alex

    2010-01-01

    In his third-annual State of the Lab address, Ames Laboratory Director Alex King called the past year one of "quiet but strong progress" and called for Ames Laboratory to continue to build on its strengths while responding to changing expectations for energy research.

  11. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  12. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  13. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  14. Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D mSecurity Security

  15. Construction of file database management

    SciTech Connect (OSTI)

    MERRILL,KYLE J.

    2000-03-01

    This work created a database for tracking data analysis files from multiple lab techniques and equipment stored on a central file server. Experimental details appropriate for each file type are pulled from the file header and stored in a searchable database. The database also stores specific location and self-directory structure for each data file. Queries can be run on the database according to file type, sample type or other experimental parameters. The database was constructed in Microsoft Access and Visual Basic was used for extraction of information from the file header.

  16. Renewal-anomalous-heterogeneous files

    E-Print Network [OSTI]

    Ophir Flomenbom

    2010-08-13

    Renewal-anomalous-heterogeneous files are solved. A simple file is made of Brownian hard spheres that diffuse stochastically in an effective 1D channel. Generally, Brownian files are heterogeneous: the spheres' diffusion coefficients are distributed and the initial spheres' density is non-uniform. In renewal-anomalous files, the distribution of waiting times for individual jumps is exponential as in Brownian files, yet obeys: {\\psi}_{\\alpha} (t)~t^(-1-{\\alpha}), 0renewal as all the particles attempt to jump at the same time. It is shown that the mean square displacement (MSD) in a renewal-anomalous-heterogeneous file, , obeys, ~[_{nrml}]^{\\alpha}, where _{nrml} is the MSD in the corresponding Brownian file. This scaling is an outcome of an exact relation (derived here) connecting probability density functions of Brownian files and renewal-anomalous files. It is also shown that non-renewal-anomalous files are slower than the corresponding renewal ones.

  17. A Petri Net Model for Secure and Fault-Tolerant Cloud-Based Information Storage

    E-Print Network [OSTI]

    Xu, Haiping

    333 A Petri Net Model for Secure and Fault-Tolerant Cloud-Based Information Storage Daniel F. Fitch, however, with data security, reliability, and availability in the cloud. In this paper, we address these concerns by proposing a novel security mechanism for secure and fault-tolerant cloud-based information

  18. A program evaluation of on-line file organization methods 

    E-Print Network [OSTI]

    Griffith, Byron James

    1973-01-01

    addresses were extracted from the records and placed in key directories. These different methods of locating records by key information are today known as list structures (5, 6, 3). Although there are many variations of list structuring techniques..., it is helpful to observe two extremes of list structures with most others be1ng combinations of them. The association of key data and DASD addresses permits retrieval of only those records required for processing without requiring a file search (6). Since...

  19. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio August 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Security

  20. INSTITUTE FOR CYBER SECURITY Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio August-world impact #12;INSTITUTE FOR CYBER SECURITY Institute for Cyber Security Founded June 2007: still in start

  1. NSM Secure UI Crypto Module Security Policy

    E-Print Network [OSTI]

    NSM Secure UI Crypto Module Security Policy Version: 1.4 Revision Date: April 1, 2010 This document. #12;McAfee, Inc NSM Secure UI Crypto Module Security Policy Page 2 of 15 CHANGE RECORD Revision Date Module Security Policy Page 3 of 15 Contents 1 Module Overview

  2. Security for grids

    E-Print Network [OSTI]

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-01-01

    differences between Grid security and host or site securityof requirements for Grid security in order to achieve thecompletely. Index Terms — Grid security, authentication,

  3. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  4. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  5. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6. Canceled by Admin Chg 2 dated 5-15-15.

  6. Addresses and Phone Numbers | NREL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room News Publications Traditional Knowledge KiosksAbout AwardedAcronyms ThisNationalAddresses and

  7. BPA files reciprocity tariff

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    4 12 BONNEVILLE POWER ADMINISTRATION FOR IMMEDIATE RELEASE Friday, March 30, 2012 CONTACT: Doug Johnson, 503-230-5840 or 503-230-5131 BPA files reciprocity tariff Portland, Ore. -...

  8. Recommendations to Address Power Reliability Concerns Raised...

    Office of Environmental Management (EM)

    to Address Power Reliability Concerns Raised as a Result of Pending Environmental Regulations for Electric Generation Stations Recommendations to Address Power Reliability Concerns...

  9. Symbiosis: Addressing Biomass Production Challenges and Climate...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Symbiosis: Addressing Biomass Production Challenges and Climate Change Symbiosis: Addressing Biomass Production Challenges and Climate Change This presentation was the opening...

  10. Interagency Collaboration to Address Environmental Impacts of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Interagency Collaboration to Address Environmental Impacts of Shale Gas Drilling Interagency Collaboration to Address Environmental Impacts of Shale Gas Drilling April 23, 2013 -...

  11. INSPIRE and SPIRES Log File Analysis

    SciTech Connect (OSTI)

    Adams, Cole; /Wheaton Coll. /SLAC

    2012-08-31

    SPIRES, an aging high-energy physics publication data base, is in the process of being replaced by INSPIRE. In order to ease the transition from SPIRES to INSPIRE it is important to understand user behavior and the drivers for adoption. The goal of this project was to address some questions in regards to the presumed two-thirds of the users still using SPIRES. These questions are answered through analysis of the log files from both websites. A series of scripts were developed to collect and interpret the data contained in the log files. The common search patterns and usage comparisons are made between INSPIRE and SPIRES, and a method for detecting user frustration is presented. The analysis reveals a more even split than originally thought as well as the expected trend of user transition to INSPIRE.

  12. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  13. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  14. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  15. Faculty Information Security Guide

    E-Print Network [OSTI]

    Faculty Information Security Guide Dartmouth Your information is vitally important to your teaching protect your information. THE DARTMOUTH INFORMATION SECURITY COMMITTEE The Dartmouth Information Security Committee (DISC) meets monthly to assess vulnerabilities of information security, and to develop and revise

  16. SELECTING INFORMATION TECHNOLOGY SECURITY

    E-Print Network [OSTI]

    April 2004 SELECTING INFORMATION TECHNOLOGY SECURITY PRODUCTS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Information technology security prod ucts are essential to better secure infor mation technology (IT) systems

  17. Control Systems Security Test Center - FY 2004 Program Summary

    SciTech Connect (OSTI)

    Robert E. Polk; Alen M. Snyder

    2005-04-01

    In May 2004, the US-CERT Control Systems Security Center (CSSC) was established at Idaho National Laboratory to execute assessment activities to reduce the vulnerability of the nation’s critical infrastructure control systems to terrorist attack. The CSSC implements a program to accomplish the five goals presented in the US-CERT National Strategy for Control Systems Security. This report summarizes the first year funding of startup activities and program achievements that took place in FY 2004 and early FY 2005. This document was prepared for the US-CERT Control Systems Security Center of the National Cyber Security Division of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs federal departments to identify and prioritize the critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the National Cyber Security Division to address the control system security component addressed in the National Strategy to Secure Cyberspace and the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems.

  18. The Fifth Workshop on HPC Best Practices: File Systems and Archives

    SciTech Connect (OSTI)

    Hick, Jason; Hules, John; Uselton, Andrew

    2011-11-30

    The workshop on High Performance Computing (HPC) Best Practices on File Systems and Archives was the fifth in a series sponsored jointly by the Department Of Energy (DOE) Office of Science and DOE National Nuclear Security Administration. The workshop gathered technical and management experts for operations of HPC file systems and archives from around the world. Attendees identified and discussed best practices in use at their facilities, and documented findings for the DOE and HPC community in this report.

  19. Hopper File Storage and I/O

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File Storage and IO File Storage and IO Disk Quota Change Request Form Hopper File Systems Hopper has 5 user file systems which provide different degrees of storage, performance...

  20. Addressing Failures in Exascale Computing

    SciTech Connect (OSTI)

    Snir, Marc [Argonne National Laboratory (ANL)] [Argonne National Laboratory (ANL); Wisniewski, Robert [Intel Corporation] [Intel Corporation; Abraham, Jacob [unknown] [unknown; Adve, Sarita [University of Illinois, Urbana-Champaign] [University of Illinois, Urbana-Champaign; Bagchi, Saurabh [Purdue University] [Purdue University; Balaji, Pavan [Argonne National Laboratory (ANL)] [Argonne National Laboratory (ANL); Belak, J. [Lawrence Livermore National Laboratory (LLNL)] [Lawrence Livermore National Laboratory (LLNL); Bose, Pradip [IBM T. J. Watson Research Center] [IBM T. J. Watson Research Center; Cappello, Franck [Argonne National Laboratory (ANL)] [Argonne National Laboratory (ANL); Carlson, Bill [unknown] [unknown; Chien, Andrew [University of Chicago] [University of Chicago; Coteus, Paul [IBM T. J. Watson Research Center] [IBM T. J. Watson Research Center; DeBardeleben, Nathan [Los Alamos National Laboratory (LANL)] [Los Alamos National Laboratory (LANL); Diniz, Pedro [University of Southern California] [University of Southern California; Engelmann, Christian [ORNL] [ORNL; Erez, Mattan [University of Texas at Austin] [University of Texas at Austin; Fazzari, Saverio [Booz Allen Hamilton] [Booz Allen Hamilton; Geist, Al [ORNL] [ORNL; Gupta, Rinku [Argonne National Laboratory (ANL)] [Argonne National Laboratory (ANL); Johnson, Fred [Science Applications International Corporation (SAIC), Oak Ridge, TN] [Science Applications International Corporation (SAIC), Oak Ridge, TN; Krishnamoorthy, Sriram [Pacific Northwest National Laboratory (PNNL)] [Pacific Northwest National Laboratory (PNNL); Leyffer, Sven [Argonne National Laboratory (ANL)] [Argonne National Laboratory (ANL); Liberty, Dean [AMD] [AMD; Mitra, Subhasish [Stanford University] [Stanford University; Munson, Todd [Argonne National Laboratory (ANL)] [Argonne National Laboratory (ANL); Schreiber, Rob [HP Labs] [HP Labs; Stearley, Jon [Sandia National Laboratories (SNL)] [Sandia National Laboratories (SNL); Van Hensbergen, Eric [ARM] [ARM

    2014-01-01

    We present here a report produced by a workshop on Addressing failures in exascale computing' held in Park City, Utah, 4-11 August 2012. The charter of this workshop was to establish a common taxonomy about resilience across all the levels in a computing system, discuss existing knowledge on resilience across the various hardware and software layers of an exascale system, and build on those results, examining potential solutions from both a hardware and software perspective and focusing on a combined approach. The workshop brought together participants with expertise in applications, system software, and hardware; they came from industry, government, and academia, and their interests ranged from theory to implementation. The combination allowed broad and comprehensive discussions and led to this document, which summarizes and builds on those discussions.

  1. Addressing failures in exascale computing

    SciTech Connect (OSTI)

    Snir, Marc; Wisniewski, Robert W.; Abraham, Jacob A.; Adve, Sarita; Bagchi, Saurabh; Balaji, Pavan; Belak, Jim; Bose, Pradip; Cappello, Franck; Carlson, William; Chien, Andrew A.; Coteus, Paul; Debardeleben, Nathan A.; Diniz, Pedro; Engelmann, Christian; Erez, Mattan; Saverio, Fazzari; Geist, Al; Gupta, Rinku; Johnson, Fred; Krishnamoorthy, Sriram; Leyffer, Sven; Liberty, Dean; Mitra, Subhasish; Munson, Todd; Schreiber, Robert; Stearly, Jon; Van Hensbergen, Eric

    2014-05-01

    We present here a report produced by a workshop on “Addressing Failures in Exascale Computing” held in Park City, Utah, August 4–11, 2012. The charter of this workshop was to establish a common taxonomy about resilience across all the levels in a computing system; discuss existing knowledge on resilience across the various hardware and software layers of an exascale system; and build on those results, examining potential solutions from both a hardware and software perspective and focusing on a combined approach. The workshop brought together participants with expertise in applications, system software, and hardware; they came from industry, government, and academia; and their interests ranged from theory to implementation. The combination allowed broad and comprehensive discussions and led to this document, which summarizes and builds on those discussions.

  2. Integrating Security and Real-Time Requirements Using Covert

    E-Print Network [OSTI]

    Son, Sang H.

    is stated in terms of subjects and objects. An object is understood to be a data file, record, or a field to be made between security and timeliness. We first define mutual information, a measure of the degree showing the efficacy of the scheme obtained through simulation experiments are also discussed. Index Terms

  3. Nuclear security

    SciTech Connect (OSTI)

    Not Available

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected.

  4. Content-addressable memory based enforcement of configurable policies

    DOE Patents [OSTI]

    Berg, Michael J

    2014-05-06

    A monitoring device for monitoring transactions on a bus includes content-addressable memory ("CAM") and a response policy unit. The CAM includes an input coupled to receive a bus transaction tag based on bus traffic on the bus. The CAM stores data tags associated with rules of a security policy to compare the bus transaction tag to the data tags. The CAM generates an output signal indicating whether one or more matches occurred. The response policy unit is coupled to the CAM to receive the output signal from the CAM and to execute a policy action in response to the output signal.

  5. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W. (Albuquerque, NM)

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  6. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. (The original DOE O 471.6 canceled DOE M 470.4-4A, except for Section D). Admin Chg 2, dated 5-15-15, supersedes Admin Chg 1. Certified 5-21-2015.

  7. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security's IT Security Procedures require that non-public University information, including social security numbers and professional information in a secure and appropriate manner. #12;

  8. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  9. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  10. 1999 CBECS Public Use Files

    Gasoline and Diesel Fuel Update (EIA)

    oil, propane, district steam or district hot water were used in the building. HOW ARE THE PUBLIC USE FILES USED? For each group of variables, there are two items: a layout file and...

  11. 2014 Headquarters Facilities Master Security Plan- Chapter 14, Cyber Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security Describes the DOE Headquarters Cyber Security Program.

  12. EPA -- Amended Environmental Impact Statement Filing System Guidance...

    Office of Environmental Management (EM)

    Amended Environmental Impact Statement Filing System Guidance EPA -- Amended Environmental Impact Statement Filing System Guidance Amended Environmental Impact Statement Filing...

  13. Address conversion unit for multiprocessor system

    SciTech Connect (OSTI)

    Fava, T.F.; Lary, R.F.; Blackledge, R.

    1987-03-03

    An address conversion unit is described for use in one processor in a multi-processor data processing system including a common memory, the processors and common memory being interconnected by a common bus including means for transferring address signals defining a common address space. The processor includes private bus means including means for transferring signals including address signals defining a private address space. A processor unit means is connected to the private bus means and includes means for transmitting and receiving signals including address signals over the private bus means for engaging in data transfers thereover. The address conversion unit is connected to the private bus means and common bus means for receiving address signals over the private bus means from the processor unit means in the private address space. The unit comprises: A. pointer storage means for storing a pointer identifying a portion of the common bus memory space; B. pointer generation means connected to receive a common bus address and for generating a pointer in response thereto for storage in the pointer storage means; and C. common bus address generation means connected to the private bus and the pointer storage means for receiving an address from the processor unit means and for generating a common bus address in response thereto. The common bus address is used to initiate transfers between the processor unit means and the common memory over the common bus.

  14. A Hierarchical Security Architecture for Cyber-Physical Systems

    SciTech Connect (OSTI)

    Quanyan Zhu; Tamer Basar

    2011-08-01

    Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.

  15. Recommended Practice for Securing Control System Modems

    SciTech Connect (OSTI)

    James R. Davidson; Jason L. Wright

    2008-01-01

    This paper addresses an often overlooked “backdoor” into critical infrastructure control systems created by modem connections. A modem’s connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods.

  16. 2014 Headquarters Facilities Master Security Plan- Chapter 3, Personnel Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security Describes DOE Headquarters Personnel Security procedures for acquiring, maintaining, and passing security clearances.

  17. Using Operational Security (OPSEC) to Support a Cyber Security...

    Energy Savers [EERE]

    Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

  18. Principles of Security: Human, Cyber, and Biological

    E-Print Network [OSTI]

    Stacey, Blake C

    2013-01-01

    Cybersecurity attacks are a major and increasing burden to economic and social systems globally. Here we analyze the principles of security in different domains and demonstrate an architectural flaw in current cybersecurity. Cybersecurity is inherently weak because it is missing the ability to defend the overall system instead of individual computers. The current architecture enables all nodes in the computer network to communicate transparently with one another, so security would require protecting every computer in the network from all possible attacks. In contrast, other systems depend on system-wide protections. In providing conventional security, police patrol neighborhoods and the military secures borders, rather than defending each individual household. Likewise, in biology, the immune system provides security against viruses and bacteria using primarily action at the skin, membranes, and blood, rather than requiring each cell to defend itself. We propose applying these same principles to address the c...

  19. TO: FILE MEMORANDUM

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouth DakotaRobbins and700, 1. .&. ' , c 1 1;TO: FILE FROM:FILE

  20. Quantitative Methodology for Assessing State-Level Nuclear Security Measures 

    E-Print Network [OSTI]

    Myers, Christopher 1985-

    2012-11-29

    The international community faces a growing threat from nuclear terrorism. The complexity of the threats of nuclear terrorism, the variety of nuclear security measures that States can devote resources towards to address the threats, and the limited...

  1. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 supersedes DOE O 472.2 Admin Chg 1.

  2. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 cancels DOE O 472.2 Admin Chg 1.

  3. Internet Domain Name and Addressing Standard (v1.1) 3/4/2014 6:58 PM 1

    E-Print Network [OSTI]

    Patzek, Tadeusz W.

    Internet Domain Name and Addressing Standard (v1.1) 3/4/2014 6:58 PM at Austin to possess an effective presence on the Internet, and to operate, secure use of Internet names and addresses assigned to the campus inter

  4. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Infrastructure Demonstration for Energy reliability and Security) (web link) program to demonstrate: · Cyber-securityEnergy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security

  5. Climate-derived tensions in Arctic security.

    SciTech Connect (OSTI)

    Backus, George A.; Strickland, James Hassler

    2008-09-01

    Globally, there is no lack of security threats. Many of them demand priority engagement and there can never be adequate resources to address all threats. In this context, climate is just another aspect of global security and the Arctic just another region. In light of physical and budgetary constraints, new security needs must be integrated and prioritized with existing ones. This discussion approaches the security impacts of climate from that perspective, starting with the broad security picture and establishing how climate may affect it. This method provides a different view from one that starts with climate and projects it, in isolation, as the source of a hypothetical security burden. That said, the Arctic does appear to present high-priority security challenges. Uncertainty in the timing of an ice-free Arctic affects how quickly it will become a security priority. Uncertainty in the emergent extreme and variable weather conditions will determine the difficulty (cost) of maintaining adequate security (order) in the area. The resolution of sovereignty boundaries affects the ability to enforce security measures, and the U.S. will most probably need a military presence to back-up negotiated sovereignty agreements. Without additional global warming, technology already allows the Arctic to become a strategic link in the global supply chain, possibly with northern Russia as its main hub. Additionally, the multinational corporations reaping the economic bounty may affect security tensions more than nation-states themselves. Countries will depend ever more heavily on the global supply chains. China has particular needs to protect its trade flows. In matters of security, nation-state and multinational-corporate interests will become heavily intertwined.

  6. Changing Your Outlook Address Book Information

    E-Print Network [OSTI]

    Sanyal, Suman

    Changing Your Outlook Address Book Information Changes in Customer Services now allow users to update portions of their own Outlook Address Book information. To update your entry, fol- low

  7. Addressing the needs of mobile users

    E-Print Network [OSTI]

    Sohn, Timothy Youngjin

    2008-01-01

    of mobile information needs . . Pie chart of when needs wereaddressed . . Pie chart of how needs were addressed . . .Pie chart of why needs were addressed later Pie chart of why

  8. Running out of 32-bit Addresses Not all that many unique addresses

    E-Print Network [OSTI]

    the number of blocks in the compressed address ­ (-) subtract this number from 8 ­ (*) multiply the result in larger blocks · Solution: a larger address space ­ IPv6 has 128-bit addresses (2128 = 3.403 × 1038) ­ 1500 addresses/square foot of Earth's surface J 4 IPv6 vs. IPv4: Address Comparison · IPv4 has

  9. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    SciTech Connect (OSTI)

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01

    Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

  10. Scaling security in pairing-based protocols Michael Scott

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Scaling security in pairing-based protocols Michael Scott School of Computing Dublin City potential advantage in smart-card and embedded applications ­ security can be scaled up while continuing been addressed by Koblitz and Menezes [18] and Granger, Page and Smart [15]. As will be seen our

  11. From Panopticon to Fresnel, Dispelling a False Sense of Security

    E-Print Network [OSTI]

    Hand, Steven

    From Panopticon to Fresnel, Dispelling a False Sense of Security Jon Crowcroft1 and Ian Brown2 1 challenges. In this paper, we describe the Fresnel project's technology[ELMC10] that addresses Panopticon to Fresnel, Dispelling a False Sense of Security 239 afford a view onto human activities2

  12. Enforceable Security Policies Revisited DAVID BASIN, ETH Zurich

    E-Print Network [OSTI]

    Basin, David

    A Enforceable Security Policies Revisited DAVID BASIN, ETH Zurich VINCENT JUG´E, MINES Paris: Basin, D., Jug´e, V., Klaedtke, F., Zalinescu, E. Enforceable Security Policies Revisited. To appear is an extended version of the conference paper [Basin et al. 2012a]. Author's addresses: D. Basin, F. Klaedtke

  13. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia, and reactorsystemoverviews. Training in Action: Gulf Nuclear Energy InfrastructureInstitute In2011,SandiateamedwiththeNuclearSecurity energy safety, security,safeguards,andnonproliferation. Training Sandia National Laboratories experts

  14. Designing security into software

    E-Print Network [OSTI]

    Zhang, Chang Tony

    2006-01-01

    When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

  15. Self Managed Security Cell, a security model for the Internet of Things and Services

    E-Print Network [OSTI]

    de Leusse, Pierre; Dimitrakos, Theo; Nair, Srijith K; 10.1109/AFIN.2009.15

    2012-01-01

    The Internet of Things and Services is a rapidly growing concept that illustrates that the ever increasing amount of physical items of our daily life which become addressable through a network could be made more easily manageable and usable through the use of Services. This surge of exposed resources along with the level of privacy and value of the information they hold, together with the increase of their usage make for an augmentation in the number of the security threats and violation attempts that existing security systems do not appear robust enough to address. In this paper, the authors underline this increase in risk and identify the requirements for resources to be more resilient in this type of environment while keeping an important level of flexibility. In addition, the authors propose an architectural model of Self Managed Security Cell, which leverages on current knowledge in large scale security systems, information management and autonomous systems.

  16. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  17. Security | Department of Energy

    Office of Environmental Management (EM)

    Security Security Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top...

  18. Advancing Global Nuclear Security

    Broader source: Energy.gov [DOE]

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  19. Chapter 5. System security and ancillary Introduction

    E-Print Network [OSTI]

    Ernst, Damien

    Chapter 5. System security and ancillary services 1 #12;Introduction Markets for electrical energy of the other. 4 #12;Describing the needs for ancillary services Needs classified according to three different. Interactions for example between balancing and network issues. Ancillary services needed for addressing every

  20. Cover photo credits: Clockwise from top left Dave Marci, file photo, file photo, Blair E. Witherington. Background file photo.

    E-Print Network [OSTI]

    #12;Cover photo credits: Clockwise from top left ­ Dave Marci, file photo, file photo, Blair E. Witherington. Background ­ file photo. #12;Deepwater Horizon Oil Spill Phase II Early Restoration Plan

  1. Cover photo credits: Clockwise from top left Dave Marci, file photo, file photo, Blair E. Witherington. Background file photo.

    E-Print Network [OSTI]

    #12;#12;Cover photo credits: Clockwise from top left ­ Dave Marci, file photo, file photo, Blair E. Witherington. Background ­ file photo. #12;Deepwater Horizon Oil Spill Phase II Early Restoration Plan

  2. LONG TERM FILE MIGRATION - PART I: FILE REFERENCE PATTERNS

    E-Print Network [OSTI]

    Smith, A.J.

    2011-01-01

    death). or even and a renewal model two state Semi-MarkovThus model for those files displaying no trend, a renewal

  3. Study of Security Attributes of Smart Grid Systems- Current Cyber Security Issues

    SciTech Connect (OSTI)

    Wayne F. Boyer; Scott A. McBride

    2009-04-01

    This document provides information for a report to congress on Smart Grid security as required by Section 1309 of Title XIII of the Energy Independence and Security Act of 2007. The security of any future Smart Grid is dependent on successfully addressing the cyber security issues associated with the nation’s current power grid. Smart Grid will utilize numerous legacy systems and technologies that are currently installed. Therefore, known vulnerabilities in these legacy systems must be remediated and associated risks mitigated in order to increase the security and success of the Smart Grid. The implementation of Smart Grid will include the deployment of many new technologies and multiple communication infrastructures. This report describes the main technologies that support Smart Grid and summarizes the status of implementation into the existing U.S. electrical infrastructure.

  4. How Do You File A Whistleblower Complaint? | National Nuclear Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (JournalvivoHigh energyHighlandWorkshop-Summer 2014toHow Do I Work

  5. File:20121127144736519.pdf | Open Energy Information

    Open Energy Info (EERE)

    pixels, file size: 116 KB, MIME type: applicationpdf) File history Click on a datetime to view the file as it appeared at that time. DateTime Thumbnail Dimensions User...

  6. Realizing Scientific Methods for Cyber Security

    SciTech Connect (OSTI)

    Carroll, Thomas E.; Manz, David O.; Edgar, Thomas W.; Greitzer, Frank L.

    2012-07-18

    There is little doubt among cyber security researchers about the lack of scientic rigor that underlies much of the liter-ature. The issues are manifold and are well documented. Further complicating the problem is insufficient scientic methods to address these issues. Cyber security melds man and machine: we inherit the challenges of computer science, sociology, psychology, and many other elds and create new ones where these elds interface. In this paper we detail a partial list of challenges imposed by rigorous science and survey how other sciences have tackled them, in the hope of applying a similar approach to cyber security science. This paper is by no means comprehensive: its purpose is to foster discussion in the community on how we can improve rigor in cyber security science.

  7. Faculty Information Security Guide

    E-Print Network [OSTI]

    Myers, Lawrence C.

    society. www.ists.dartmouth.edu THE DARTMOUTH CYBER SECURITY INITIATIVE The Dartmouth Cyber Security, TECHNOLOGY, AND SOCIETY THE DARTMOUTH CYBER SECURITY INITIATIVE #12;The number of laptop thefts at Dartmouth, and Society; and the Dartmouth Cyber Security Initiative offer the following solutions: · Whole

  8. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  9. 1999 CBECS Public Use Files

    U.S. Energy Information Administration (EIA) Indexed Site

    only. Geographic identifiers and National Oceanic and Atmospheric Administration Weather Division identifiers are not included on any data files delivered to EIA. Geographic...

  10. U.S. Department of Energy Best Practices Workshop onFile Systems & Archives San Francisco, CA September 26-27, 2011 Position Paper

    SciTech Connect (OSTI)

    Hedges, R M

    2011-09-01

    This position paper discusses issues of usability of the large parallel file systems in the Livermore Computing Center. The primary uses of these file systems are for storage and access of data that is created during the course of a simulation running on an LC system. The Livermore Computing Center has multiple, globally mounted parallel file systems in each of its computing environments. The single biggest issue of file system usability that we have encountered through the years is to maintain continuous file system responsiveness. Given the back end storage hardware that our file systems are provisioned with, it is easily possible for a particularly I/O intensive application or one with particularly inefficiently coded I/O operations to bring the file system to an apparent halt. The practice that we will be addressing is one of having an ability to indentify, diagnose, analyze and optimize the I/O quickly and effectively.

  11. Instructions to CBECS 1995 Microdata Files

    U.S. Energy Information Administration (EIA) Indexed Site

    5 Files WHAT IS CBECS? Please Note: These microdata files, which contain building characteristics, energy consumption and expenditures, and energy end-use estimates replace the...

  12. Page 1Securing the Microsoft Cloud Securing the

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Page 1Securing the Microsoft Cloud Securing the Microsoft Cloud #12;Page 2Securing the Microsoft to have confidence in Microsoft as their preferred cloud provider. Our security policies and practices their security and compliance related needs. Securing the Microsoft Cloud #12;Page 3Securing the Microsoft Cloud

  13. Los Alamos CCS (Center for Computer Security) formal computer security model

    SciTech Connect (OSTI)

    Dreicer, J.S.; Hunteman, W.J. (Los Alamos National Lab., NM (USA))

    1989-01-01

    This paper provides a brief presentation of the formal computer security model currently being developed at the Los Alamos Department of Energy (DOE) Center for Computer Security (CCS). The initial motivation for this effort was the need to provide a method by which DOE computer security policy implementation could be tested and verified. The actual analytical model was a result of the integration of current research in computer security and previous modeling and research experiences. The model is being developed to define a generic view of the computer and network security domains, to provide a theoretical basis for the design of a security model, and to address the limitations of present models. Formal mathematical models for computer security have been designed and developed in conjunction with attempts to build secure computer systems since the early 70's. The foundation of the Los Alamos DOE CCS model is a series of functionally dependent probability equations, relations, and expressions. The mathematical basis appears to be justified and is undergoing continued discrimination and evolution. We expect to apply the model to the discipline of the Bell-Lapadula abstract sets of objects and subjects. 5 refs.

  14. Nuclear Security Summit | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Summit | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  15. MEMORANDUfl J: FILE DATE

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouth DakotaRobbins and MyersHr. Anthony V. Andolina:I.)p' : ,J: FILE

  16. TO: FILE FROM: SUBJECT:

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouth DakotaRobbins and700, 1. .&. ' , c 1 1;TO: FILE FROM: I .-

  17. Eliza File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES ScienceInformation Company Name orElectronicElenaEliza File

  18. MICROCOMP output file

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties - WAPA PublicLED1,400 Jobs |Inc.MEETINGO:\END\EPAC300.lc (file 1 of

  19. Other File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformationJesseworkSURVEYI/O Streams forOrhan Kizilkaya, Ph.D. Title:Other File Systems

  20. Building Extensible and Secure Networks

    E-Print Network [OSTI]

    Popa, Lucian

    2011-01-01

    adoption of cloud computing is security, as customers oftenpreserving security when migrating to the cloud computingto the security principals used in the cloud access control

  1. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    for Environment and National Security Scripps Institution ofMultiplying Threats to National Security Higher temperaturesefforts to protect national security. Page 2 The U.S. Armed

  2. Sandia Energy - Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessment Home Climate & Earth Systems WaterEnergy Nexus Water Monitoring & Treatment Technology Security Risk Assessment Security Risk Assessmentcwdd2015-05-04T21:...

  3. Scalable Transparent Checkpoint-Restart of Global Address Space Applications on Virtual Machines over Infiniband

    SciTech Connect (OSTI)

    Villa, Oreste; Krishnamoorthy, Sriram; Nieplocha, Jaroslaw; Brown, David ML

    2009-05-18

    Checkpoint-Restart is one of the most used software approaches to achieve fault-tolerance in high-end clusters. While standard techniques typically focus on user-level solutions, the advent of virtualization software has enabled efficient and transparent system-level approaches. In this paper, we present a scalable transparent system-level solution to address fault-tolerance for applications based on global address space (GAS) programming models on Infiniband clusters. In addition to handling communication, the solution addresses transparent checkpoint of user-generated files. We exploit the support for the Infiniband network in the Xen virtual machine environment. We have developed a version of the Aggregate Remote Memory Copy Interface (ARMCI) one-sided communication library capable of suspending and resuming applications. We present efficient and scalable mechanisms to distribute checkpoint requests and to backup virtual machines memory images and file systems. We tested our approach in the context of NWChem, a popular computational chemistry suite. We demonstrated that NWChem can be executed, without any modification to the source code, on a virtualized 8-node cluster with very little overhead (below 3%). We observe that the total checkpoint time is limited by disk I/O. Finally, we measured system-size depended components of the checkpoint time on up to 1024 cores (128 nodes), demonstrating the scalability of our approach in medium/large-scale systems.

  4. DeLib Materials Donation Form Address

    E-Print Network [OSTI]

    Chen, Tsuhan

    DeLib Materials Donation Form Name: Address: Phone Materials:____________ I, ______________________________ (signature), hereby deed this gift of library materials to the Distributed eLibrary of Weill Cornell Medical

  5. 2015 State of Indian Nations Address

    Office of Energy Efficiency and Renewable Energy (EERE)

    The President of the National Congress of American Indians will deliver his annual State of the Indian Nations address to Member of Congress, government officials, tribal leaders and citizens, and...

  6. Persian address pronouns and politeness in interaction 

    E-Print Network [OSTI]

    Nanbakhsh, Golnaz

    2011-11-23

    In this thesis, I aim to investigate the variation of Persian pronominal address system and politeness strategies in contemporary Iranian society from a quantitative and qualitative sociolinguistic perspective. I focus ...

  7. Addressing the needs of mobile users

    E-Print Network [OSTI]

    Sohn, Timothy Youngjin

    2008-01-01

    search terms o?ine on a mobile device, and then address theminput modality to a mobile device, and recognizing input cannoti?cation cues for mobile devices. In CHI ’00: CHI ’00

  8. "Exploring novel biomaterial approaches to address

    E-Print Network [OSTI]

    Zhigilei, Leonid V.

    "Exploring novel biomaterial approaches to address neurodegenerative diseases and injuries Engineering and Biomaterials Research Group Neural regeneration within the central nervous system (CNS to help effectively translate them to the clinic. We propose an innovative combination of biomaterial

  9. Shahab Ardalan Address: One Washington Sq.

    E-Print Network [OSTI]

    Su, Xiao

    , Tehran, Iran Thesis: "Design, Simulation and Synthesis of a 32-bit Math-Processor with VHDL" Math, An Awareness of Security Aspect in Design of Digital Circuits & Systems (4 Hours) - 5th IEEE International with uncertainty data", IEEE Electrical Power and Energy Conference, 2012, (6 pages) (accepted for publication) 2

  10. Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES

    E-Print Network [OSTI]

    Newby, Gregory B.

    Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES Gregory B. Newby School an active role in information security. INTRODUCTION By most accounts, the proliferation of the Internet of information security, making concrete recommendations for safeguarding information and information access

  11. T-610: Red Hat kdenetwork security update

    Broader source: Energy.gov [DOE]

    A directory traversal flaw was found in the way KGet, a download manager, handled the "file" element in Metalink files.

  12. Microgrid cyber security reference architecture.

    SciTech Connect (OSTI)

    Veitch, Cynthia K.; Henry, Jordan M.; Richardson, Bryan T.; Hart, Derek H.

    2013-07-01

    This document describes a microgrid cyber security reference architecture. First, we present a high-level concept of operations for a microgrid, including operational modes, necessary power actors, and the communication protocols typically employed. We then describe our motivation for designing a secure microgrid; in particular, we provide general network and industrial control system (ICS)-speci c vulnerabilities, a threat model, information assurance compliance concerns, and design criteria for a microgrid control system network. Our design approach addresses these concerns by segmenting the microgrid control system network into enclaves, grouping enclaves into functional domains, and describing actor communication using data exchange attributes. We describe cyber actors that can help mitigate potential vulnerabilities, in addition to performance bene ts and vulnerability mitigation that may be realized using this reference architecture. To illustrate our design approach, we present a notional a microgrid control system network implementation, including types of communica- tion occurring on that network, example data exchange attributes for actors in the network, an example of how the network can be segmented to create enclaves and functional domains, and how cyber actors can be used to enforce network segmentation and provide the neces- sary level of security. Finally, we describe areas of focus for the further development of the reference architecture.

  13. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  14. Office of Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  15. INFRASTRUCTURE SECURITY & ENERGY

    E-Print Network [OSTI]

    Schrijver, Karel

    INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Real Time Monitoring of Energy Infrastructure Status Patrick Willging, PE Office of Electricity Delivery and Energy Reliability #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY

  16. nevada national security site

    National Nuclear Security Administration (NNSA)

    7%2A en Nevada National Security Site operator recognized for green fleet http:www.nnsa.energy.govblognevada-national-security-site-operator-recognized-green-fleet

    The...

  17. Security system signal supervision

    SciTech Connect (OSTI)

    Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  18. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  19. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    Pew Project on National Security, Energy and Climate http://of climate change, energy security and economic stability.DoD is improving U.S. energy security and national security.

  20. A preliminary version of this paper appears in the proceedings of ESORICS 2014. This is the full version. Even more practical secure logging

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    version. Even more practical secure logging: Tree-based Seekable Sequential Key Generators Giorgia Azzurra building block. In this paper we revisit the challenge of marrying forward-secure key generation with seek. Not less important is the role that log files play in computer forensics: events like login failures

  1. Secure Core Contact Information

    E-Print Network [OSTI]

    Secure Core Contact Information C. E. Irvine irvine@nps.edu 831-656-2461 Department of Computer for the secure management of local and/or remote information in multiple contexts. The SecureCore project Science Graduate School of Operations and Information Sciences www.cisr.nps.edu Project Description

  2. Information Security Guide

    E-Print Network [OSTI]

    Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

  3. cyber security guru

    E-Print Network [OSTI]

    Sandhu, Ravi

    cyber security guru By: Virginia Scott Posted: 4/17/07 UTSA has received a grant from the Texas Emerging Fund to create an institute for cyber security research. According to UTSA industry and educational initiatives in Texas. The creation of UTSA's Institute for Cyber Security Research

  4. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Energy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security

  5. Large Scale Analysis of BitTorrent Proxy for Green Internet File Sharing

    E-Print Network [OSTI]

    Özkasap, Öznur

    -based approach. Keywords: BitTorrent, Energy Efficiency, Green Internet 1 Introduction With energy efficiencyLarge Scale Analysis of BitTorrent Proxy for Green Internet File Sharing Sena Cebeci1 , Oznur,oozkasap}@ku.edu.tr,giuseppe.anastasi@iet.unipi.it Abstract. Addressing energy efficiency in P2P services has the poten- tial to make the Internet greener

  6. Tagged-MapReduce: A General Framework for Secure Computing with Mixed-Sensitivity Data on Hybrid Clouds

    E-Print Network [OSTI]

    Chang, Ee-Chien

    -MapReduce, a general extension to MapReduce that supports secure computing with mixed-sensitivity data on hybrid clouds. Keywords-Data security; MapReduce; hybrid clouds; infor- mation leakage I. INTRODUCTION Cloud computing development [1]. However, hybrid cloud computing needs to address the security and privacy issues with public

  7. Appears as IBM Research Report RC 19981, March 1994. Secure Transport Protocols for HighSpeed Networks

    E-Print Network [OSTI]

    Bellare, Mihir

    Appears as IBM Research Report RC 19981, March 1994. Secure Transport Protocols for High are most naturally associated with the transport level and best addressed by the design of secure transport secure transport protocol. \\Lambda IBM T.J. Watson Research Center, P.O. Box 704, Yorktown Heights, NY

  8. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W.

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  9. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  10. Shared address collectives using counter mechanisms

    DOE Patents [OSTI]

    Blocksome, Michael; Dozsa, Gabor; Gooding, Thomas M; Heidelberger, Philip; Kumar, Sameer; Mamidala, Amith R; Miller, Douglas

    2014-02-18

    A shared address space on a compute node stores data received from a network and data to transmit to the network. The shared address space includes an application buffer that can be directly operated upon by a plurality of processes, for instance, running on different cores on the compute node. A shared counter is used for one or more of signaling arrival of the data across the plurality of processes running on the compute node, signaling completion of an operation performed by one or more of the plurality of processes, obtaining reservation slots by one or more of the plurality of processes, or combinations thereof.

  11. Cheaper Adjoints by Reversing Address Computations

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Hascoët, L.; Utke, J.; Naumann, U.

    2008-01-01

    The reverse mode of automatic differentiation is widely used in science and engineering. A severe bottleneck for the performance of the reverse mode, however, is the necessity to recover certain intermediate values of the program in reverse order. Among these values are computed addresses, which traditionally are recovered through forward recomputation and storage in memory. We propose an alternative approach for recovery that uses inverse computation based on dependency information. Address storage constitutes a significant portion of the overall storage requirements. An example illustrates substantial gains that the proposed approach yields, and we show use cases in practical applications.

  12. T-531: The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500

    Broader source: Energy.gov [DOE]

    The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.2(3) permits the viewing of CIFS shares even when CIFS file browsing has been disabled, which allows remote authenticated users to bypass intended access restrictions via CIFS requests, aka Bug ID CSCsz80777.

  13. Reading File Bonneville Power Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Reading File Bonneville Power Administration P.O. Box 3621 Portland, Oregon 97208-3621 POWER SERVICES In reply refer to: PG-5 Ms. Renata Kurschner Director, Generation Resource...

  14. Hopper /scratch file system slow

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    count has been set back to 2 on Aug 5. The file stripe count of 1 triggered a bug with "cp -p" in a loop calling sytem function ioctl(). The bug has been fixed in new Lustre...

  15. Using pico to edit files

    E-Print Network [OSTI]

    Using pico to edit files. Someday you might want to learn emacs or vi. They are much more powerful editors than pico, but much more complicated, too. I have ...

  16. Mapping virtual addresses to different physical addresses for value disambiguation for thread memory access requests

    DOE Patents [OSTI]

    Gala, Alan; Ohmacht, Martin

    2014-09-02

    A multiprocessor system includes nodes. Each node includes a data path that includes a core, a TLB, and a first level cache implementing disambiguation. The system also includes at least one second level cache and a main memory. For thread memory access requests, the core uses an address associated with an instruction format of the core. The first level cache uses an address format related to the size of the main memory plus an offset corresponding to hardware thread meta data. The second level cache uses a physical main memory address plus software thread meta data to store the memory access request. The second level cache accesses the main memory using the physical address with neither the offset nor the thread meta data after resolving speculation. In short, this system includes mapping of a virtual address to a different physical addresses for value disambiguation for different threads.

  17. HR System Access Request Form Security Administration, Human Resources (HR) For additional instructions and information, log onto http://hr.vanderbilt.edu/security/

    E-Print Network [OSTI]

    Simaan, Nabil

    instructions and information, log onto http://hr.vanderbilt.edu/security/ Home Department VUnet IDHR EmployeeHR System Access Request Form Security Administration, Human Resources (HR) For additional ID Name Email AddressWork Phone Home Dept Name Effective Date of Access Operator Information I

  18. Financing Innovation to Address Global Climate Change

    Broader source: Energy.gov [DOE]

    The U.S. Department of Energy’s Loan Programs Office (LPO) is helping address the global challenge of climate change by providing critical financing needed to deploy some of the world’s largest and most innovative clean energy and advanced technology vehicles manufacturing projects, preventing more than 25 million metric tons of CO2 emissions to date.

  19. Address: Computer Sciences Department University of Tulsa

    E-Print Network [OSTI]

    Sen, Sandip

    VITA Sandip Sen Address: Computer Sciences Department University of Tulsa 600 South College Avenue Tulsa, OK 74104-3189 Phone: 918-631-2985 FAX: 918-631-3077 e-mail: sandip@utulsa.edu URL: http, University of Tulsa, Tulsa, OK (September, 2004 ­ present) Associate Professor, Department of Mathematical

  20. An electronically addressed spatial light modulator 

    E-Print Network [OSTI]

    McKnight, Douglas J

    pixelated binary spatial light modulator operating in reflection. Each pixel contains a memory element which stores the programmed logical state of the pixel. The addressing and pixel circuits were fabricated in a 1.5m nMOS technology on a 10 mm square chip...

  1. Addressable Advertising on Digital Television Vincent Dureau

    E-Print Network [OSTI]

    Masthoff, Judith

    Addressable Advertising on Digital Television Vincent Dureau Chief Technology Officer, OpenTV 275 of digital technology is having a profound effect on television advertising. While television advertising costs are increasing, its efficiency is decreasing. The traditional models for advertising on television

  2. A. General Information A1 Address Information

    E-Print Network [OSTI]

    Maxwell, Bruce D.

    .montana.edu/wwwcat/appopts.html A2 Source of institutional control (Check only one): A2 Public X A3 Classify your undergraduate of students for each of the following categories as of the institution's official fall reporting dateA. General Information A1 Address Information A1 Name of College/University: Montana State

  3. A. GENERAL INFORMATION A1. Address Information

    E-Print Network [OSTI]

    Kunkle, Tom

    @cofc.edu Is there a separate URL application site on the Internet? If so, pleasespecify: A2. Source of institutional control categories as of the institution's official fall reporting date or as of October 15, 2002. FULL-TIME PARTA. GENERAL INFORMATION A1. Address Information Name of College or University College of Charleston

  4. UNO Student ID Number__________________________________________________________________ Permanent Mailing Address________________________________________________________________

    E-Print Network [OSTI]

    Li, X. Rong

    UNO Graduate Other adult occupants must be either a spouse, domestic partner, or a relative that is a full-time UNO student and at least 21 years old at the time of application. If applicable, a copy.00. Personal Information Other Adult Occupant LAST FIRST MIDDLE Mailing Address: UNO Office of Student Housing

  5. Strategies for Overcoming Key Barriers to Development of a National Security Workforce

    SciTech Connect (OSTI)

    2008-06-30

    This report documents the strategies for overcoming identified key barriers to development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP) being performed under a Department of Energy (DOE) National Nuclear Security Administration (NNSA) grant. Many barriers currently exist that prevent the development of an adequate number of properly trained national security personnel. The identified strategies to address the barriers will focus on both short-term and long-term efforts, as well as strategies to capture legacy knowledge of retiring national security workforce personnel.

  6. Secure password-based authenticated key exchange for web services

    SciTech Connect (OSTI)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  7. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security.cuny.edu Published: November 2014 Holiday Season Phishing Scams and Malware Campaigns CUNY/CIS Information Security.cuny.edu under "CUNY Issued Security Advisories" Visit the Federal Trade Commission's Consumer Information page

  8. INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY

    E-Print Network [OSTI]

    Subramanian, Sriram

    - 1 ­ INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable ­ INFORMATION SECURITY POLICY.doc Introduction Why Information Security? The access, availability

  9. Information Security Governance: When Compliance Becomes more Important than Security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Information Security Governance: When Compliance Becomes more Important than Security Terence Tan1 information security must adapt to changing conditions by extending security governance to middle management for implementing information security are more interested in complying with organizational standards and policies

  10. GAANN -Computer Systems Security GAANN Computer Systems Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important is critical October 7, 2009 GAANN ­ Computer Systems Security 1 #12;GAANN - Computer Systems Security

  11. Federated Cloud Security Architecture for Secure and Agile Clouds

    E-Print Network [OSTI]

    Xu, Shouhuai

    Federated Cloud Security Architecture for Secure and Agile Clouds Weiliang Luo, Li Xu, Zhenxin Zhan. This chapter introduces the novel federated cloud security architecture that includes proactive cloud defense technologies for secure and agile cloud development. The federated security architecture consists of a set

  12. Where computer security meets national security1 Helen Nissenbaum

    E-Print Network [OSTI]

    Nissenbaum, Helen

    of International Relations. Key words: cyber-security, computer security, securitization Introduction OverWhere computer security meets national security1 Helen Nissenbaum Department of Culture conceptions of security in contemporary concerns over the vulnerability of computers and networks to hostile

  13. Towards Secure Information Sharing Models for Community Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu, Ram Krishnan and Gregory B. White Institute for Cyber Security University of Texas at San Antonio #12;Secure Information ­ Security mechanisms such as authentication, cryptography, trusted hardware, etc. #12;Community Cyber

  14. Secure sharing of random bits over the Internet

    E-Print Network [OSTI]

    Geraldo A. Barbosa

    2007-05-17

    Although one-time pad encrypted files can be sent through Internet channels, the need for renewing shared secret keys have made this method unpractical. This work presents a scheme to turn practical the fast sharing of random keys over arbitrary Internet channels. Starting with a shared secret key sequence of length K_0 the users end up with a secure new sequence K >> K_0. Using these sequences for posteriori message encryption the legitimate users have absolute security control without the need for third parties. Additionally, the security level does not depend on the unproven difficulty of factoring numbers in primes. In the proposed scheme a fast optical random source generates random bits and noise for key renewals. The transmitted signals are recorded signals that carries both the random binary signals to be exchanged and physical noise that cannot be eliminated by the attacker. These signals allow amplification over the Internet network without degrading security. The proposed system is also secure against a-posteriori known-plaintext attack on the key. Information-theoretic analysis is presented and bounds for secure operation are quantitatively determined.

  15. Implementing Advances in Transport Security Technologies | Department...

    Office of Environmental Management (EM)

    Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies More...

  16. DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY

    SciTech Connect (OSTI)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

  17. Cyber Security & Smart Grid 

    E-Print Network [OSTI]

    Shapiro, J.

    2011-01-01

    and interoperability ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Vulnerabilities In The Legacy Power Grid ? SCADA Security ? Supervisory Control and Data Acquisition (SCADA) systems are used extensively to control and monitor the national... & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart Grid Networks...

  18. Managing Expectations: the European Union and Human Security at the United Nations 

    E-Print Network [OSTI]

    Bouchard, Caroline

    2008-01-01

    This thesis explores the conditions under which the EU is an effective actor at the United Nations in the policy area of human security. Since the late 1990s, the United Nations has been increasingly active in addressing ...

  19. Supervisory Industrial Security Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as the Deputy Assistant Manager for Safeguards, Security, and Emergency Management sharing the overall responsibility for execution of the...

  20. Oil Security Metrics Model

    SciTech Connect (OSTI)

    Greene, David L.; Leiby, Paul N.

    2005-03-06

    A presentation to the IWG GPRA USDOE, March 6, 2005, Washington, DC. OSMM estimates oil security benefits of changes in the U.S. oil market.

  1. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  2. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:www.nnsa.energy.govaboutusourprogramsnuclearsecurity

  3. Natlonal Nuclear Security Admlnlstratlon

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Natlonal Nuclear Security Admlnlstratlon Washington, DC 20585 January 18, 2007 OFFICE OF THE ADMINISTRATOR MEMORANDUM FOR The Deputy Secretary FROM: SUBJECT: Linton F. Brooks...

  4. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Washington, DC 20585 MEMORANDUM FOR THE ADMINISTRATOR FROM: THEODORE D. SHERRY II 4 flA. * -. SUBJECT: REFERENCE: NATIONAL SECURITY ENTI's'E FIELD COUNCIL CHAIR ACTION:...

  5. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    30 nonprofit organizations to receive monetary donations from Los Alamos National Security, LLC June 25, 2012 Recognizing employee and retiree volunteer efforts LOS ALAMOS, NEW...

  6. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01

    Information and communication systems’ securityTrust: An Element of Information Security,” in Security andInternational Journal of Information Security, vol. 4, pp.

  7. August 2003 IT SECURITY METRICS

    E-Print Network [OSTI]

    August 2003 IT SECURITY METRICS Elizabeth B. Lennon, Editor Information Technology Laboratory approach to measuring information security. Evaluating security at the sys tem level, IT security metrics and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

  8. Cloud Security by Max Garvey

    E-Print Network [OSTI]

    Tolmach, Andrew

    Cloud Security Survey by Max Garvey #12;Cloudy Cloud is Cloudy What is the cloud? On Demand Service, performance SECaaS - Cloud hosted security measures Certifications - measurements for cloud security. #12;Cloud Questions If you have $0 security budget, could cloud be a security improvement? Who owns the data

  9. Security Division 2007 Annual Report

    E-Print Network [OSTI]

    research programs. These programs, which include Cyber Security, Pervasive Information TechnologiesComputer Security Division 2007 Annual Report #12;TAble of ConTenTS Welcome Division Organization The Computer Security Division Responds to the Federal Information Security Management Act of 2002 Security

  10. 2014 Headquarters Facilities Master Security Plan- Chapter 1, Physical Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security Describes DOE Headquarters Physical Security procedures related to badges, inspections, access controls, visitor controls, and removal of government property.

  11. Headquarters Facilities Master Security Plan - Chapter 10, Security...

    Office of Environmental Management (EM)

    be completed each year by all those who hold a security clearance; and the Security Termination Briefing, which is conducted when a person no longer requires a security clearance....

  12. Comparison of Routable Control System Security Approaches

    SciTech Connect (OSTI)

    Edgar, Thomas W.; Hadley, Mark D.; Carroll, Thomas E.; Manz, David O.; Winn, Jennifer D.

    2011-06-01

    This document is an supplement to the 'Secure and Efficient Routable Control Systems.' It addressed security in routable control system communication. The control system environment that monitors and manages the power grid historically has utilized serial communication mechanisms. Leased-line serial communication environments operating at 1200 to 9600 baud rates are common. However, recent trends show that communication media such as fiber, optical carrier 3 (OC-3) speeds, mesh-based high-speed wireless, and the Internet are becoming the media of choice. In addition, a dichotomy has developed between the electrical transmission and distribution environments, with more modern communication infrastructures deployed by transmission utilities. The preceding diagram represents a typical control system. The Communication Links cloud supports all of the communication mechanisms a utility might deploy between the control center and devices in the field. Current methodologies used for security implementations are primarily led by single vendors or standards bodies. However, these entities tend to focus on individual protocols. The result is an environment that contains a mixture of security solutions that may only address some communication protocols at an increasing operational burden for the utility. A single approach is needed that meets operational requirements, is simple to operate, and provides the necessary level of security for all control system communication. The solution should be application independent (e.g., Distributed Network Protocol/Internet Protocol [DNP/IP], International Electrotechnical Commission [IEC] C37.118, Object Linking and Embedding for Process Control [OPC], etc.) and focus on the transport layer. In an ideal setting, a well-designed suite of standards for control system communication will be used for vendor implementation and compliance testing. An expected outcome of this effort is an international standard.

  13. CMSC 412 Project #5 File System

    E-Print Network [OSTI]

    Hollingsworth, Jeffrey K.

    will be emailed to you). CFS - Chameleon FileSystem The main part of this project is to develop a new filesystem. The second IDE disk's image is called diskd.img. CFS will provide a filesystem that includes multiple. Then you can mount the CFS file system on drive 1 onto /d, for instance. VFS and file operations Since

  14. Securing Embedded User Interfaces: Android and Beyond Franziska Roesner and Tadayoshi Kohno

    E-Print Network [OSTI]

    Washington at Seattle, University of

    Securing Embedded User Interfaces: Android and Beyond Franziska Roesner and Tadayoshi Kohno over time to address many of these issues, mo- bile systems like Android -- which do not yet support, and research sys- tems. We describe our experience modifying Android to support secure interface embedding

  15. ON THE DESIGN OF AN IMMERSIVE ENVIRONMENT FOR SECURITY-RELATED STUDIES

    E-Print Network [OSTI]

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 3.1.1 Internet Worm History . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 iii #12 The Internet has become an essential part of normal operations of both public and private sectors. Many security issues are not addressed in the original Internet design, and security now has become a large

  16. Security Challenges for User-Oriented RFID Applications within the `Internet of Things'

    E-Print Network [OSTI]

    Hancke, Gerhard

    Security Challenges for User-Oriented RFID Applications within the `Internet of Things' G.P. HANCKE to be an important building block of the `Internet of Things' and examine how RFID, assisted by the deployment of NFC will need to address. Keywords: RFID, NFC, security, `Internet of Things', user-oriented architecture 1

  17. The Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure Computing Corporation

    E-Print Network [OSTI]

    Andersen, Dave

    Computing Corporation Stephen Smalley, Peter Loscocco National Security Agency Mike Hibler, David AndersenThe Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure be flexible in their support for security policies, providing sufficient mechanisms for supporting the wide

  18. Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you not findGeoscience/EnvironmentGlobal Security Global Security We

  19. Addressing the Crisis in Fundamental Physics

    E-Print Network [OSTI]

    Christopher W. Stubbs

    2007-12-18

    I present the case for fundamental physics experiments in space playing an important role in addressing the current "dark energy'' crisis. If cosmological observations continue to favor a value of the dark energy equation of state parameter w=-1, with no change over cosmic time, then we will have difficulty understanding this new fundamental physics. We will then face a very real risk of stagnation unless we detect some other experimental anomaly. The advantages of space-based experiments could prove invaluable in the search for the a more complete understanding of dark energy. This talk was delivered at the start of the Fundamental Physics Research in Space Workshop in May 2006.

  20. Address (Smart Grid Project) | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to:EAand DaltonSolar Energy LLC JumpInformationAddingFrance)Address (Smart

  1. Security tasks are highly interdependent.

    E-Print Network [OSTI]

    Exchange of Information Develop security tools that: · Integrate information from different communication channels · Provide flexible reporting (reports adapted to the recipient) · Communicate security information Security practitioners perform many activities: · Information exchanged in different formats across

  2. Security Cases | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Cases Security Cases RSS June 19, 2015 PSH-15-0011 - In the Matter of Personnel Security Hearing On June 19, 2015, an OHA Administrative Judge (AJ) issued a decision in...

  3. Computer Security Incident Handling Guide

    E-Print Network [OSTI]

    Computer Security Incident Handling Guide Recommendationsof the National Institute of Standards Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD Tom Millar United States Computer Emergency Readiness Team National Cyber Security Division

  4. Security Policy: Radio Network Controller

    E-Print Network [OSTI]

    Security Policy: Radio Network Controller Encryption Module Controller (RNC EMC) Cryptographic, 2007 Security Policy: RNC EMC Page 1 of 22 #12;Security Policy: RNC EMC Page 2 of 22 #12;Table...........................................................14 7. IDENTIFICATION AND AUTHENTICATION POLICY

  5. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  6. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  7. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND 2012-1670P Ensuring the Safe Containment

  8. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear

  9. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Supersedes DOE P 470.1.

  10. CIOs Uncensored: Security Smarts.

    SciTech Connect (OSTI)

    Johnson, Gerald R.

    2008-02-25

    This commentary for the CIOs Uncensored section of InformationWeek will discuss PNNL’s “defense in depth” approach to cyber security. It will cover external and internal safeguards, as well as the all-important role of employees in the cyber security equation. For employees are your greatest vulnerability – and your last line of defense.

  11. Engineering secure software 

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01

    -the-fact fixes in the form of software patches. The root causes for security problems in software are explored. A survey of research attempts at engineering secure software is presented. The techniques discussed range from those that are very similar...

  12. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  13. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Energy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W the computational, physics

  14. International Nuclear Security

    SciTech Connect (OSTI)

    Doyle, James E.

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  15. Addressing Biomass Supply Chain Challenges With AFEX(tm) Technology...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addressing Biomass Supply Chain Challenges With AFEX(tm) Technology Addressing Biomass Supply Chain Challenges With AFEX(tm) Technology Plenary IV: Advances in Bioenergy...

  16. Addressable morphology control of silica structures by manipulating...

    Office of Scientific and Technical Information (OSTI)

    Addressable morphology control of silica structures by manipulating the reagent addition time Citation Details In-Document Search Title: Addressable morphology control of silica...

  17. Okaloosa Gas District Smart Grid RFI: Addressing Policy and Logistical...

    Office of Environmental Management (EM)

    Okaloosa Gas District Smart Grid RFI: Addressing Policy and Logistical Challenges to Smart Grid Implementation Okaloosa Gas District Smart Grid RFI: Addressing Policy and...

  18. Smart Grid RFI: Addressing Policy and Logistical Challenges....

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Smart Grid RFI: Addressing Policy and Logistical Challenges. Comments of the Alliance to Save Energy. Smart Grid RFI: Addressing Policy and Logistical Challenges. Comments of the...

  19. Southern Company: DOE Smart Grid RFI Addressing Policy and Logistical...

    Energy Savers [EERE]

    Southern Company: DOE Smart Grid RFI Addressing Policy and Logistical Challenges Southern Company: DOE Smart Grid RFI Addressing Policy and Logistical Challenges Southern Company:...

  20. Steffes Corporation Smart Grid RFI: Addressing Policy and Logistical...

    Office of Environmental Management (EM)

    Steffes Corporation Smart Grid RFI: Addressing Policy and Logistical Challenges Steffes Corporation Smart Grid RFI: Addressing Policy and Logistical Challenges Steffes Corporation...

  1. Pepco Holdings, Inc. Smart Grid RFI: Addressing Policy and Logistical...

    Energy Savers [EERE]

    Pepco Holdings, Inc. Smart Grid RFI: Addressing Policy and Logistical Challenges Pepco Holdings, Inc. Smart Grid RFI: Addressing Policy and Logistical Challenges Pepco Holdings,...

  2. Natural Gas Industry Comments on Smart Grid RFI: Addressing Policy...

    Energy Savers [EERE]

    Natural Gas Industry Comments on Smart Grid RFI: Addressing Policy and Logistical Challenges to Smart Grid Natural Gas Industry Comments on Smart Grid RFI: Addressing Policy and...

  3. Progress Energy draft regarding Smart Grid RFI: Addressing Policy...

    Energy Savers [EERE]

    Progress Energy draft regarding Smart Grid RFI: Addressing Policy and Logistical Challenges Progress Energy draft regarding Smart Grid RFI: Addressing Policy and Logistical...

  4. Dairyland Power Cooperative Comments on Smart Grid RFI: Addressing...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Dairyland Power Cooperative Comments on Smart Grid RFI: Addressing Policy and Logistical Challenges Dairyland Power Cooperative Comments on Smart Grid RFI: Addressing Policy and...

  5. DOE NSF Partnership to Address Critical Challenges in Hydrogen...

    Office of Environmental Management (EM)

    NSF Partnership to Address Critical Challenges in Hydrogen Production from Solar Water Splitting DOE NSF Partnership to Address Critical Challenges in Hydrogen Production from...

  6. Policy Agenda for Addressing Climate Change in Bangladesh: Copenhagen...

    Open Energy Info (EERE)

    Policy Agenda for Addressing Climate Change in Bangladesh: Copenhagen and Beyond Jump to: navigation, search Name Policy Agenda for Addressing Climate Change in Bangladesh:...

  7. NBP RFI-Addressing Policy and Logistical Challenges to Smart...

    Office of Environmental Management (EM)

    NBP RFI-Addressing Policy and Logistical Challenges to Smart Grid Implementation. September 10, 2009 NBP RFI-Addressing Policy and Logistical Challenges to Smart Grid...

  8. Addressing mechanical reliability issues in Sandia MEMS devices...

    Office of Scientific and Technical Information (OSTI)

    Addressing mechanical reliability issues in Sandia MEMS devices. Citation Details In-Document Search Title: Addressing mechanical reliability issues in Sandia MEMS devices. No...

  9. Addressing Uncertainties in Design Inputs: A Case Study of Probabilist...

    Office of Environmental Management (EM)

    Addressing Uncertainties in Design Inputs: A Case Study of Probabilistic Settlement Evaluations for Soft Zone Collapse at SWPF Addressing Uncertainties in Design Inputs: A Case...

  10. Protocol for Addressing Induced Seismicity Associated with Enhanced...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems (EGS) Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems...

  11. Protocol for Addressing Induced Seismicity Associated with Enhanced...

    Energy Savers [EERE]

    Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems Protocol for Addressing Induced Seismicity Associated with Enhanced Geothermal Systems This...

  12. New York Independent System Operator, Smart Grid RFI: Addressing...

    Office of Environmental Management (EM)

    Independent System Operator, Smart Grid RFI: Addressing Policy and Logistical Challenges. New York Independent System Operator, Smart Grid RFI: Addressing Policy and Logistical...

  13. Exploring the Utilization of Complex Algal Communities to Address...

    Office of Environmental Management (EM)

    to Address Algal Pond Crash and Increase Annual Biomass Production for Algal Biofuels Exploring the Utilization of Complex Algal Communities to Address Algal Pond Crash...

  14. Strategies to Address Split Incentives in Multifamily Buildings...

    Office of Environmental Management (EM)

    Strategies to Address Split Incentives in Multifamily Buildings Strategies to Address Split Incentives in Multifamily Buildings Better Buildings Neighborhood Program Multifamily ...

  15. Smart-Grid Security Issues

    SciTech Connect (OSTI)

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  16. Secure Virtualization with Formal Methods

    E-Print Network [OSTI]

    Sturton, Cynthia

    2013-01-01

    cloud computing, virtualization software has a variety of security-cloud computing, researchers have proposed using system virtualization software as a platform to increase the security

  17. Program Areas | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Organizations National Security Home | Science & Discovery | National Security | Program Areas SHARE Program Areas image Oak Ridge National Laboratory (ORNL) has a robust...

  18. Office of Secure Transportation Activities

    Office of Environmental Management (EM)

    6th, 2012 WIPP Knoxville, TN OFFICE OF SECURE TRANSPORTATION Agency Integration Briefing Our Mission To provide safe and secure ground and air transportation of nuclear weapons,...

  19. Security Rulemaking | Department of Energy

    Office of Environmental Management (EM)

    Activities Transportation Security Rulemaking Activities at the U.S. Nuclear Regulatory Commission NRC Transportation Security (Part 73 SNF Update and Part 37 Category 1...

  20. National Nuclear Security Administration Overview

    Office of Environmental Management (EM)

    May 11, 2011 Ahmad Al-Daouk Manager, National Security Department (NSD) National Nuclear Security Administration (NNSA) Service Center - Albuquerque, NM May 11, 2011 - Page 2...

  1. Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions

    E-Print Network [OSTI]

    Tehranipoor, Mohammad

    of New Mexico ABSTRACT This paper addresses a new threat to the security of integrated circuits (ICs depends on the application, with some designed to disable the system or degrade signal integrity, while are Trojan-free. 2) Trojan circuits are by design activated under very specific conditions, which makes

  2. Advanced Security Infrastructures for Grid Education Prof R.O. Sinnott, A.J. Stell, Dr J.P. Watt, Prof D.W. Chadwick,

    E-Print Network [OSTI]

    Kent, University of

    Advanced Security Infrastructures for Grid Education Prof R.O. Sinnott, A.J. Stell, Dr J.P. Watt domain. Keywords: Grid, education, Security, PERMIS, Shibboleth. 1. Introduction As Grid technology addressing these challenges. This is one of the first full Grid computing courses available today. Security

  3. Tensions in collaborative cyber security and how they affect incident detection and response

    SciTech Connect (OSTI)

    Fink, Glenn A.; McKinnon, Archibald D.; Clements, Samuel L.; Frincke, Deborah A.

    2009-12-01

    Security often requires collaboration, but when multiple stakeholders are involved, it is typical for their priorities to differ or even conflict with one another. In today’s increasingly networked world, cyber security collaborations may span organizations and countries. In this chapter, we address collaboration tensions, their effects on incident detection and response, and how these tensions may potentially be resolved. We present three case studies of collaborative cyber security within the U.S. government and discuss technical, social, and regulatory challenges to collaborative cyber security. We suggest possible solutions, and present lessons learned from conflicts. Finally, we compare collaborative solutions from other domains and apply them to cyber security collaboration. Although we concentrate our analysis on collaborations whose purpose is to achieve cyber security, we believe that this work applies readily to security tensions found in collaborations of a general nature as well.

  4. On Building Secure SCADA Systems using Security Eduardo B. Fernandez

    E-Print Network [OSTI]

    Wu, Jie

    On Building Secure SCADA Systems using Security Patterns Eduardo B. Fernandez Dept. of Comp. Sci, also known as the supervisory, control, and data acquisition (SCADA) system. On the other hand systems. This paper aims to propose methods to build a secure SCADA system using security patterns

  5. INSTITUTE FOR CYBER SECURITY Application-Centric Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Dr. Robert W. Gracy Vice President

  6. INSTITUTE FOR CYBER SECURITY Application-Centric Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

  7. Towards Secure Information Sharing Models for Community Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu Dept. of Computer Science Institute for Cyber Security University of Texas at San Antonio Email: ravi.sandhu@utsa.edu Ram Krishnan Dept. of Electrical and Computer Engineering Institute for Cyber Security University

  8. INSTITUTE FOR CYBER SECURITY Application-Centric Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio June 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Dr. Robert W. Gracy Vice President

  9. 1Computer Security Shambhu Upadhyaya Cyber Security @CEISARE

    E-Print Network [OSTI]

    Upadhyaya, Shambhu

    , there are 100+ centers ­ Based on curriculum mapping to CNSS (committee of National Security Standards) 4011 at Google (2010) · Threats to national security ­ Insider attacks ­ Examples: Bradley Manning leaked1Computer Security Shambhu Upadhyaya Cyber Security @CEISARE Professor S. Upadhyaya Department

  10. A SECURE EUROPE IN A BETTER WORLD EUROPEAN SECURITY STRATEGY

    E-Print Network [OSTI]

    Sussex, University of

    EN A SECURE EUROPE IN A BETTER WORLD EUROPEAN SECURITY STRATEGY Brussels, 12 December 2003 #12;1 EN's complex problems on its own Introduction Europe has never been so prosperous, so secure nor so free problems on its own. Europe still faces security threats and challenges. The outbreak of conflict

  11. SecuritySmart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D mSecurity SecuritySecuritySmart

  12. Small file aggregation in a parallel computing system

    DOE Patents [OSTI]

    Faibish, Sorin; Bent, John M.; Tzelnic, Percy; Grider, Gary; Zhang, Jingwang

    2014-09-02

    Techniques are provided for small file aggregation in a parallel computing system. An exemplary method for storing a plurality of files generated by a plurality of processes in a parallel computing system comprises aggregating the plurality of files into a single aggregated file; and generating metadata for the single aggregated file. The metadata comprises an offset and a length of each of the plurality of files in the single aggregated file. The metadata can be used to unpack one or more of the files from the single aggregated file.

  13. NATURE BIOTECHNOLOGY VOLUME 25 NUMBER 6 JUNE 2007 627 DNA synthesis and biological security

    E-Print Network [OSTI]

    Church, George M.

    Bügl, John P Danner, Robert J Molinari, John T Mulligan, Han-Oh Park, Bas Reichert, David A Roth, Ralf A group of academics, industry executives and security experts propose an oversight framework to address-synthesis industry falls short of addressing this unfortunate reality. Here, we outline a practical plan for devel

  14. Secure Compressed Reading in Smart Grids

    E-Print Network [OSTI]

    Cai, Sheng; Chen, Minghua; Yan, Jianxin; Jaggi, Sidharth

    2012-01-01

    Smart Grids measure energy usage in real-time and tailor supply and delivery accordingly, in order to improve power transmission and distribution. For the grids to operate effectively, it is critical to collect readings from massively-installed smart meters to control centers in an efficient and secure manner. In this paper, we propose a secure compressed reading scheme to address this critical issue. We observe that our collected real-world meter data express strong temporal correlations, indicating they are sparse in certain domains. We adopt Compressed Sensing technique to exploit this sparsity and design an efficient meter data transmission scheme. Our scheme achieves substantial efficiency offered by compressed sensing, without the need to know beforehand in which domain the meter data are sparse. This is in contrast to traditional compressed-sensing based scheme where such sparse-domain information is required a priori. We then design specific dependable scheme to work with our compressed sensing based ...

  15. 2014 Headquarters Facilities Master Security Plan- Chapter 8, Operations Security Program

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program Describes the DOE Headquarters Operations Security (OPSEC) Program.

  16. 2014 Headquarters Facilities Master Security Plan- Chapter 10, Security Awareness Program

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program Describes the DOE Headquarters Security Awareness Program

  17. GDCT Initialization File [gdct.ini] Format Specification Guide

    E-Print Network [OSTI]

    Rosebrugh, Robert

    GDCT Initialization File [gdct.ini] Format Specification Guide Written By: Jeremy Bradbury June 22, 2000 Below is the layout of the gdct.ini file. It is important to note the following: · If the gdct.ini to represent that a file does not exist under the "Recent Files" section of the gdct.ini file. [Internal

  18. BROADER National Security Missions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Metal Chips (U) Uranium Trioxide (UO 3 ) UO 2 (NO 3 ) 2 Ur anyl Nitrate Ammonium Uranyl Carbonate (NH 4 ) 2 UO 2 (CO 3 ) 4 DEVELOP NEW NATIONAL SECURITY MISSIONS Y-12 has...

  19. AMALGAMATED SECURITY COMMUNITIES

    E-Print Network [OSTI]

    Harvey, Andrew Stephen

    2011-08-31

    This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

  20. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-25

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  1. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-01-22

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  2. Operations Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-04-30

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  3. ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1

    E-Print Network [OSTI]

    Su, Xiao

    ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1 Information................................................................................................................................................................................3 Information Security Policy...............................................................................................................................................4 Information Security Policy Management

  4. Policy Paper 35: Energy and Security in Northeast Asia: Fueling Security

    E-Print Network [OSTI]

    Calder, Kent; Fesharaki, Fereidun; Shirk, Susan L.; Stankiewicz, Michael

    1998-01-01

    Deese (editors). Energy and Security. 3. Fereidun Fesharaki,Energy and Security in Northeast Asia: Fueling Security Anrising energy demand. Energy and Security in Northeast Asia

  5. Secure Quantum Key Distribution

    E-Print Network [OSTI]

    Hoi-Kwong Lo; Marcos Curty; Kiyoshi Tamaki

    2015-05-20

    Secure communication plays a crucial role in the Internet Age. Quantum mechanics may revolutionise cryptography as we know it today. In this Review Article, we introduce the motivation and the current state of the art of research in quantum cryptography. In particular, we discuss the present security model together with its assumptions, strengths and weaknesses. After a brief introduction to recent experimental progress and challenges, we survey the latest developments in quantum hacking and counter-measures against it.

  6. Incidents of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-17

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  7. Data port security lock

    DOE Patents [OSTI]

    Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

    2008-06-24

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  8. Saving Output to a File (Using Codeblocks or Dev-C++) Saving Your Output to a File

    E-Print Network [OSTI]

    Sokol, Dina

    Saving Output to a File (Using Codeblocks or Dev-C++) Saving Your Output to a File To save | New | Source File. d. In the new window, right-click and select Paste. e. Then select "File | Save as" to save and name the file. i. In the window that pops up, the bottom fill-in box is labelled "Save as type

  9. Can Cloud Computing Address the Scientific Computing Requirements...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    concerns specific to the Department of Energy and scientific computing: Can DOE cyber security requirements be met within a cloud? Can DOE HPC applications run efficiently in...

  10. U.S. Energy Secretary Addresses International Atomic Energy Agency...

    Office of Environmental Management (EM)

    of safety and security in the nuclear industry in light of the tragic events at Fukushima this year, and outlined the four priorities of President Obama's nuclear agenda:...

  11. Final Report on Internet Addressable Lightswitch

    SciTech Connect (OSTI)

    Rubinstein, Francis; Pettler, Peter

    2001-08-27

    This report describes the work performed to develop and test a new switching system and communications network that is useful for economically switching lighting circuits in existing commercial buildings. The first section of the report provides the general background of the IBECS (Integrated Building Environmental Communications System) research and development work as well as the context for the development of the new switching system. The research and development effort that went into producing the first proof-of-concept (the IBECS Addressable Power Switch or APS) and the physical prototype of that concept is detailed in the second section. In the third section of the report, we detail the refined Powerline Carrier Based IBECS Title 24 Wall Switch system that evolved from the APS prototype. The refined system provided a path for installing IBECS switching technology in existing buildings that may not be already wired for light level switching control. The final section of the report describes the performance of the IBECS Title 24 Switch system as applied to a small demonstration in two offices at LBNL's Building 90. We learned that the new Powerline Carrier control systems (A-10 technology) that have evolved from the early X-10 systems have solved most of the noise problems that dogged the successful application of X-10 technologies in commercial buildings. We found that the new A-10 powerline carrier control technology can be reliable and effective for switching lighting circuits even in electrically noisy office environments like LBNL. Thus we successfully completed the task objectives by designing, building and demonstrating a new switching system that can provide multiple levels of light which can be triggered either from specially designed wall switches or from a digital communications network. By applying commercially available powerline carrier based technologies that communicate over the in-place lighting wiring system, this type of control can be economi cally installed even in existing buildings that were not wired for dual-level lighting.

  12. IY5512: Part 1 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    IY5512: Part 1 1 Information Security Group IY5512 Computer Security Part 1: Introduction to computer security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security) ... 2 Information Security Group Agenda · Overview · Security goals · Security approaches ­ prevention

  13. Unconditionally Secure Quantum Signatures

    E-Print Network [OSTI]

    Ryan Amiri; Erika Andersson

    2015-08-08

    Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern communications. They allow for the exchange of messages from one sender to multiple recipients, with the guarantees that messages cannot be forged or tampered with and that messages also can be forwarded from one recipient to another without compromising their validity. Signatures are different from, but no less important than encryption, which ensures the privacy of a message. Commonly used signature protocols - signatures based on the Rivest-Adleman-Shamir (RSA) algorithm, the digital signature algorithm (DSA), and the elliptic curve digital signature algorithm (ECDSA) - are only computationally secure, similar to public key encryption methods. In fact, since these rely on the difficulty of finding discrete logarithms or factoring large primes, it is known that they will become completely insecure with the emergence of quantum computers. We may therefore see a shift towards signature protocols that will remain secure even in a post-quantum world. Ideally, such schemes would provide unconditional or information-theoretic security. In this paper, we aim to provide an accessible and comprehensive review of existing unconditionally secure signature schemes for signing classical messages, with a focus on unconditionally secure quantum signature schemes.

  14. Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDidDevelopment Top Scientific Impact Since its SearchSecurity

  15. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D m r345 UnlimitedSecure

  16. national security campus | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouthReporteeo | National Nuclear Securityhr | Nationalnational security

  17. Tag: security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorking With U.S. Coal StocksSuppliers Tag: Supplierssecurity Tag: security

  18. physical security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorkingLosThe 26thI D- 6 0 4 2 r m m m m port m fm f mphysical security |

  19. File:CDPHE Industrial Individual Wastewater Discharge Permit...

    Open Energy Info (EERE)

    Help Apps Datasets Community Login | Sign Up Search File Edit History File:CDPHE Industrial Individual Wastewater Discharge Permit Application.pdf Jump to: navigation, search...

  20. Department of Energy Files Motion to Withdraw Yucca Mountain...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Files Motion to Withdraw Yucca Mountain License Application Department of Energy Files Motion to Withdraw Yucca Mountain License Application March 3, 2010 -...

  1. NERSC Online Training May 3: Navigating NERSC File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Online Training May 3: Navigating NERSC File Systems NERSC Online Training May 3: Navigating NERSC File Systems April 26, 2011 by Richard Gerber A NERSC training event, "Navigating...

  2. Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

    Office of Environmental Management (EM)

    4, Cyber Security Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2015 2015 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security...

  3. Ames Laboratory to Lead New Research Effort to Address Shortages...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Ames Laboratory to Lead New Research Effort to Address Shortages in Rare Earth and Other Critical Materials Ames Laboratory to Lead New Research Effort to Address Shortages in Rare...

  4. The Legacy of the Gettysburg Address, 1863-1965 

    E-Print Network [OSTI]

    Peatman, Jared Elliott

    2011-10-21

    My project examines the legacy of the Gettysburg Address from 1863 to 1965. After an introduction and a chapter setting the stage, each succeeding chapter surveys the meaning of the Gettysburg Address at key moments: the initial reception...

  5. DOE Convenes Multi-stakeholder Process to Address Privacy for...

    Energy Savers [EERE]

    DOE Convenes Multi-stakeholder Process to Address Privacy for Data Enabled by Smart Grid Technologies DOE Convenes Multi-stakeholder Process to Address Privacy for Data Enabled by...

  6. Some Thoughts on Teaching Secure Programming

    E-Print Network [OSTI]

    Bishop, Matt

    2013-01-01

    Teaching Context in Information Security,” ACM Journal onWorld Conference on Information Security Education pp. 23–Colloquium on Information Systems Security Education (CISSE)

  7. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01

    Analysis of Information Security Games, Proceedings of theon the Economics of Information Security WEIS’, Hanover, NH,on the Economics of Information Security’. Anderson, R. and

  8. Securities Class Actions and Bankrupt Companies

    E-Print Network [OSTI]

    Park, James J.

    2014-01-01

    the utility of securities class actions. Certainly, contextthe merit of securities class actions. UCLA | SCHOOL OF LAWof James J. Park, Securities Class Actions and Bankrupt

  9. Security enhanced with increased vehicle inspections

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security enhanced with increased vehicle inspections Security measures increase as of March: vehicle inspections won't delay traffic New increased security procedures meet LANL's...

  10. Review of digital image security in Dermatology

    E-Print Network [OSTI]

    Nielson, Colton; West, Cameron; Shimizu, Ikue

    2015-01-01

    encrypted communications, cloud security breaches, and phonebreaches in security demonstrate, such cloud storage ofand security rules 22 Audits of CSP data center operations and cloud

  11. Integrated Security System | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems architecture Integrated...

  12. Data security on the national fusion grid

    E-Print Network [OSTI]

    Burruss, Justine R.; Fredian, Tom W.; Thompson, Mary R.

    2005-01-01

    of any computational grid is security. Effective sharing oflike ITER. Keywords: security, FusionGrid, grid computing 1.A Security Architecture for Computational Grids,” Proc. 5th

  13. Security on the US Fusion Grid

    E-Print Network [OSTI]

    Burruss, Justin R.; Fredian, Tom W.; Thompson, Mary R.

    2005-01-01

    of any computational grid is security. Effective sharing oflike ITER. Keywords: security, FusionGrid, grid computing 1.A Security Architecture for Computational Grids,” Proc. 5th

  14. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01

    CERT. (2010, Dec) Technical Cyber Security Alerts. [Online].a broad overview of cyber security incidents in the laststrategic war and viable cyber security solutions should be

  15. Mathematical and Statistical Opportunities in Cyber Security

    E-Print Network [OSTI]

    Meza, Juan

    2009-01-01

    development approach to cyber security. Report submitted to2007. Committee on Improving Cyber- security Research in theOpportunities in Cyber Security ? Juan Meza † Scott

  16. Security and United States Immigration Policy

    E-Print Network [OSTI]

    Totten, Robbie James

    2012-01-01

    2009 [1981]. American National Security, 6th ed. Baltimore,1977. Economic Issues and National Security. Lawrence, KS:Immigration and National Security. Westport, CT: Praeger

  17. Office of Security Assessments | Department of Energy

    Energy Savers [EERE]

    Security Assessments Office of Security Assessments MISSION The Office of Security Assessments is responsible for the independent evaluation of the effectiveness of safeguards and...

  18. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Broader source: Energy.gov (indexed) [DOE]

    A vulnerability was reported in Cisco Secure Access Control System. A remote user can change the passwords of arbitrary users. PLATFORM: Cisco Secure ACS versions 5.1 patch 3, 4,...

  19. AUDIT REPORT Security at the Nevada National Security Site

    Broader source: Energy.gov (indexed) [DOE]

    Security at the Nevada National Security Site OAS-L-15-06 May 2015 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections . Department of Energy...

  20. Security Requirements Engineering Support for Security-Annotated Business Processes

    E-Print Network [OSTI]

    Security Requirements Engineering Support for Security-Annotated Business Processes Elda Paja1 that business analysts are not secu- rity experts and assume that this will be bolted on later. Fortunately

  1. Individually addressable cathodes with integrated focusing stack or detectors

    DOE Patents [OSTI]

    Thomas, Clarence E.; Baylor, Larry R.; Voelkl, Edgar; Simpson, Michael L.; Paulus, Michael J.; Lowndes, Douglas; Whealton, John; Whitson, John C.; Wilgen, John B.

    2005-07-12

    Systems and method are described for addressable field emission array (AFEA) chips. A plurality of individually addressable cathodes are integrated with an electrostatic focusing stack and/or a plurality of detectors on the addressable field emission array. The systems and methods provide advantages including the avoidance of space-charge blow-up.

  2. Energy-Aware Secure Multicast Communication In Wireless Ad-Hoc Networks Loukas Lazos, and Radha Poovendran

    E-Print Network [OSTI]

    Lazos, Loukas

    Energy-Aware Secure Multicast Communication In Wireless Ad-Hoc Networks Loukas Lazos, and Radha Poovendran Abstract-- In this paper we address the problem of efficiently securing multicast communication in energy constrained wireless ad hoc networks. We show that existing scalable key distribution techniques

  3. Technical Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2015-09-02

    This order implements the Department of Energy (DOE) Technical Security Program (TSP). This program represents the convergence of two distinct disciplines: Counterintelligence (CI) and Security Countermeasures. The elements of the TSP are driven by national level, interagency programs that are codified in various laws, Executive Orders, national polices and directives. Supersedes DOE M 470.4-4A Chg 1, dated 10-12-2010, Section D – Technical Surveillance Countermeasures (Official Use Only) and classified annex (Secret); and DOE M 205.1-3 (Official Use Only) and Part II (Secret), dated 4-17-2006.

  4. Nevada National Security Site

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD |UpdatedSecurity|National

  5. Global Material Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia NationalSecurityNuclear SecurityOfficesPrograms

  6. Secure Storage Architectures

    SciTech Connect (OSTI)

    Aderholdt, Ferrol; Caldwell, Blake A; Hicks, Susan Elaine; Koch, Scott M; Naughton, III, Thomas J; Pogge, James R; Scott, Stephen L; Shipman, Galen M; Sorrillo, Lawrence

    2015-01-01

    The purpose of this report is to clarify the challenges associated with storage for secure enclaves. The major focus areas for the report are: - review of relevant parallel filesystem technologies to identify assets and gaps; - review of filesystem isolation/protection mechanisms, to include native filesystem capabilities and auxiliary/layered techniques; - definition of storage architectures that can be used for customizable compute enclaves (i.e., clarification of use-cases that must be supported for shared storage scenarios); - investigate vendor products related to secure storage. This study provides technical details on the storage and filesystem used for HPC with particular attention on elements that contribute to creating secure storage. We outline the pieces for a a shared storage architecture that balances protection and performance by leveraging the isolation capabilities available in filesystems and virtualization technologies to maintain the integrity of the data. Key Points: There are a few existing and in-progress protection features in Lustre related to secure storage, which are discussed in (Chapter 3.1). These include authentication capabilities like GSSAPI/Kerberos and the in-progress work for GSSAPI/Host-keys. The GPFS filesystem provides native support for encryption, which is not directly available in Lustre. Additionally, GPFS includes authentication/authorization mechanisms for inter-cluster sharing of filesystems (Chapter 3.2). The limitations of key importance for secure storage/filesystems are: (i) restricting sub-tree mounts for parallel filesystem (which is not directly supported in Lustre or GPFS), and (ii) segregation of hosts on the storage network and practical complications with dynamic additions to the storage network, e.g., LNET. A challenge for VM based use cases will be to provide efficient IO forwarding of the parallel filessytem from the host to the guest (VM). There are promising options like para-virtualized filesystems to help with this issue, which are a particular instances of the more general challenge of efficient host/guest IO that is the focus of interfaces like virtio. A collection of bridging technologies have been identified in Chapter 4, which can be helpful to overcome the limitations and challenges of supporting efficient storage for secure enclaves. The synthesis of native filesystem security mechanisms and bridging technologies led to an isolation-centric storage architecture that is proposed in Chapter 5, which leverages isolation mechanisms from different layers to facilitate secure storage for an enclave. Recommendations: The following highlights recommendations from the investigations done thus far. - The Lustre filesystem offers excellent performance but does not support some security related features, e.g., encryption, that are included in GPFS. If encryption is of paramount importance, then GPFS may be a more suitable choice. - There are several possible Lustre related enhancements that may provide functionality of use for secure-enclaves. However, since these features are not currently integrated, the use of Lustre as a secure storage system may require more direct involvement (support). (*The network that connects the storage subsystem and users, e.g., Lustre s LNET.) - The use of OpenStack with GPFS will be more streamlined than with Lustre, as there are available drivers for GPFS. - The Manilla project offers Filesystem as a Service for OpenStack and is worth further investigation. Manilla has some support for GPFS. - The proposed Lustre enhancement of Dynamic-LNET should be further investigated to provide more dynamic changes to the storage network which could be used to isolate hosts and their tenants. - The Linux namespaces offer a good solution for creating efficient restrictions to shared HPC filesystems. However, we still need to conduct a thorough round of storage/filesystem benchmarks. - Vendor products should be more closely reviewed, possibly to include evaluation of performance/protection of select products. (Note, we are investigation the opti

  7. SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011

    E-Print Network [OSTI]

    SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011 Choose brands and models of mobile devices that have the options referenced below. Use all available security options that your or sensitive university information in un-approved off-campus services, such as public cloud based services

  8. Wireless Security: Secure and Public Networks Villanova University

    E-Print Network [OSTI]

    36 Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer Science kory.kirk@villanova.edu www.korykirk.com/ Abstract Due to the increasing amount of wireless, train stations and cafes, there is a need for a wireless protocol that allows public access to secure

  9. 1 Files and Databases mass storage

    E-Print Network [OSTI]

    Verschelde, Jan

    Outline 1 Files and Databases mass storage hash functions 2 Dictionaries logical key values nested Jan Verschelde, 28 January 2015 Intro to Computer Science (MCS 260) mass storage and dictionaries L-7 28 January 2015 1 / 32 #12;mass storage dictionaries in Python 1 Files and Databases mass storage

  10. NISTIR 7497 Security Architecture Design

    E-Print Network [OSTI]

    NISTIR 7497 Security Architecture Design Process for Health Information Exchanges (HIEs) Matthew Scholl Kevin Stine Kenneth Lin Daniel Steinberg #12;NISTIR 7497 Security Architecture Design Process Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899 Kenneth Lin

  11. Departmental Personnel Security- Clearance Automation

    Broader source: Energy.gov [DOE]

    The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

  12. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  13. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

  14. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  15. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  16. Research Data Data Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    Research Data Data Security Survey Collection FAQs Q: I am not a UConn Health Center employee; can multiple projects that share common data? Yes. As long as the projects have common fields as you would in SurveyMonkey; data forms, e.g. Case Report Forms (CRF); or a combination of both. For any

  17. Transmission Line Security Monitor

    ScienceCinema (OSTI)

    None

    2013-05-28

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  18. ARMY Energy Security Considerations

    E-Print Network [OSTI]

    energy waste in existing facilities; Increase energy efficiency in renovation and new constructionARMY Energy Security Considerations Don Juhasz, PE, CEM HQDA, OACSIM, DAIM-FDF Telephone: (703-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 Army Energy · · · · FOREIGN OIL 2

  19. National Security System Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-03-08

    The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

  20. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

  1. Transmission Line Security Monitor

    SciTech Connect (OSTI)

    2011-01-01

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  2. Metaphors for cyber security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  3. Safeguards and Security Program References

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

  4. Supporting Organizations | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the following three organizations: Measurement Science and Systems Engineering Division Nuclear Security and Isotope Technology Division Computational Sciences and Engineering...

  5. Protocol, Security Assistance- January 2007

    Broader source: Energy.gov [DOE]

    Provide timely technical assistance and system support to Field and HQ Elements to enhance site safeguards and security.

  6. Critical Infrastructure and Cyber Security 

    E-Print Network [OSTI]

    Doll, Abby; Pirrong, Renee; Jennings, Matthew; Stasny, George; Giblin, Andy; Shaffer, Steph; Anderson, Aimee

    2011-01-01

    cyber security. They designated responsibility for cyber-security to the newly formed Department of Homeland Security, a duty that has continued to today 3. The group was tasked with creating a method of protecting the critical components.... 2010. 15 Mar. 2011. http://www.d tic.mil/doctrine/new_pubs/jp1_02.pdf 10 Comments on the Economic and Security Implications Of Recent Developments in the World Oil Market , 107th Cong. (2000) (testimony of Robert E. Ebel). http...

  7. Safeguard Security and Awareness Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-10-02

    Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

  8. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

  9. TO: FILE FROM: I SUBJECT:

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouth DakotaRobbins and700, 1. .&. ' , c 1 1;TO: FILE FROM: I .-

  10. TO: FILE MEMORANDUM ALTERNATE NAME:

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouth DakotaRobbins and700, 1. .&. ' , c 1 1;TO: FILE

  11. Index of /radsafe/files

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACT EVALUATION PLAN FOR THE SITE-218in aradsafe/files [ICO] Name Last

  12. Information Technology Security Assessment Framework

    E-Print Network [OSTI]

    Federal Information Technology Security Assessment Framework November 28, 2000 Prepared (NIST) Computer Security Division #12;Overview Information and the systems that process it are among and maintain a program to adequately secure its information and system assets. Agency programs must: 1) assure

  13. January 2005 INTEGRATING IT SECURITY

    E-Print Network [OSTI]

    in a cost- effective manner. The implementation of IT security and capital planning practices withinJanuary 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS released Special Publication (SP) 800-65, Inte grating IT Security into the Capital Planning and Investment

  14. Guidelines on Security and Privacy

    E-Print Network [OSTI]

    Guidelines on Security and Privacy in Public Cloud Computing WayneJansen TimothyGrance Special Publication 800-144 #12;ii NIST Special Publication 800-144 Guidelines on Security and Privacy in Public Cloud and Ramaswamy Chandramouli, also from NIST, provided input on cloud security in early drafts. Thanks also go

  15. Secretary Richardson Accepts Recommendations for Improving Security...

    National Nuclear Security Administration (NNSA)

    Secretary Richardson Accepts Recommendations for Improving Security at Nuclear Weapons Laboratories | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS...

  16. Waste Isolation Pilot Plant Transportation Security

    Office of Environmental Management (EM)

    Senior Management Operational Management Implementation OOB NTP Transportation Logistics OSO Operations Management Organization Security WIPP Security Conditions * TRU Waste...

  17. National Nuclear Security Administration Overview | Department...

    Office of Environmental Management (EM)

    Administration Overview National Nuclear Security Administration Overview National Nuclear Security Administration Overview More Documents & Publications National Transportation...

  18. Security Science & Technology | Nuclear Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Science & Technology Border Security Comprehensive Vulnerability and Threat Analysis Consequence Management, Safeguards, and Non-Proliferation Tools Export...

  19. Independent Oversight Review, National Nuclear Security Administration...

    Office of Environmental Management (EM)

    Nuclear Security Administration Production Office - February 2014 Independent Oversight Review, National Nuclear Security Administration Production Office - February 2014 February...

  20. Enhancing Transportation Energy Security through Advanced Combustion...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Transportation Energy Security through Advanced Combustion and Fuels Technologies Enhancing Transportation Energy Security through Advanced Combustion and Fuels Technologies 2005...

  1. Nevada National Security Site Environmental Report 2011

    SciTech Connect (OSTI)

    Cathy Wills, ed

    2012-09-12

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This and previous years reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NSO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, 'Environment, Safety and Health Reporting.' Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2011 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory-Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.

  2. SECURITY TECHNIQUES Chris J Mitchell1

    E-Print Network [OSTI]

    Mitchell, Chris

    SECURITY TECHNIQUES Chris J Mitchell1 Introduction In this paper we consider the range of security security has been exerted. However, the techniques described are of general applicability by a security technique; in doing so we will distinguish between security features and security techniques (or

  3. Security and Privacy in the Networked World

    E-Print Network [OSTI]

    Sandhu, Ravi

    -World Impact! Perennial State of Cyber Security Micro-security Macro-security #12; What is the value of being Cyber Security Conundrum #12;Cyber security as reconciliation of tradeoffs Finding Goldilocks Holistic1 Security and Privacy in the Networked World Prof. Ravi Sandhu Executive Director and Endowed

  4. The unreasonable ineffectiveness of security engineering

    E-Print Network [OSTI]

    Pavlovic, Dusko

    of security does not apply only to software, as we also speak of bank security, national security, secureThe unreasonable ineffectiveness of security engineering: An overview Dusko Pavlovic Kestrel" [32]. After several decades of security research, we are tempted to ask the opposite question: Are we

  5. IY5512: Part 2 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    ; ­ introduction to security evaluation criteria. Information Security Group Agenda · Design principles · DesignIY5512: Part 2 1 Information Security Group IY5512 Computer Security Part 2: Design & evaluation · This part of the course covers: ­ fundamental security design principles; ­ a security design methodology

  6. Repairable File and Storage Systems A Dissertation Presented

    E-Print Network [OSTI]

    Chiueh, Tzi-cker

    Repairable File and Storage Systems A Dissertation Presented by Ningning Zhu to The Graduate School of the Dissertation Repairable File and Storage System by Ningning Zhu Doctor of Philosophy in Computer Science Stony stream file/storage system. Repairable file/storage system needs to perform two tasks. First it has

  7. Localization of Credential Information to Address Increasingly Inevitable Data Breaches

    E-Print Network [OSTI]

    Van Oorschot, Paul

    ]: Security and Protection--Authentication, Unau- thorized access (e.g., hacking); K.4.1 [Computers and So every day, and now seem to be the business norm. Beyond simple credit card numbers, leaked information

  8. Secretary Chu Addresses the International Atomic Energy Agency...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    rules." A strong and efficient market for nuclear fuel is vital to securing carbon-free energy on a global basis. The United States continues to support expanded and reliable...

  9. Effective Ways of Secure, Private and Trusted Cloud Computing

    E-Print Network [OSTI]

    Kumar, Pardeep; Chauhan, Durg Singh; Gupta, P K; Diwakar, Manoj

    2011-01-01

    Cloud computing is an Internet-based computing, where shared resources, software and information, are provided to computers and devices on-demand. It provides people the way to share distributed resources and services that belong to different organization. Since cloud computing uses distributed resources in open environment, thus it is important to provide the security and trust to share the data for developing cloud computing applications. In this paper we assess how can cloud providers earn their customers' trust and provide the security, privacy and reliability, when a third party is processing sensitive data in a remote machine located in various countries? A concept of utility cloud has been represented to provide the various services to the users. Emerging technologies can help address the challenges of Security, Privacy and Trust in cloud computing.

  10. Connectivity in Secure Wireless Sensor Networks under Transmission Constraints

    E-Print Network [OSTI]

    Zhao, Jun; Gligor, Virgil

    2015-01-01

    In wireless sensor networks (WSNs), the Eschenauer-Gligor (EG) key pre-distribution scheme is a widely recognized way to secure communications. Although connectivity properties of secure WSNs with the EG scheme have been extensively investigated, few results address physical transmission constraints. These constraints reflect real-world implementations of WSNs in which two sensors have to be within a certain distance from each other to communicate. In this paper, we present zero-one laws for connectivity in WSNs employing the EG scheme under transmission constraints. These laws help specify the critical transmission ranges for connectivity. Our analytical findings are confirmed via numerical experiments. In addition to secure WSNs, our theoretical results are also applied to frequency hopping in wireless networks.

  11. FOILFEST :community enabled security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr.

    2005-09-01

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

  12. COSC 472 Network Security Annie Lu 1 COSC 472 Network Security

    E-Print Network [OSTI]

    Lu, Enyue "Annie"

    Network Security Annie Lu Background · Information Security requirements have changed in recent times to protect data during transmission #12;COSC 472 Network Security Annie Lu 6 Security · Information Security Security Annie Lu Computer Security · the protection afforded to an automated information system in order

  13. Interoperability format translation and transformation between IFC architectural design file and simulation file formats

    DOE Patents [OSTI]

    Chao, Tian-Jy; Kim, Younghun

    2015-01-06

    Automatically translating a building architecture file format (Industry Foundation Class) to a simulation file, in one aspect, may extract data and metadata used by a target simulation tool from a building architecture file. Interoperability data objects may be created and the extracted data is stored in the interoperability data objects. A model translation procedure may be prepared to identify a mapping from a Model View Definition to a translation and transformation function. The extracted data may be transformed using the data stored in the interoperability data objects, an input Model View Definition template, and the translation and transformation function to convert the extracted data to correct geometric values needed for a target simulation file format used by the target simulation tool. The simulation file in the target simulation file format may be generated.

  14. Interoperability format translation and transformation between IFC architectural design file and simulation file formats

    DOE Patents [OSTI]

    Chao, Tian-Jy; Kim, Younghun

    2015-02-03

    Automatically translating a building architecture file format (Industry Foundation Class) to a simulation file, in one aspect, may extract data and metadata used by a target simulation tool from a building architecture file. Interoperability data objects may be created and the extracted data is stored in the interoperability data objects. A model translation procedure may be prepared to identify a mapping from a Model View Definition to a translation and transformation function. The extracted data may be transformed using the data stored in the interoperability data objects, an input Model View Definition template, and the translation and transformation function to convert the extracted data to correct geometric values needed for a target simulation file format used by the target simulation tool. The simulation file in the target simulation file format may be generated.

  15. The Cyber Security Crisis

    ScienceCinema (OSTI)

    Spafford, Eugene [Purdue University, West Lafayette, Indiana, United States

    2009-09-01

    Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

  16. The demands of the university teaching, addressed to students ...

    E-Print Network [OSTI]

    2015-04-02

    The demands of the university teaching, addressed to students (including those said to be “advanced”) with a modest (and frequently less than mod-.

  17. Smart Grid RFI: Addressing Policy and Logistical Challenges,...

    Office of Environmental Management (EM)

    Challenges, Comments from the Edison Electric Institute Smart Grid RFI: Addressing Policy and Logistical Challenges, Comments from the Edison Electric Institute The Edison Electric...

  18. Smart Grid RFI: Addressing Policy and Logistical Challenges....

    Office of Environmental Management (EM)

    Challenges. Comments of the Alliance to Save Energy. Smart Grid RFI: Addressing Policy and Logistical Challenges. Comments of the Alliance to Save Energy. The Alliance to Save...

  19. Addressing Uncertainty in Desigh Inputs: A Case Study of Probabilisti...

    Office of Environmental Management (EM)

    Addressing Uncertainties in Design Inputs: A Case Study of Probabilistic Settlement Evaluations for Soft Zone Collapse at SWPF Tom Houston, Greg Mertz, Carl Costantino, Michael...

  20. Ambient Corporation's Reply comments to DOE RFI: Addressing Policy...

    Broader source: Energy.gov (indexed) [DOE]

    communications will play ineneabling utilities to deploy cost-effective long-term smart grid benefits. Ambient Corporation's Reply comments to DOE RFI: Addressing Policy and...

  1. Assistant Secretary Patricia Hoffman to Deliver Keynote Address...

    Energy Savers [EERE]

    Assistant Secretary Patricia Hoffman to Deliver Keynote Address at IEEE PES Conference on Innovative Smart Grid Technologies Assistant Secretary Patricia Hoffman to Deliver Keynote...

  2. Addressing Biomass Supply Chain Challenges With AFEX™ Technology

    Broader source: Energy.gov [DOE]

    Plenary IV: Advances in Bioenergy Feedstocks—From Field to Fuel Addressing Biomass Supply Chain Challenges With AFEX™ Technology Allen Julian, Chief Business Officer, MBI

  3. Africa - Technical Potential of Solar Energy to Address Energy...

    Open Energy Info (EERE)

    Africa - Technical Potential of Solar Energy to Address Energy Poverty and Avoid GHG Emissions Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Technical Potential of...

  4. New Project is the ACME of Addressing Climate Change

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    complete climate and Earth system model to address the most challenging and demanding climate change issues. Eight Department of Energy (DOE) national laboratories, including...

  5. The INL Seismic Risk Assessment Project: Requirements for Addressing...

    Office of Environmental Management (EM)

    The INL Seismic Risk Assessment Project: Requirements for Addressing DOE Order 420.1C & A Proposed Generic Methodology The INL Seismic Risk Assessment Project: Requirements for...

  6. Addressing Policy and Logistical Challenges to Smart Grid Implementati...

    Office of Environmental Management (EM)

    Grid Implementation: Comments by the Office of the Ohio Consumers' Counsel Addressing Policy and Logistical Challenges to Smart Grid Implementation: Comments by the Office of the...

  7. Addressing Policy and Logistical Challenges to Smart Grid Implementati...

    Office of Environmental Management (EM)

    Implementation: Federal Register Notice Volume 75, No. 180 - Sep. 17, 2010 Addressing Policy and Logistical Challenges to Smart Grid Implementation: Federal Register Notice Volume...

  8. Addressing Policy and Logistical Challenges to smart grid Implementati...

    Office of Environmental Management (EM)

    smart grid Implementation: eMeter Response to Department of Energy RFI Addressing Policy and Logistical Challenges to smart grid Implementation: eMeter Response to Department of...

  9. Smart Grid RFI: Addressing Policy and Logistical Challenges

    Office of Environmental Management (EM)

    via smartgridpolicy@hq.doe.gov Smart Grid Request for Information: Addressing Policy and Logistical Challenges Comments of the Alliance to Save Energy The Alliance to Save...

  10. Addressing the Voltage Fade Issue with Lithium-Manganese-Rich...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Voltage Fade Issue with Lithium-Manganese-Rich Oxide Cathode Materials Addressing the Voltage Fade Issue with Lithium-Manganese-Rich Oxide Cathode Materials 2012 DOE Hydrogen and...

  11. Evaluation Report on "The Department's Unclassified Cyber Security Program"

    SciTech Connect (OSTI)

    None

    2009-10-01

    Industry experts report that security challenges and threats are continually evolving as malicious activity has become more web-based and attackers are able to rapidly adapt their attack methods. In addition, the number of data breaches continues to rise. In an effort to mitigate and address threats and protect valuable information, the Department of Energy anticipated spending about $275 million in Fiscal Year (FY) 2009 to implement cyber security measures necessary to protect its information technology resources. These systems and data are designed to support the Department's mission and business lines of energy security, nuclear security, scientific discovery and innovation, and environmental responsibility. The Federal Information Security Management Act of 2002 (FISMA) provides direction to agencies on the management and oversight of information security risks, including design and implementation of controls to protect Federal information and systems. As required by FISMA, the Office of Inspector General conducts an annual independent evaluation to determine whether the Department's unclassified cyber security program adequately protects its information systems and data. This memorandum and the attached report present the results of our evaluation for FY 2009. The Department continued to make incremental improvements in its unclassified cyber security program. Our evaluation disclosed that most sites had taken action to address weaknesses previously identified in our FY 2008 evaluation report. They improved certification and accreditation of systems; strengthened configuration management of networks and systems; performed independent assessments; and, developed and/or refined certain policies and procedures. In addition, the Department instituted a centralized incident response organization designed to eliminate duplicative efforts throughout the Department. As we have noted in previous reports, the Department continued to maintain strong network perimeter defenses against malicious intruders and other externals threats. These are positive accomplishments. However, in our judgment, additional action is required to further enhance the Department's unclassified cyber security program and help reduce risks to its systems and data. For example, our current review identified opportunities for improvements in areas such as security planning and testing, systems inventory, access controls, and configuration management. In particular, we issued a number of findings at sites managed by the National Nuclear Security Administration (NNSA). We also identified weaknesses across various Department program elements. Issues that warrant further attention include: (1) Weaknesses such as outdated security plans and not completing annual security control self-assessments were identified at several sites; (2) The Department had not yet resolved systems inventory issues and had yet to deploy a complex-wide automated asset management tool to help track information technology resources and identify interfaces between systems or networks; (3) Although certain improvements had been made to enhance access controls, we noted deficiencies such as a lack of periodic account reviews and inadequate password management at a number of sites; and (4) Previously identified weaknesses in configuration management had been corrected, however, we found problems related to weak administrator account settings and failure to install software patches, as well as incomplete implementation of the Federal Desktop Core Configuration. These internal control weaknesses existed, at least in part, because certain cyber security roles and responsibilities were not clearly delineated. Program officials also had not effectively performed monitoring and review activities essential for evaluating the adequacy of cyber security performance. In some cases, officials had not ensured that weaknesses discovered during audits and other evaluations were recorded and tracked to resolution in the organizations' Plans of Action and Milestones. Our testing disclosed that about 39 p

  12. Security seal. [Patent application

    DOE Patents [OSTI]

    Gobeli, G.W.

    1981-11-17

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  13. Security Administration Production Office,

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D m r345Secure

  14. File:Apschem.pdf | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View New Pages Recent Changes AllApschem.pdf Jump to: navigation, search File File history File

  15. File

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Informationmonthly gasoline price to fall toUranium4,(Million CubicErin Boedecker,

  16. File

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Informationmonthly gasoline price to fall toUranium4,(Million CubicErin Boedecker,Coke

  17. File

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Informationmonthly gasoline price to fall toUranium4,(Million CubicErin

  18. File

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Informationmonthly gasoline price to fall toUranium4,(Million

  19. File

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Informationmonthly gasoline price to fall

  20. File

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Informationmonthly gasoline price to fall3,"Alabama","Alabama","Electric Power

  1. File

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Informationmonthly gasoline price to fall3,"Alabama","Alabama","Electric

  2. File

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Informationmonthly gasoline price to

  3. File

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Informationmonthly gasoline price to fall to $3.43 by September1 7 6DEPARTMENTMonthlyMay-15

  4. File

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Informationmonthly gasoline price to fall to $3.43 by September1 7 6DEPARTMENTMonthlyMay-15Electric Power

  5. FILE

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouth DakotaRobbins and Myers CoMadison -T:..) ".. _,;

  6. File

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: AlternativeMonthly","10/2015"Monthly","10/2015" ,"Release7 RelativeSoutheast RegionFuture Production1002 2.

  7. File

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: AlternativeMonthly","10/2015"Monthly","10/2015" ,"Release7 RelativeSoutheast RegionFuture Production1002

  8. 2014 Headquarters Facilities Master Security Plan- Chapter 11, Incidents of Security Concern

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 11, Incidents of Security Concern Describes DOE Headquarters procedures for reporting, investigating, and correcting Incidents of Security Concern.

  9. NNSA Co-Hosts Nuclear Security Summit Workshop on Maritime Security...

    National Nuclear Security Administration (NNSA)

    Co-Hosts Nuclear Security Summit Workshop on Maritime Security with UK | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

  10. Keynote Address National Seminar on Alternative Energy Sources

    E-Print Network [OSTI]

    Banerjee, Rangan

    Keynote Address National Seminar on Alternative Energy Sources Prof. Rangan Banerjee Energy Systems that there is a real need for alternative energy sources. What do we understand by Alternative Energy Sources? In order Consumption 1997-98 Keynote address at Two days National Seminar on Alternative Energy Sources, 27-28 Aug

  11. Addressing the Level of Florida's Electricity Prices Theodore Kury1

    E-Print Network [OSTI]

    Jawitz, James W.

    for 2 Edison Electric Institute, "Typical Bills and Average Rates Report." The report is reproduced Addressing the Level of Florida's Electricity Prices Theodore Kury1 Public tenet of this step of the plan is to "address Florida's relatively expensive electricity costs so

  12. Common Data Set 2010-11 A1 Address Information

    E-Print Network [OSTI]

    Farritor, Shane

    Associate A5 Terminal Associate http://admissions.unl.edu/apply/index.aspx Source of institutional control for each of the following categories as of the institution's official fall reporting date or as of OctoberCommon Data Set 2010-11 A1 Address Information A1 Name of College/University: A1 Mailing Address: A

  13. Method for the electro-addressable functionalization of electrode arrays

    DOE Patents [OSTI]

    Harper, Jason C.; Polsky, Ronen; Dirk, Shawn M.; Wheeler, David R.; Arango, Dulce C.; Brozik, Susan M.

    2015-12-15

    A method for preparing an electrochemical biosensor uses bias-assisted assembly of unreactive -onium molecules on an electrode array followed by post-assembly electro-addressable conversion of the unreactive group to a chemical or biological recognition group. Electro-addressable functionalization of electrode arrays enables the multi-target electrochemical sensing of biological and chemical analytes.

  14. TED AND KARYN HUME CENTER FOR NATIONAL SECURITY AND TECHNOLOGY

    E-Print Network [OSTI]

    Ha, Dong S.

    Networks, Crypto, Formal Methods, Cloud, IPv6, Hardware Security, Visualization, Policy/Law Applications Security IPv6 Security Cloud Security and Privacy Secure Virtualization Anonymous Computation VisualizationTED AND KARYN HUME CENTER FOR NATIONAL SECURITY AND TECHNOLOGY Cybersecurity: Observations

  15. Instructions to CBECS 1992 Microdata Files

    U.S. Energy Information Administration (EIA) Indexed Site

    and dBASE (CE92F01D.DBF) formats. These files contain the 1992 CBECS basic data including building characteristics, energy consumption and expenditures, and temperature data. The...

  16. Optimizing Native Files in Energy.gov

    Broader source: Energy.gov [DOE]

    For native files in Energy.gov, following these best practices will result in better search results in commercial search engines. To learn how to optimize PDFs, see the PDF requirements.

  17. IP address management : augmenting Sandia's capabilities through open source tools.

    SciTech Connect (OSTI)

    Nayar, R. Daniel

    2005-08-01

    Internet Protocol (IP) address management is an increasingly growing concern at Sandia National Laboratories (SNL) and the networking community as a whole. The current state of the available IP addresses indicates that they are nearly exhausted. Currently SNL doesn't have the justification to obtain more IP address space from Internet Assigned Numbers Authority (IANA). There must exist a local entity to manage and allocate IP assignments efficiently. Ongoing efforts at Sandia have been in the form of a multifunctional database application notably known as Network Information System (NWIS). NWIS is a database responsible for a multitude of network administrative services including IP address management. This study will explore the feasibility of augmenting NWIS's IP management capabilities utilizing open source tools. Modifications of existing capabilities to better allocate available IP address space are studied.

  18. A Review of the Security of Insulin Pump Infusion Systems

    SciTech Connect (OSTI)

    Klonoff, David C. [Mills-Peninsula Health Services; Paul, Nathanael R [ORNL; Kohno, Tadayoshi [University of Washington, Seattle

    2011-01-01

    Insulin therapy has enabled diabetic patients to maintain blood glucose control to lead healthier lives. Today, rather than manually injecting insulin using syringes, a patient can use a device, such as an insulin pump, to programmatically deliver insulin. This allows for more granular insulin delivery while attaining blood glucose control. The insulin pump system features have increasingly benefited patients, but the complexity of the resulting system has grown in parallel. As a result security breaches that can negatively affect patient health are now possible. Rather than focus on the security of a single device, we concentrate on protecting the security of the entire system. In this paper we describe the security issues as they pertain to an insulin pump system that includes an embedded system of components including the insulin pump, continuous glucose management system, blood glucose monitor, and other associated devices (e.g., a mobile phone or personal computer). We detail not only the growing wireless communication threat in each system component, but we also describe additional threats to the system (e.g., availability and integrity). Our goal is to help create a trustworthy infusion pump system that will ultimately strengthen pump safety, and we describe mitigating solutions to address identified security issues both for now and in the future.

  19. Improving Security in the ATLAS PanDA System

    E-Print Network [OSTI]

    Caballero, J; The ATLAS collaboration; Nilsson, P; Stewart, G; Potekhin, M; Wenaus, T

    2011-01-01

    The security challenges faced by users of the grid are considerably different to those faced in previous environments. The adoption of pilot jobs systems by LHC experiments has mitigated many of the problems associated with the inhomogeneities found on the grid and has greatly improved job reliability; however, pilot jobs systems themselves must then address many security issues, including the execution of multiple users' code under a common `grid' identity. In this paper we describe the improvements and evolution of the security model in the ATLAS PanDA (Production and Distributed Analysis) system. We describe the security in the PanDA server which is in place to ensure that only authorized members of the VO are allowed to submit work into the system and that jobs are properly audited and monitored. We discuss the security in place between the pilot code itself and the PanDA server, ensuring that only properly authenticated workload is delivered to the pilot for execution. When the code to be executed is fro...

  20. Collective operations in a file system based execution model

    DOE Patents [OSTI]

    Shinde, Pravin; Van Hensbergen, Eric

    2013-02-12

    A mechanism is provided for group communications using a MULTI-PIPE synthetic file system. A master application creates a multi-pipe synthetic file in the MULTI-PIPE synthetic file system, the master application indicating a multi-pipe operation to be performed. The master application then writes a header-control block of the multi-pipe synthetic file specifying at least one of a multi-pipe synthetic file system name, a message type, a message size, a specific destination, or a specification of the multi-pipe operation. Any other application participating in the group communications then opens the same multi-pipe synthetic file. A MULTI-PIPE file system module then implements the multi-pipe operation as identified by the master application. The master application and the other applications then either read or write operation messages to the multi-pipe synthetic file and the MULTI-PIPE synthetic file system module performs appropriate actions.

  1. Collective operations in a file system based execution model

    DOE Patents [OSTI]

    Shinde, Pravin; Van Hensbergen, Eric

    2013-02-19

    A mechanism is provided for group communications using a MULTI-PIPE synthetic file system. A master application creates a multi-pipe synthetic file in the MULTI-PIPE synthetic file system, the master application indicating a multi-pipe operation to be performed. The master application then writes a header-control block of the multi-pipe synthetic file specifying at least one of a multi-pipe synthetic file system name, a message type, a message size, a specific destination, or a specification of the multi-pipe operation. Any other application participating in the group communications then opens the same multi-pipe synthetic file. A MULTI-PIPE file system module then implements the multi-pipe operation as identified by the master application. The master application and the other applications then either read or write operation messages to the multi-pipe synthetic file and the MULTI-PIPE synthetic file system module performs appropriate actions.

  2. Aviation security: A system's perspective

    SciTech Connect (OSTI)

    Martin, J.P.

    1988-01-01

    For many years the aviation industry and airports operated with security methods and equipment common to most other large industrial complexes. At that time, the security systems primarily provided asset and property protection. However, soon after the first aircraft hijacking the focus of security shifted to emphasize the security requirements necessary for protecting the traveling public and the one feature of the aviation industry that makes it unique---the airplane. The airplane and its operation offered attractive opportunities for the homesick refugee, the mentally unstable person and the terrorist wanting to make a political statement. The airport and its aircraft were the prime targets requiring enhanced security against this escalated threat. In response, the FAA, airport operators and air carriers began to develop plans for increasing security and assigning responsibilities for implementation.

  3. Potential National Security Applications of Nuclear Resonance Fluorescence Methods

    SciTech Connect (OSTI)

    Warren, Glen A.; Peplowski, Patrick N.; Caggiano, Joseph A.

    2009-06-09

    The objective of this report is to document the initial investigation into the possible research issues related to the development of NRF-based national security applications. The report discusses several potential applications ranging from measuring uranium enrichment in UF6 canisters to characterization of gas samples. While these applications are varied, there are only a few research issues that need to be addressed to understand the limitation of NRF in solving these problems. These research issues range from source and detector development to measuring small samples. The next effort is to determine how best to answer the research issues, followed by a prioritization of those questions to ensure that the most important are addressed. These issues will be addressed through either analytical calculations, computer simulations, analysis of previous data or collection of new measurements. It will also be beneficial to conduct a thorough examination of a couple of the more promising applications in order to develop concrete examples of how NRF may be applied in specific situations. The goals are to develop an understanding of whether the application of NRF is limited by technology or physics in addressing national security applications, to gain a motivation to explore those possible applications, and to develop a research roadmap so that those possibilities may be made reality.

  4. East Asian Security in 2025 

    E-Print Network [OSTI]

    Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

    2008-01-01

    Are • Reagan Heavin – Energy • Adam Hudson – State Capacity • Brandon Krueger – Military • Sean O’Neil – Demographics • Griffin Rozell – Balance of Power • Matt Suma – Economy East Asian Security in 2025 China: Competition, Cooperation, Plateau? Reagan Heavin... Adam Hudson Brandon Krueger Sean O’Neil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda • Conclusions • Projections • Drivers • Four Outcomes • Questions East Asian Security in 2025 Conclusions • China will rise to great power...

  5. File:06COAExtraLegalVehiclePermittingProcess.pdf | Open Energy...

    Open Energy Info (EERE)

    traLegalVehiclePermittingProcess.pdf Jump to: navigation, search File File history File usage Metadata File:06COAExtraLegalVehiclePermittingProcess.pdf Size of this preview: 463 ...

  6. Cyberspace security system

    DOE Patents [OSTI]

    Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

    2014-06-24

    A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

  7. Noise Secured Internet

    E-Print Network [OSTI]

    Geraldo A. Barbosa

    2006-02-28

    This work shows how a secure Internet can be implemented through a fast key distribution system that uses physical noise to protect the transmitted information. Starting from a shared random sequence $K_0$ between two (or more) users, longsequences $R$ of random bits can be shared. The signals sent over the Internet are deterministic but have a built-in Nature-made uncertainty that protects the shared sequences. After privacy amplification the shared $R$ random bits --encrypted by noise-- are subsequently utilized in one-time-pad data ciphering.

  8. Security | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDidDevelopment Top Scientific Impact Since its SearchSecurity Enhancing

  9. Energy Security Center

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES October 27th, 2010 Thanks forEnergy ScienceEnergy Security

  10. Energy Security Council

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HABFES October 27th, 2010 Thanks forEnergy ScienceEnergy Security

  11. Security, Safety and Health

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergy BillsNo.Hydrogen4 » Searchwith First JamesofAward509 WeekSecurity8, Fourth

  12. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput AnalysisSinkholeCapabilities GeneralWake-ImagingNotSecurity Home

  13. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput AnalysisSinkholeCapabilities GeneralWake-ImagingNotSecurity Home

  14. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National NuclearSecurityor

  15. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National

  16. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19, 2001 Energy

  17. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19, 2001 Energy24,

  18. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19, 2001

  19. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD | National19, 2001Y-12

  20. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you notHeatMaRIEdioxide capture CS SeminarsNRELNuclear Security

  1. Energy Security Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submitKansasCommunities EnergyU.S. DOE Office of99SavingTrilateralUnionSecurity

  2. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home RoomPreservation of Fe(II)GeothermalFuel MagnetizationTransportationVideos HomePower HomeSecurity

  3. dnn | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration (DOENNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, Shaping the future of nuclear...

  4. Web Engineering Security: Essential Elements

    E-Print Network [OSTI]

    Glisson, W.B.; Welland, R.; The Second International Conference on Availability, Reliability and Security (ARES).; 2007.; Vienna, Austria pp 707-714 IEEE [More Details

    Glisson,W.B. Welland,R. The Second International Conference on Availability, Reliability and Security (ARES). 2007. Vienna, Austria pp 707-714 IEEE

  5. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    CLIMATE CHANGE Multiplying Threats to National Securityfor the impacts of climate change on national security. Pagea warming world. Page 11 “Climate change acts as a threat

  6. testmenu | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    testmenu | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  7. taiwan | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    taiwan | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  8. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

  9. Cyber Security | More Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant,...

  10. hrp | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    hrp | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  11. sliderphotos | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    sliderphotos | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  12. Trident | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Trident | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  13. Nike | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Nike | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  14. Implementing Information Security and Its Technology: A Line Management Perspective

    E-Print Network [OSTI]

    Barletta, William A.

    2005-01-01

    of an integrated information security and privacy program.An institution's information security program forms thefrom the chief information security officer, chief security

  15. PIA - WEB Physical Security Major Application | Department of...

    Energy Savers [EERE]

    PIA - WEB Physical Security Major Application PIA - WEB Physical Security Major Application PIA - WEB Physical Security Major Application PDF icon PIA - WEB Physical Security Major...

  16. SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY

    E-Print Network [OSTI]

    SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National and to protect their systems and information from security threats and risks. There have been many past efforts

  17. Information Systems 32 (2007) 11661183 Security Attack Testing (SAT)--testing the security of

    E-Print Network [OSTI]

    2007-01-01

    Information Systems 32 (2007) 1166­1183 Security Attack Testing (SAT)--testing the security have been devoted into integrating security issues into information systems development practices reserved. Keywords: Information systems development methodology; Integrating security and software

  18. The National Security Policy Process: The National Security Council and Interagency System

    E-Print Network [OSTI]

    Huang, Wei

    The National Security Policy Process: The National Security Council and Interagency System By Alan Update: August 15, 2011 #12;THIS PAGE INTENTIONALLY BLANK 2 #12;Table of Contents The National Security Policy Process: The National Security Council and Interagency System

  19. GEORG-AUGUST-UNIVERSITT Computer Security

    E-Print Network [OSTI]

    Grabowski, Jens

    » Cybercrime and cyberterrorism » Information technology of little use without security 3 #12;GEORGGEORG-AUGUST-UNIVERSITÄT GÖTTINGEN Computer Security Overview and Introduction Computer Security Security @ Göttingen » Research group for comuter security » Prof. Dr. Konrad Rieck » 4 PhD students (+ 2

  20. Security Policies for Downgrading Stephen Chong

    E-Print Network [OSTI]

    Myers, Andrew C.

    @cs.cornell.edu ABSTRACT A long-standing problem in information security is how to specify and enforce expressive security that incorporates them, allowing secure downgrading of information through an explicit declassification operation of Com- puting and Information Systems]: Security and Protection General Terms: Security, Languages