Powered by Deep Web Technologies
Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

AMI System Security Requirements - v1_01-1 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AMI System Security Requirements - v101-1 AMI System Security Requirements - v101-1 This document provides the utility industry and vendors with a set of security requirements...

2

Microsoft Word - AMI System Security Requirements - v1_01-1.doc  

Broader source: Energy.gov (indexed) [DOE]

UCAIUG: AMI-SEC-ASAP UCAIUG: AMI-SEC-ASAP AMI System Security Requirements V1.01 ASAP 12/17/2008 AMI System Security Specification v1.0 Page i Executive Summary 1 This document provides the utility industry and vendors with a set of security requirements for 2 Advanced Metering Infrastructure (AMI). These requirements are intended to be used in the 3 procurement process, and represent a superset of requirements gathered from current cross- 4 industry accepted security standards and best practice guidance documents. 5 6 This document provides substantial supporting information for the use of these requirements 7 including scope, context, constraints, objectives, user characteristics, assumptions, and 8

3

Dimensionality of the USDA Food Security Index Amy G. Froelich  

E-Print Network [OSTI]

Dimensionality of the USDA Food Security Index Amy G. Froelich Helen H. Jensen Iowa State University DRAFT: November 21, 2002 Report prepared under USDA Economic Research Service cooperative the first Food Security Supplement (Module) designed to measure the amount of food insecurity and hunger

Froelich, Amy G.

4

Security Analysis of Selected AMI Failure Scenarios Using Agent Based Game Theoretic Simulation  

SciTech Connect (OSTI)

Information security analysis can be performed using game theory implemented in dynamic Agent Based Game Theoretic (ABGT) simulations. Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. We concentrated our analysis on the Advanced Metering Infrastructure (AMI) functional domain which the National Electric Sector Cyber security Organization Resource (NESCOR) working group has currently documented 29 failure scenarios. The strategy for the game was developed by analyzing five electric sector representative failure scenarios contained in the AMI functional domain. From these five selected scenarios, we characterize them into three specific threat categories affecting confidentiality, integrity and availability (CIA). The analysis using our ABGT simulation demonstrates how to model the AMI functional domain using a set of rationalized game theoretic rules decomposed from the failure scenarios in terms of how those scenarios might impact the AMI network with respect to CIA.

Abercrombie, Robert K [ORNL] [ORNL; Schlicher, Bob G [ORNL] [ORNL; Sheldon, Frederick T [ORNL] [ORNL

2014-01-01T23:59:59.000Z

5

E-Print Network 3.0 - amy trigger system Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

-installed operating system and software license agreement screens When an AMI instance boots for the first time... Industry Application Platform AMI you can begin using the...

6

Microsoft Word - NSTB_AMI_SecurityConsiderationsV4.doc  

Broader source: Energy.gov (indexed) [DOE]

SANDIA REPORT SAND2007-7327 Unlimited Release Printed November 2007 Advanced Metering Infrastructure Security Considerations Raymond C. Parks Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185 and Livermore, California 94550 Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration under Contract DE-AC04-94AL85000. Approved for public release; further dissemination unlimited. Advanced Metering Infrastructure Security Considerations 2 Issued by Sandia National Laboratories, operated for the United States Department of Energy by Sandia Corporation. NOTICE: This report was prepared as an account of work sponsored by an agency of

7

A Fair and Secure Bandwidth Allocation for AMI Mesh Network in Smart Grid  

Science Journals Connector (OSTI)

......weaknesses from the perspective of security. Since the smart grid is related to money and power, both of which...are likely to attack the underlying WMN of the smart grid to obtain monetary benefit or disrupt the power system. Note that the lack......

Hyejin Son; Taeyoon Kang; Hwangnam Kim; Jong-Bae Park; Jae Hyung Roh

2012-10-01T23:59:59.000Z

8

Energy Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyber-physical solutions Cybersecurity for energy delivery systems outreach AMI smart metering upgradeability test framework Practical quantum security for grid automation...

9

Physical Security Systems | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

10

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

11

A Fair and Secure Bandwidth Allocation for AMI Mesh Network in Smart Grid  

Science Journals Connector (OSTI)

......Firstly, the customer metering data should be end-to-end...the customers' metering data [6]; (ii...secure authentication method should be realized...to minimize their energy cost. With regard...can restore left energy back to the electric...we need to have a verification scheme for the customers......

Hyejin Son; Taeyoon Kang; Hwangnam Kim; Jong-Bae Park; Jae Hyung Roh

2012-10-01T23:59:59.000Z

12

A Fair and Secure Bandwidth Allocation for AMI Mesh Network in Smart Grid  

Science Journals Connector (OSTI)

......the delivered information [10]. 2.1.3. Demand response The demand response implies that customers modify their power consumption...power system to have a stable power demand. The demand response can be triggered by typical pricing schemes......

Hyejin Son; Taeyoon Kang; Hwangnam Kim; Jong-Bae Park; Jae Hyung Roh

2012-10-01T23:59:59.000Z

13

Secure video communications system  

DOE Patents [OSTI]

A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

Smith, Robert L. (Idaho Falls, ID)

1991-01-01T23:59:59.000Z

14

Securing Control Systems Modems  

Broader source: Energy.gov (indexed) [DOE]

Recommended Practice for Securing Recommended Practice for Securing Control System Modems January 2008 iii ABSTRACT This paper addresses an often overlooked "backdoor" into critical infrastructure control systems created by modem connections. A modem's connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods. iv ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland

15

National Security Information Systems (NSIS) -National Security Systems &  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

NSSA: National Security Information Systems NSSA: National Security Information Systems Nonproliferation & National Security (NPNS) Overview Technical Nonproliferation Policy Support Strategic Trade Control Review of export license applications Multilateral Export Control Arrangements Interdiction Engagement & Training INECP INSEP GIPP Safeguards Concepts and Approaches Human Capital Development Additional Protocol Technical Assistance National Security Systems & Assessments National Security Information Systems Vulnerability Assessment Team (VAT) Radiation Detection & Response (RDR) Contact NPNS Other Major Programs Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE Division on Flickr Nonproliferation and National Security Program National Security Systems & Assessments

16

Security systems engineering overview  

SciTech Connect (OSTI)

Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).

Steele, B.J.

1996-12-31T23:59:59.000Z

17

Security In Information Systems  

E-Print Network [OSTI]

rights, and they are proposing security policies, security planning, personal data protection laws, etc

Candan, Selçuk

18

GAANN -Computer Systems Security GAANN Computer Systems Security  

E-Print Network [OSTI]

GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important? ­ Computing devices have a large impact on our daily life ­ Guaranteeing that the devices perform as desired

Alpay, S. Pamir

19

National Security System Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

2007-03-08T23:59:59.000Z

20

Cyberspace security system  

SciTech Connect (OSTI)

A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

2014-06-24T23:59:59.000Z

Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Cyber Security & Smart Grid  

E-Print Network [OSTI]

Cyber Security & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart... and communication protocols. ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Smart Grid Systems ?Current Cyber Security Issues ? Advanced Metering Infrastructure (AMI) Security ? The wireless devices are used in the smart meters located...

Shapiro, J.

2011-01-01T23:59:59.000Z

22

Cyber Security Procurement Language for Control Systems Version 1.8 |  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security Procurement Language for Control Systems Version 1.8 Cyber Security Procurement Language for Control Systems Version 1.8 Cyber Security Procurement Language for Control Systems Version 1.8 Supervisory Control and Data Acquisition (SCADA), Process Control System (PCS), Distributed Control System (DCS), etc. generally refer to the systems which control, monitor, and manage the nation's critical infrastructures such as electric power generators, subway systems, dams, telecommunication systems, natural gas pipelines, and many others. Simply stated, a control system gathers information and then performs a function based on established parameters or information it received. Cyber Security Procurement Language for Control Systems Version 1.8 More Documents & Publications AMI System Security Requirements - v1_01-1

23

ETTP Security Access Control System (ESACS) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) More...

24

Safeguards and Security Systems | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Safeguards and Security Systems SHARE Safeguards and Security Systems Safeguards training class. ORNL is a leader in providing technologies and services for the global safeguards...

25

Integrated Security System | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

intrusion detection and security management for a networked energy control systems architecture Integrated Security System More Documents & Publications Cybersecurity for Energy...

26

Recommended Security Controls for Federal Information Systems...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

NIST 800-53 Revision 3 + Draft Revision 4 Recommended Security Controls for Federal Information Systems and Organizations Note: CNTL NO. Table D2: Security Control Base Lines...

27

PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE...  

Energy Savers [EERE]

SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS...

28

Ami - The Chemist's Amanuensis  

E-Print Network [OSTI]

of the RFID tagging was an intelligent labcoat. This was achieved by using a mini Arduino card with an RFID reader built into the sleeve. The Arduino had a Bluetooth transmitter with it, which was able to transmit readings to the Ami application running... by Ami. Timeline takes this event log and displays different sorts of events in different colours. Monitoring Device Arduino For close-up monitoring of the reaction, an infrared temperature sensor was used. This was controlled by an Arduino...

Brooks, Brian; Thorn, Adam; Smith, Matthew; Matthews, Peter; Chen, Shaoming; O'Steen, Ben; Adams, Sam; Townsend, Joseph A; Murray-Rust, Peter

2011-07-04T23:59:59.000Z

29

Argonne's National Security Information Systems National  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

National Security National Security Information Systems National Security The NSIS team has worked with various government agencies and programs over the past 15 years to create customized technological solutions that meet specific needs, while also fulfilling national security objectives, improving efficiency and reducing costs. Applying a broad range of expertise and experience, the Argonne team develops both unclassified and classified information technology (IT) systems for national security and nonproliferation programs, with a focus on security operations, international treaty implementation, export control and law enforcement support. Some examples of NSIS-developed systems include:  Electronic Facility Clearance (e-FCL) System for the U.S. Department of Defense (DOD)

30

Pantex Occupational Health System (OHS), National Nuclear Security...  

Energy Savers [EERE]

Pantex Occupational Health System (OHS), National Nuclear Security Administration Pantex Site Office Pantex Occupational Health System (OHS), National Nuclear Security...

31

Control Systems Security Standards: Accomplishments And Impacts |  

Broader source: Energy.gov (indexed) [DOE]

Control Systems Security Standards: Accomplishments And Impacts Control Systems Security Standards: Accomplishments And Impacts Control Systems Security Standards: Accomplishments And Impacts This report describes the accomplishments and impacts of the standards team towards achieving these three goals and describes the follow-on efforts that need to be made toward meeting the priority strategies defined in the DOE/DHS Roadmap to Secure Control Systems in the Energy Sector. Control Systems Security Standards: Accomplishments & Impacts More Documents & Publications A Summary of Control System Security Standards Activities in the Energy Sector (October 2005) Roadmap to Secure Control Systems in the Energy Sector 2006 - Presentation to the 2008 ieRoadmap Workshop DOE/OE National SCADA Test Bed Fiscal Year 2009 Work Plan

32

AMI | OpenEI  

Open Energy Info (EERE)

AMI AMI Dataset Summary Description This dataset represents a historical repository of all the numerical data from the smartgrid.gov website condensed into spreadsheets to enable analysis of the data. Below are a couple of things worth noting: Source Smartgrid.gov Date Released March 04th, 2013 (11 months ago) Date Updated March 04th, 2013 (11 months ago) Keywords AMI costs distribution smart grid transmission Data application/vnd.openxmlformats-officedocument.spreadsheetml.sheet icon SmartGrid.gov Quarterly Data Summary 4Q12 (xlsx, 112.1 KiB) application/vnd.openxmlformats-officedocument.spreadsheetml.sheet icon SmartGrid.gov Quarterly Data Summary 3Q12 (xlsx, 107.9 KiB) application/vnd.openxmlformats-officedocument.spreadsheetml.sheet icon SmartGrid.gov Quarterly Data Summary 2Q12 (xlsx, 111.9 KiB)

33

Threats to financial system security  

SciTech Connect (OSTI)

The financial system in the United States is slowly migrating from the bricks and mortar of banks on the city square to branch banks, ATM`s, and now direct linkage through computers to the home. Much work has been devoted to the security problems inherent in protecting property and people. The impact of attacks on the information aspects of the financial system has, however, received less attention. Awareness is raised through publicized events such as the junk bond fraud perpetrated by Milken or gross mismanagement in the failure of the Barings Bank through unsupervised trading activities by Leeson in Singapore. These events, although seemingly large (financial losses may be on the order of several billion dollars), are but small contributors to the estimated $114 billion loss to all types of financial fraud in 1993. Most of the losses can be traced to the contribution of many small attacks perpetrated against a variety of vulnerable components and systems. This paper explores the magnitude of these financial system losses and identifies new areas for security to be applied to high consequence events.

McGovern, D.E.

1997-06-01T23:59:59.000Z

34

Electronic DOE Information Security System (eDISS) PIA, Office...  

Office of Environmental Management (EM)

DOE Information Security System (eDISS) PIA, Office of Health Safety and Security Electronic DOE Information Security System (eDISS) PIA, Office of Health Safety and Security...

35

A Distributed Honeypot System for Grid Security  

Science Journals Connector (OSTI)

In this paper, we propose a distributed honeypot model for grid computing system security. Based on the IDS Snort and the...

Geng Yang; Chunming Rong; Yunping Dai

2004-01-01T23:59:59.000Z

36

Security services architecture for Secure Mobile Grid Systems  

Science Journals Connector (OSTI)

Mobile Grid, is a full inheritor of the Grid with the additional feature that it supports mobile users and resources. Security is an important aspect in Grid based systems, and it is more complex to ensure this in a mobile platform owing to the limitations of resources in these devices. A Grid infrastructure that supports the participation of mobile nodes and incorporates security aspects will thus play a significant role in the development of Grid computing. The idea of developing software through systematic development processes to improve software quality is not new. However, many information systems such as those of Grid Computing are still not developed through methodologies which have been adapted to their most differentiating features. The lack of adequate development methods for this kind of systems in which security is taken into account has encouraged us to build a methodology to develop them, offering a detailed guide for their analysis, design and implementation. It is important to use software V&V techniques, according to IEEE Std. 1012 for Software Verification and Validation, to ensure that a software system meets the operational needs of the user. This ensures that the requirements for the system are correct, complete, and consistent, and that the life-cycle products correctly design and implement system requirements. This paper shows part of a development process that we are elaborating for the construction of information systems based on Grid Computing, which are highly dependent on mobile devices in which security plays a highly important role. In the design activity of the process, we design a security architecture which serves as a reference for any mobile Grid application that we wish to build since this security architecture defines a complete set of security services which will be instantiated depending on the requirements and features found in previous activities of the process. A V&V task is also defined in the design activity to validate and verify both the architecture built and the traceability of the artifacts generated in this activity. In this paper, we will present the service-oriented security architecture for Mobile Grid Systems which considers all possible security services that may be required for any mobile Grid application.

David G. Rosado; Eduardo Fernndez-Medina; Javier Lpez

2011-01-01T23:59:59.000Z

37

NREL: Biomass Research - Amie Sluiter  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Amie Sluiter Amie Sluiter Amie Sluiter (aka Amie D. Sluiter, Amie Havercamp) is a scientist at the National Renewable Energy Laboratory's National Bioenergy Center in Golden, Colorado. Research Interests Amie Sluiter began research in the biomass-to-ethanol field in 1996. She joined the Biomass Analysis Technologies team to provide compositional analysis data on biomass feedstocks and process intermediates for use in pretreatment models and techno-economic analyses. The results of wet chemical analysis provide guidance on feedstock handling, pretreatment conditions, economic viability, and life cycle analyses. Amie Sluiter has investigated a number of biomass analysis methods and is an author on 11 Laboratory Analytical Procedures (LAPs), which are being used industry-wide. She has taught full biomass compositional analysis

38

Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security Mechanisms?  

E-Print Network [OSTI]

Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security Mechanisms--Improving energy efficiency of security-aware storage systems is challenging, because security and energy security and energy efficiency is to profile encryption algorithms to decide if storage systems would

Qin, Xiao

39

ORO Office Safeguards and Security Clearance Tracking System...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Office Safeguards and Security Clearance Tracking System and Visitor Control System PIA, Oak Ridge Operations Office ORO Office Safeguards and Security Clearance Tracking System...

40

DOE and Industry Showcase New Control Systems Security Technologies...  

Broader source: Energy.gov (indexed) [DOE]

Technology Development Energy Delivery Systems Cybersecurity Control Systems Security News Archive DOE and Industry Showcase New Control Systems Security Technologies at...

Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

AMIE (ACRF MJO Investigation Experiment)  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AMIE AMIE (ACRF MJO Investigation Experiment) Planning Meeting AMIE Science Steering Committee Chuck Long, Tony DelGenio, Bill Gustafson, Bob Houze, Mike Jensen, Steve Klein, Ruby Leung, Xaihong Liu, Ed Luke, Peter May, Sally McFarlane, Pat Minnis, Courtney Schumacher, Andy Vogelmann, Yi Wang, Xiaoqing Wu, Shaohong Xie Agenda * Proposal due May 1 !!!!!! * Primary purpose of this meeting is discussions and planning in support of

42

Research on Security Architecture and Protocols of Grid Computing System  

Science Journals Connector (OSTI)

This paper analyzes security problems existing in Grid Computing System and describes the security mechanism in Grid Computing System. After briefly introducing the security abstract of grid computing system at Grid

Xiangming Fang; Shoubao Yang; Leitao Guo; Lei Zhang

2004-01-01T23:59:59.000Z

43

Classified Automated Information System Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish uniform requirements, policies, responsibilities, and procedures for the development and implementation of a Department of Energy (DOE) Classified Computer Security Program to ensure the security of classified information in automated data processing (ADP) systems. Cancels DOE O 5637.1. Canceled by DOE O 471.2.

1994-07-15T23:59:59.000Z

44

Common Cyber Security Vulnerabilities Observed in Control System...  

Broader source: Energy.gov (indexed) [DOE]

Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by...

45

National SCADA Test Bed - Enhancing control systems security...  

Broader source: Energy.gov (indexed) [DOE]

SCADA Test Bed - Enhancing control systems security in the energy sector (September 2009) National SCADA Test Bed - Enhancing control systems security in the energy sector...

46

Security Analysis and Project Management Systems | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Analysis and Project Management Systems SHARE Security Analysis and Project Management Systems ORNL brings together the subject matter experts with programmers to design,...

47

Collaboration Topics - System Software | National Nuclear Security  

National Nuclear Security Administration (NNSA)

System Software | National Nuclear Security System Software | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Collaboration Topics - System Software Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and

48

Recommended Practice for Securing Control System Modems  

SciTech Connect (OSTI)

This paper addresses an often overlooked backdoor into critical infrastructure control systems created by modem connections. A modems connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods.

James R. Davidson; Jason L. Wright

2008-01-01T23:59:59.000Z

49

Secure videoconferencing equipment switching system and method  

DOE Patents [OSTI]

Examples of systems described herein include videoconferencing systems having audio/visual components coupled to a codec. The codec may be configured by a control system. Communication networks having different security levels may be alternately coupled to the codec following appropriate configuration by the control system. The control system may also be coupled to the communication networks.

Dirks, David H; Gomes, Diane; Stewart, Corbin J; Fischer, Robert A

2013-04-30T23:59:59.000Z

50

Secure control systems with application to cyber-physical systems  

Science Journals Connector (OSTI)

Control systems are computer-based systems with networked units consisting of sensors, actuators, control processing units, and communication devices. The role of control system is to interact, monitor, and control physical processes. Reactive power ... Keywords: SCADA systems, cyber-physical systems, secure control, security

Jin Dong; Seddik. M. Djouadi; James J. Nutaro; Teja Kuruganti

2014-04-01T23:59:59.000Z

51

Aerial Measuring System | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Measuring System | National Nuclear Security Administration Measuring System | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Aerial Measuring System Home > About Us > Our Programs > Emergency Response > Responding to Emergencies > Consequence Management > Aerial Measuring System Aerial Measuring System AMS Logo NNSA's Aerial Measuring System (AMS) provides specialized airborne

52

System security Dr Len Hamey  

E-Print Network [OSTI]

threat, mitigates risk) The Attack Of The Killer Hack: Are You A Target For Hackers? 2004 Australian and behaviour ­ 65% Keeping up-to-date with latest threats ­ 61% Largest Factors Contributing To Hacks and procedures The Attack Of The Killer Hack Are You A Target For Hackers? Security Timeline #12;3 The Anatomy

Hamey, Len

53

Failure Impact Analysis of Key Management in AMI Using Cybernomic Situational Assessment (CSA)  

SciTech Connect (OSTI)

In earlier work, we presented a computational framework for quantifying the security of a system in terms of the average loss a stakeholder stands to sustain as a result of threats to the system. We named this system, the Cyberspace Security Econometrics System (CSES). In this paper, we refine the framework and apply it to cryptographic key management within the Advanced Metering Infrastructure (AMI) as an example. The stakeholders, requirements, components, and threats are determined. We then populate the matrices with justified values by addressing the AMI at a higher level, rather than trying to consider every piece of hardware and software involved. We accomplish this task by leveraging the recently established NISTR 7628 guideline for smart grid security. This allowed us to choose the stakeholders, requirements, components, and threats realistically. We reviewed the literature and selected an industry technical working group to select three representative threats from a collection of 29 threats. From this subset, we populate the stakes, dependency, and impact matrices, and the threat vector with realistic numbers. Each Stakeholder s Mean Failure Cost is then computed.

Abercrombie, Robert K [ORNL] [ORNL; Sheldon, Frederick T [ORNL] [ORNL; Hauser, Katie R [ORNL] [ORNL; Lantz, Margaret W [ORNL] [ORNL; Mili, Ali [New Jersey Insitute of Technology] [New Jersey Insitute of Technology

2013-01-01T23:59:59.000Z

54

Primer Control System Cyber Security Framework and Technical Metrics  

SciTech Connect (OSTI)

The Department of Homeland Security National Cyber Security Division supported development of a control system cyber security framework and a set of technical metrics to aid owner-operators in tracking control systems security. The framework defines seven relevant cyber security dimensions and provides the foundation for thinking about control system security. Based on the developed security framework, a set of ten technical metrics are recommended that allow control systems owner-operators to track improvements or degradations in their individual control systems security posture.

Wayne F. Boyer; Miles A. McQueen

2008-05-01T23:59:59.000Z

55

An ontology-based approach to information systems security management  

Science Journals Connector (OSTI)

Complexity of modern information systems (IS), impose novel security requirements. On the other hand, the ontology paradigm aims to support knowledge sharing and reuse in an explicit and mutually agreed manner. Therefore, in this paper we set the foundations ... Keywords: IS security, security management, security ontology, security policy

Bill Tsoumas; Stelios Dritsas; Dimitris Gritzalis

2005-09-01T23:59:59.000Z

56

A Data Grid Security System Based on Shared Context  

Science Journals Connector (OSTI)

Data grid system supports uniform and secure access of ... administrative domains, each with its own local security policy. The security challenge has been a focus in a data grid environment. This paper mainly pr...

Nong Xiao; Xiaonian Wu; Wei Fu; Xiangli Qu

2004-01-01T23:59:59.000Z

57

Amy Kidd | Department of Energy  

Energy Savers [EERE]

Amy Kidd is a Project Officer with the State Energy Program. Most Recent Swept Away by Alternative Energy January 17 Harvesting the Sun at the West Tennessee Solar Farm April 18...

58

Security Controls for Unclassified Information Systems Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Does not cancel other directives. Canceled by DOE O 205.1B

2009-01-05T23:59:59.000Z

59

Security Controls for Unclassified Information Systems Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

2009-01-05T23:59:59.000Z

60

Security Controls for Unclassified Information Systems Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes minimum implementation standards for cyber security technical, management, and operational controls that will be followed in all information systems operated by DOE and the information systems. Admin Chg 1 dated 9-1-09. Canceled by DOE O 205.1B.

2009-01-05T23:59:59.000Z

Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

T-592: Cisco Security Advisory: Cisco Secure Access Control System...  

Office of Environmental Management (EM)

can change the passwords of arbitrary users. PLATFORM: Cisco Secure ACS versions 5.1 patch 3, 4, and 5; 5.2; 5.2 patch 1 and 2 ABSTRACT: Cisco Secure ACS operates as a...

62

NNSA Policy System | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Policy System | National Nuclear Security Administration Policy System | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog NNSA Policy System Home > About Us > Our Operations > Management and Budget > NNSA Policy System NNSA Policy System The NNSA's Policy System is established under the authority of Section 3212(d) of Public Law 106-65, the National Defense Authorization Act for

63

Processes in Securing Open Architecture Software Systems  

E-Print Network [OSTI]

, and development practices play in facilitating or constrain- ing these processes through the case study. Our/variants. We employ a case study focusing on an OA software system whose security must be continually sustained versus descriptive practice of these processes and tool usage in studies of conventional and open source

Scacchi, Walt

64

Control Systems Security Standards: Accomplishments & Impacts  

Broader source: Energy.gov (indexed) [DOE]

019 019 Unlimited Release November 2007 Control Systems Security Standards Accomplishments & Impacts Ronald Halbgewachs Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185 and Livermore, California 94550 Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration under Contract DE-AC04-94AL85000. Approved for public release; further dissemination unlimited. 2 Issued by Sandia National Laboratories, operated for the United States Department of Energy by Sandia Corporation. NOTICE: This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government, nor any agency

65

Security Metricsfor Process Control Systems  

Broader source: Energy.gov [DOE]

This document describes the foundations of metrics, discusses application of these metrics to control system environments, introduces a metrics taxonomy, and suggests usage of metrics to achieve...

66

Mitigations for Security Vulnerabilities Found in Control System Networks |  

Broader source: Energy.gov (indexed) [DOE]

Mitigations for Security Vulnerabilities Found in Control System Mitigations for Security Vulnerabilities Found in Control System Networks Mitigations for Security Vulnerabilities Found in Control System Networks Industry is aware of the need for Control System (CS) security, but in on-site assessments, Idaho National Laboratory (INL) has observed that security procedures and devices are not consistently and effectively implemented. The Department of Homeland Security (DHS), National Cyber Security Division (NCSD), established the Control Systems Security Center (CSSC) at INL to help industry and government improve the security of the CSs used in the nation's critical infrastructures. One of the main CSSC objectives is to identify control system vulnerabilities and develop effective mitigations for them. This paper discusses common problems and vulnerabilities seen in

67

Senior Systems Engineer | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Senior Systems Engineer | National Nuclear Security Administration Senior Systems Engineer | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Who We Are > In The Spotlight > Regina Griego Senior Systems Engineer Regina Griego Regina Griego Role: Senior Systems Engineer Profile: Regina Griego has been elected a fellow of the International Council on

68

Securing Electrical Power System Operation  

Science Journals Connector (OSTI)

Automation in power systems has avery long tradition. Just recall the flyball governor in a steam engine and it becomes clear that power people have been using control principles and instruments for more th...

Petr Horacek PhD

2009-01-01T23:59:59.000Z

69

Cyber-Security of Networked Control Systems Karl Henrik Johansson  

E-Print Network [OSTI]

7/3/12 1 Cyber-Security of Networked Control Systems Karl Henrik Johansson #12;7/3/12 2 Recent Cyber-ARacks on Control Systems Cyber-Security of Networked

Johansson, Karl Henrik

70

Information System Security Manager (ISSM) | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

ISSM Core Competency Training Worksheet More Documents & Publications Information System Security Officer (ISSO) Cybersecurity Program Manager (CSPM) Authorizing Official (AO)...

71

Classified Information Systems Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides requirements and implementation instructions for the graded protection of the confidentiality, integrity, and availability of information processed on all automated information systems used to collect, create, process, transmit, store, and disseminate classified information by, or on behalf of, the Department of Energy (DOE). DOE N 205.4 cancels Chapter III section 8, Incident Reporting, and DOE N 205.3 cancels Chapter VI, paragraph 4j(2), 4j(6); and Chapter VII, paragraph 12a(2)(a). Cancels: DOE M 5639.6A-1. Canceled by DOE M 205.1-4.

1999-08-03T23:59:59.000Z

72

Service Oriented Architecture in Network Security - a novel Organisation in Security Systems  

E-Print Network [OSTI]

Current network security systems are a collection of various security components, which are directly installed in the operating system. These check the whole node for suspicious behaviour. Armouring intrusions e.g. have the ability to hide themselves from being checked. We present in this paper an alternative organisation of security systems. The node is completely virtualized with current virtualization systems so that the operating system with applications and the security system is distinguished. The security system then checks the node from outside and the right security components are provided through a service oriented architecture. Due to the running in a virtual machine, the infected nodes can be halted, duplicated, and moved to other nodes for further analysis and legal aspects. This organisation is in this article analysed and a preliminary implementation showing promising results are discussed.

Hilker, Michael

2008-01-01T23:59:59.000Z

73

Advanced Metering Infrastructure Security Considerations | Department...  

Broader source: Energy.gov (indexed) [DOE]

Infrastructure Security Considerations The purpose of this report is to provide utilities implementing Advanced Metering Infrastructure (AMI) with the knowledge necessary to...

74

THREAT-DRIVEN ARCHITECTURAL DESIGN OF SECURE INFORMATION SYSTEMS  

E-Print Network [OSTI]

THREAT-DRIVEN ARCHITECTURAL DESIGN OF SECURE INFORMATION SYSTEMS Joshua Pauli College of Business.xu@ndsu.nodak.edu Keywords: Software architecture, Security, Threat model, Use case, Misuse case, UML Abstract: To deal with software security issues in the early stages of system development, this paper presents a threat- driven

75

CyberPhysical System Security for the Electric Power Grid  

E-Print Network [OSTI]

INVITED P A P E R Cyber­Physical System Security for the Electric Power Grid Control in power research efforts aimed at enhancing the smart grid's application and infrastructure security. Finally­physical systems (CPS); cyber security; electric grid; smart grid; supervisory control and data acquisi- tion

Manimaran, Govindarasu

76

Power System Security in Market Clearing and Dispatch Mechanisms  

E-Print Network [OSTI]

costs while maintaining grid security; however, the dominant concern was system reliability, while costs1 Power System Security in Market Clearing and Dispatch Mechanisms Claudio A. Ca~nizares, Senior typical market clearing and dispatch mechanisms based on security- constrained (SC) optimal power flow

Cañizares, Claudio A.

77

Security Modeling of Grid Systems Using Petri Nets  

Science Journals Connector (OSTI)

The paper reviews the security problem with computing and information resources in Grid systems. It discusses security relative characteristics of Grid architecture and provides a common threat model of Grid. It ...

Peter D. Zegzhda; Dmitry P. Zegzhda; Maxim O. Kalinin

2012-01-01T23:59:59.000Z

78

Security Requirements Model for Grid Data Management Systems  

Science Journals Connector (OSTI)

In this paper, we present our ongoing work of a policy-driven approach to security requirements of grid data management systems (GDMS). We analyse the security functionalities of existing GDMS to determine their ...

Syed Naqvi; Philippe Massonet; Alvaro Arenas

2006-01-01T23:59:59.000Z

79

Recommended Practice for Securing Control System Modems | Department of  

Broader source: Energy.gov (indexed) [DOE]

Practice for Securing Control System Modems Practice for Securing Control System Modems Recommended Practice for Securing Control System Modems This paper addresses an often overlooked "backdoor" into critical infrastructure control systems created by modem connections. A modem's connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods. Recommended Practice for Securing Control System Modems More Documents & Publications

80

Control Systems Cyber Security: Defense in Depth Strategies ...  

Broader source: Energy.gov (indexed) [DOE]

that use control system networks while maintaining a multi-tier information architecture. Control Systems Cyber Security: Defense in Depth Strategies More Documents &...

Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

E-voting in an AmI world: Trust, privacy and social implications  

E-Print Network [OSTI]

E-voting in an AmI world: Trust, privacy and social implications Linda Little¹, Tim Storer², Pam implications, in particular the protection and management of personal information. As a result, we have of health, financial, shopping and e-voting information when using AmI system. The findings related to the e

Storer, Tim

82

Security  

Broader source: Energy.gov [DOE]

Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

83

Uni ed Support for Heterogeneous Security Policies in Distributed Systems  

E-Print Network [OSTI]

Uni ed Support for Heterogeneous Security Policies in Distributed Systems Naftaly H. Minsky in this paper a security mechanism that can support e ciently, and in a uni ed manner, a wide range of security policies are de ned formallyandexplicitly,and are enforced bya uni ed mechanism. Each policy under

Minsky, Naftaly

84

Secure Mobile Data Collection Systems for Low-Budget Settings  

Science Journals Connector (OSTI)

Lack of infrastructures in health care and transportation, combined with the demand for low cost health services and shortage of medical professionals, are some of the known causes for loss of life in low income countries. Mobile Health (a.k.a. mHealth) ... Keywords: mHealth, Mobile Data Collection Systems, Mobile Security, J2ME, HTTPS, secure communication protocols, secure mobile data storage, secure mobile data transmission

F. Mancini; S. Gejibo; K. A. Mughal; R. A. B. Valvik; J. Klungsoyr

2012-08-01T23:59:59.000Z

85

ORO Office Safeguards and Security Clearance Tracking System and Visitor  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Office Safeguards and Security Clearance Tracking System and Office Safeguards and Security Clearance Tracking System and Visitor Control System PIA, Oak Ridge Operations Office ORO Office Safeguards and Security Clearance Tracking System and Visitor Control System PIA, Oak Ridge Operations Office ORO Office Safeguards and Security Clearance Tracking System and Visitor Control System PIA, Oak Ridge Operations Office ORO Office Safeguards and Security Clearance Tracking System and Visitor Control System PIA, Oak Ridge Operations Office More Documents & Publications Occupational Medicine - Assistant PIA, Idaho National Laboratory ORO Verification of Employment Tracking System(VETS) PIA, Oak ridge Operations Office iManage Strategic Integrated Procurement Enterprise System (STRIPES) PIA, Office of Procurement and Assistance Management

86

A Hierarchical Security Architecture for Cyber-Physical Systems  

SciTech Connect (OSTI)

Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.

Quanyan Zhu; Tamer Basar

2011-08-01T23:59:59.000Z

87

Proposed platform for improving grid security by trust management system  

E-Print Network [OSTI]

With increasing the applications of grid system, the risk in security field is enhancing too. Recently Trust management system has been recognized as a noticeable approach in enhancing of security in grid systems. In this article due to improve the grid security a new trust management system with two levels is proposed. The benefits of this platform are adding new domain in grid system, selecting one service provider which has closest adaption with user requests and using from domains security attribute as an important factor in computing the trust value.

Siadat, Safieh; Mohsenzadeh, Mehran

2009-01-01T23:59:59.000Z

88

List of Major Information Systems,National Nuclear Security Administration  

Broader source: Energy.gov (indexed) [DOE]

List of Major Information Systems,National Nuclear Security List of Major Information Systems,National Nuclear Security Administration ADaPT Networked: List of Major Information Systems,National Nuclear Security Administration ADaPT Networked: List of Major Information Systems, Defense Line of Business National Nuclear Security Administration ADaPT Networked: Develops and deploys emerging information networking technology to production processes in support of the U.S. nuclear weapons stockpile. National Nuclear Security Administration ADaPT Network Infrastructure: Develops and deploys emerging information networking technology to production processes in support of the U.S. nuclear weapons stockpile. .major_information_systems.pdf List of Major Information Systems,National Nuclear Security Administration ADaPT Networked:

89

Help for the Developers of Control System Cyber Security Standards  

SciTech Connect (OSTI)

A Catalog of Control Systems Security: Recommendations for Standards Developers (Catalog), aimed at assisting organizations to facilitate the development and implementation of control system cyber security standards, has been developed. This catalog contains requirements that can help protect control systems from cyber attacks and can be applied to the Critical Infrastructures and Key Resources of the United States and other nations. The requirements contained in the catalog are a compilation of practices or various industry bodies used to increase the security of control systems from both physical and cyber attacks. They should be viewed as a collection of recommendations to be considered and judiciously employed, as appropriate, when reviewing and developing cyber security standards for control systems. The recommendations in the Catalog are intended to be broad enough to provide any industry using control systems the flexibility needed to develop sound cyber security standards specific to their individual security requirements.

Robert P. Evans

2008-05-01T23:59:59.000Z

90

Prototype system brings advantages of wireless technology to secure  

National Nuclear Security Administration (NNSA)

Prototype system brings advantages of wireless technology to secure Prototype system brings advantages of wireless technology to secure environment | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > Prototype system brings advantages of wireless technology ... Prototype system brings advantages of wireless technology to secure environment

91

A Summary of Control System Security Standards Activities in...  

Broader source: Energy.gov (indexed) [DOE]

sector standards, guidelines, and technical reports, demonstrating standards coverage by security topic. This work focuses on control systems standards applicable to the energy...

92

Securing Distributed Storage: Challenges, Techniques, and Systems  

E-Print Network [OSTI]

important security issues related to storage and present a comprehensive survey of the security services, present a critical review of the existing solutions, compare them, and highlight potential research issues time, recent trends in data outsourcing have raised many new privacy issues making security a crucial

Kim, Dae-Shik

93

Security plan for the Automated Transportation Management System  

SciTech Connect (OSTI)

The Automated Transportation Management System (ATMS) is an unclassified non-sensitive system consisting of hardware and software designed to facilitate the shipment of goods for the US Department of Energy (DOE). The system is secured against waste, fraud, abuse, misuse, and programming errors through a series of security measures that are discussed in detail in this document.

Not Available

1994-04-01T23:59:59.000Z

94

Techniques for Securing Substation Automation Systems David Guidry1  

E-Print Network [OSTI]

Techniques for Securing Substation Automation Systems David Guidry1 , Mike Burmester1 , Xiuwen Liu1 propose techniques for resilient substation automation of power utility systems with security based-90-5 compliant substation automation systems that are resilient. We demonstrate the feasibility of our approach

Burmester, Mike

95

Women @ Energy: Amy Bauer | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Amy Bauers research has always focused on protecting people, whether from cancer, HIV or nuclear terrorism. She works on a broad range of nuclear counterterrorism...

96

TOWARD HIGHLY SECURE AND AUTONOMIC COMPUTING SYSTEMS: A HIERARCHICAL APPROACH  

SciTech Connect (OSTI)

The overall objective of this research project is to develop novel architectural techniques as well as system software to achieve a highly secure and intrusion-tolerant computing system. Such system will be autonomous, self-adapting, introspective, with self-healing capability under the circumstances of improper operations, abnormal workloads, and malicious attacks. The scope of this research includes: (1) System-wide, unified introspection techniques for autonomic systems, (2) Secure information-flow microarchitecture, (3) Memory-centric security architecture, (4) Authentication control and its implication to security, (5) Digital right management, (5) Microarchitectural denial-of-service attacks on shared resources. During the period of the project, we developed several architectural techniques and system software for achieving a robust, secure, and reliable computing system toward our goal.

Lee, Hsien-Hsin S

2010-05-11T23:59:59.000Z

97

DOE and Industry Showcase New Control Systems Security Technologies at  

Broader source: Energy.gov (indexed) [DOE]

Technology Development » Energy Delivery Systems Technology Development » Energy Delivery Systems Cybersecurity » Control Systems Security News Archive » DOE and Industry Showcase New Control Systems Security Technologies at DistribuTECH DOE and Industry Showcase New Control Systems Security Technologies at DistribuTECH DistribuTECH Conference Tuesday-Thursday, March 23-25, 2010 Tampa Convention Center Booth #231 Tampa, FL Join the Department of Energy and its industry partners as they showcase six new products and technologies designed to secure the nation's energy infrastructure from cyber attack on Tuesday through Thursday, March 23-25. Visit Booth #231 at the DistribuTECH 2010 Conference & Exhibition in Tampa, FL, to see first-hand demonstrations of several newly commercialized control systems security products-each developed through a

98

Aviation Safety + Security Program GLOBAL EXPERTS IN SAFETY MANAGEMENT SYSTEMS  

E-Print Network [OSTI]

2010- 2011 Aviation Safety + Security Program GLOBAL EXPERTS IN SAFETY MANAGEMENT SYSTEMS Relevance and currency -- that is what drives the Aviation Safety and Security Program of the USC Viterbi that our core course, Aviation Safety Management Systems, is so necessary in ensuring the safety

Wang, Hai

99

Applications for cyber security - System and application monitoring  

SciTech Connect (OSTI)

Standard network security measures are adequate for defense against external attacks. However, many experts agree that the greater threat is from internal sources. Insiders with malicious intentions can change controller instructions, change alarm thresholds, and issue commands to equipment which can damage equipment and compromise control system integrity. In addition to strict physical security the state of the system must be continually monitored. System and application monitoring goes beyond the capabilities of network security appliances. It will include active processes, operating system services, files, network adapters and IP addresses. The generation of alarms is a crucial feature of system and application monitoring. The alarms should be integrated to avoid the burden on operators of checking multiple locations for security violations. Tools for system and application monitoring include commercial software, free software, and ad-hoc tools that can be easily created. System and application monitoring is part of a 'defense-in-depth' approach to a control network security plan. Layered security measures prevent an individual security measure failure from being exploited into a successful security breach. Alarming of individual failures is essential for rapid isolation and correction of single failures. System and application monitoring is the innermost layer of this defense strategy. (authors)

Marron, J. E. [Invensys Process Systems, 33 Commercial Street, Foxboro, MA 02035 (United States)

2006-07-01T23:59:59.000Z

100

Research challenges for the security of control systems  

Science Journals Connector (OSTI)

In this paper we attempt to answer two questions: (1) Why should we be interested in the security of control systems? And (2) What are the new and fundamentally different requirements and problems for the security of control systems? We also propose ...

Alvaro A. Crdenas; Saurabh Amin; Shankar Sastry

2008-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Embedded system: a solution for home security.  

E-Print Network [OSTI]

??The objective of this thesis is to present the reader with the latest advances in home automation technologies with an emphasis on security. The X10/INSTEON, (more)

Hern, Roland Lee

2014-01-01T23:59:59.000Z

102

Developing Secure Power Systems Professional Competence: Alignment and Gaps  

Broader source: Energy.gov (indexed) [DOE]

Developing Secure Power Systems Professional Competence: Alignment Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs - Phase 2 (July/August 2013) Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs - Phase 2 (July/August 2013) DOE has recognized that the electricity industry needs workforce development resources that can aid in the accelerating need for Secure Power Systems Professionals, while at the same time identifying capabilities and competencies to protect and enable the modernized grid currently being built. In the spring of 2011 a project was initiated to identify those capabilities and competencies along with assessing the need and qualifications for a certification program for Secure Power Systems

103

Amy LaFountain | Photosynthetic Antenna Research Center  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

placeholder image Amy LaFountain Research Affiliate Technical Assocaite E-mail: amy.lafountain@uconn.edu Website: University of Connecticut Research and Technical Associates...

104

Secure control systems with application to cyber-physical systems  

SciTech Connect (OSTI)

Control systems are computer-based systems with networked units consisting of sensors, actuators, control processing units, and communication devices. The role of control system is to interact, monitor, and control physical processes. Reactive power control is a fundamental issue in ensuring the security of the power network. It is claimed that Synchronous Condensers (SC) have been used at both distribution and transmission voltage levels to improve stability and to maintain voltages within desired limits under changing load conditions and contingency situations. Performance of PI controller corresponding to various tripping faults are analyzed for SC systems. Most of the eort in protecting these systems has been in protection against random failures or reliability. However, besides failures these systems are subject to various signal attacks for which new analysis are discussed here. When a breach does occur, it is necessary to react in a time commensurate with the physical dynamics of the system as it responds to the attack. Failure to act swiftly enough may result in undesirable, and possibly irreversible, physical eects. Therefore, it is meaningful to evaluate the security of a cyber-physical system, especially to protect it from cyber-attack. Illustrative numerical examples are provided together with an application to the SC systems.

Dong, Jin [ORNL] [ORNL; Djouadi, Seddik M [ORNL] [ORNL; Nutaro, James J [ORNL] [ORNL; Kuruganti, Phani Teja [ORNL] [ORNL

2014-01-01T23:59:59.000Z

105

Creating security applications based on The Global Certificate Management System  

Science Journals Connector (OSTI)

The Certificate Management System (CMS) is a global network system whose primary services are generation, distribution, storage and verification of certificates. It supports various security applications which use public key cryptography by providing the means for the administration of certificates. This paper describes the interface between security enhanced application and the CMS. The interface layer with which the security applications are extended is named CMS Client. The CMS Client comprises a set of functions that enable the certification of users of security applications, retrieval of certificates and verification of retrieved certificates. The paper gives a short description of the CMS system and a detailed description of the CMS Client functions. Furthermore it describes how to extend the existing or create new security applications based on the CMS system.

Nada Kapidzic

1998-01-01T23:59:59.000Z

106

Secure Safety: Secure Remote Access to Critical Safety Systems in Offshore Installations  

Science Journals Connector (OSTI)

Safety Instrumented Systems (SIS) as defined in IEC 61508 and IEC 61511 are very important for the safety of offshore oil & natural gas installations. SIS typically include the Emergency Shutdown System (ESD) that ensures that process systems return ... Keywords: Offshore, Process Control, Safety Instrumented Systems, Secure remote access

Martin Gilje Jaatun; Tor Olav Grtan; Maria B. Line

2008-06-01T23:59:59.000Z

107

Enhancing the OS against Security Threats in System Administration  

Science Journals Connector (OSTI)

The consequences of security breaches due to system administrator errors can be catastrophic. Software systems in general, and OSes in particular, ultimately depend on a fully trusted administrator whom is gra...

Nuno Santos; Rodrigo Rodrigues; Bryan Ford

2012-01-01T23:59:59.000Z

108

Enhancing the OS against security threats in system administration  

Science Journals Connector (OSTI)

The consequences of security breaches due to system administrator errors can be catastrophic. Software systems in general, and OSes in particular, ultimately depend on a fully trusted administrator whom is granted superuser privileges that allow him ...

Nuno Santos; Rodrigo Rodrigues; Bryan Ford

2012-12-01T23:59:59.000Z

109

Homeland Security Challenges Facing Small Water Systems in Texas  

E-Print Network [OSTI]

with small water systems to develop volun- tary assessments of the homeland security threats that they face. EPA provides assistance to small systems through education work- shops and seminars, reports and guidelines, and tutorials on CD. In 2005 EPA...

Dozier, Monty; Theodori, Gene L.; Jensen, Ricard

2007-05-31T23:59:59.000Z

110

Design and Fabrication of Security and Home Automation System  

Science Journals Connector (OSTI)

Home automation system was designed and fabricated for controlling of home appliances, gas detection and home security. The fabricated system could detect the ... the house or office and the operation of home app...

Eung Soo Kim; Min Sung Kim

2006-01-01T23:59:59.000Z

111

Report: Modular Safeguards to Create Holistic Security Requirement Specifications for System of Systems  

Science Journals Connector (OSTI)

The specification of security requirements for systems of systems is often an activity that is forced upon non-security experts and performed under time pressure. This paper describes how we have addressed this p...

Albin Zuccato; Nils Daniels; Cheevarat Jampathom

2010-01-01T23:59:59.000Z

112

Secure data storage for mobile data collection systems  

Science Journals Connector (OSTI)

Wireless network infrastructures, notably cellular networks, are becoming a vital element for exchanging electronic data in low income countries. Several key sectors are already leveraging on cellular networks: mobile financial transactions have already ... Keywords: Delphi theory, J2ME, OWASP, RMS, mhealth, mobile data collection systems, mobile security, secure mobile data storage

Samson Gejibo; Federico Mancini; Khalid A. Mughal; Remi A. B. Valvik; Jrn Klungsyr

2012-10-01T23:59:59.000Z

113

Aviation Safety + Security Program GLOBAL EXPERTS IN SAFETY MANAGEMENT SYSTEMS  

E-Print Network [OSTI]

2011- 2012 Aviation Safety + Security Program GLOBAL EXPERTS IN SAFETY MANAGEMENT SYSTEMS of aviation safety. Endings signal new beginnings and new beginnings mean evolving challenges for safety. This was the world in which the USC Aviation Safety and Security Program was born in 1952 and this is the world

Wang, Hai

114

AMIE (ARM MJO Investigation Experiment):  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

7 7 AMIE (ARM MJO Investigation Experiment): Observations of the Madden-Julian Oscillation for Modeling Studies Science Plan ARM Climate Research Facility Tropical Western Pacific Manus Site October 2011-March 2012 C Long Principal Investigator A DelGenio P May W Gustafson S McFarlane R Houze P Minnis C Jakob C Schumacher M Jensen A Vogelmann S Klein Y Wang L Ruby Leung X Wu X Liu S Xie E Luke March 2010 DISCLAIMER This report was prepared as an account of work sponsored by the U.S Government Neither the United States nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed,

115

Interpreting Deep Structures of Information Systems Security  

Science Journals Connector (OSTI)

......network, infrastructure and regulatory) of the organization...adopting stringent regulatory review of the security policies...present ways to deal with regulatory actions such as developing contingency plans (disaster recovery in......

Manoj Thomas; Gurpreet Dhillon

2012-10-01T23:59:59.000Z

116

SP 800-128. Guide for Security-Focused Configuration Management of Information Systems  

Science Journals Connector (OSTI)

The purpose of Special Publication 800-128, Guide for Security-Focused Configuration Management of Information Systems, is to provide guidelines for organizations responsible for managing and administering the security of federal information systems ... Keywords: Configuration management, SecCM, control, information systems, monitoring, risk management framework, security content automation protocol (SCAP), security program, security-focused continuous monitoring

L. Arnold Johnson; Kelley L. Dempsey; Ronald S. Ross; Sarbari Gupta; Dennis Bailey

2011-08-01T23:59:59.000Z

117

Comprehensive test ban treaty international monitoring system security threats and proposed security attributes  

SciTech Connect (OSTI)

To monitor compliance with a Comprehensive Test Ban Treaty (CTBT), a sensing network, referred to as the International Monitoring System (IMS), is being deployed. Success of the IMS depends on both its ability to preform its function and the international community`s confidence in the system. To ensure these goals, steps must be taken to secure the system against attacks that would undermine it; however, it is not clear that consensus exists with respect to the security requirements that should be levied on the IMS design. In addition, CTBT has not clearly articulated what threats it wishes to address. This paper proposes four system-level threats that should drive IMS design considerations, identifies potential threat agents, and collects into one place the security requirements that have been suggested by various elements of the IMS community. For each such requirement, issues associated with the requirement are identified and rationale for the requirement is discussed.

Draelos, T.J.; Craft, R.L.

1996-03-01T23:59:59.000Z

118

Security Assessment of Communication Networks for Integrated Substation Automation Systems  

Science Journals Connector (OSTI)

To assess the security of communication networks for integrated substation automation systems, a systematic approach based on ... to communication networks between the control center and substations through the a...

Huisheng Gao; Xuejiao Dai

2011-01-01T23:59:59.000Z

119

Access Rate Control System | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

by this browser. Download video Captions: On Time: 4:03 min Developed to support safeguards and security, the Access Rate Control System (ARCS) controls the speed of entry...

120

Security Requirements for Classified Automatic Data Processing Systems  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish and describe the computer security program for classified automatic data processing (ADP) systems at the Department of Energy (DOE) Headquarters. This directive does not cancel another directive. Canceled by DOE N 251.9.

1985-07-10T23:59:59.000Z

Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

TO: ALL STUDENTS FROM: Amy S. Kelso  

E-Print Network [OSTI]

MEMORANDUM TO: ALL STUDENTS FROM: Amy S. Kelso Senior Associate General Counsel DATE: October 5" is legal protection for creative intellectual works, which is broadly interpreted to cover any tangible

Howitt, Ivan

122

DNER ANNUEL DES AMIS DE LA PRSIDENTE  

E-Print Network [OSTI]

DE LA SOIR?E #12;4 25e Dîner annuel des amis de la Présidente EMILIO B. IMBRIGLIO CPA, CA, MBA, CFE

123

Roadmap to Secure Control Systems in the Energy Sector  

Broader source: Energy.gov (indexed) [DOE]

Roadmap Roadmap to Secure Control Systems in the Energy Sector -  - Foreword T his document, the Roadmap to Secure Control Systems in the Energy Sector, outlines a coherent plan for improing cyber security in the energy sector. It is the result of an unprecedented collaboration between the energy sector and goernment to identify concrete steps to secure control systems used in the electricity, oil, and natural gas sectors oer the next ten years. The Roadmap proides a strategic framework for guiding industry and goernment efforts based on a clear ision supported by goals and time-based milestones. It addresses the energy sector's most urgent challenges as well as longer-term needs and practices. A distinctie feature of this collaboratie effort is the actie inolement and leadership of energy asset

124

Project Management and Systems Support | National Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Project Management and Systems Support | National Nuclear Security Project Management and Systems Support | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Project Management and Systems Support Home > About Us > Our Operations > Acquisition and Project Management > Project Management and Systems Support Project Management and Systems Support Goal

125

Small Business Sourcing System | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Sourcing System | National Nuclear Security Administration Sourcing System | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Small Business Sourcing System Home > About Us > Our Operations > Acquisition and Project Management > Small Business > Small Business Toolbox > Small Business Sourcing System Small Business Sourcing System

126

Project Management and Systems Support | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Project Management and Systems Support | National Nuclear Security Project Management and Systems Support | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Project Management and Systems Support Home > About Us > Our Operations > Acquisition and Project Management > Project Management and Systems Support Project Management and Systems Support Goal

127

Transmission Pricing of Distributed Multilateral Energy Transactions to Ensure System Security and Guide Economic Dispatch  

E-Print Network [OSTI]

Transmission Pricing of Distributed Multilateral Energy Transactions to Ensure System Security and Guide Economic Dispatch...

Ilic, Marija; Hsieh, Eric; Remanan, Prasad

2004-06-16T23:59:59.000Z

128

GAO Challenges and Efforts to Secure Control Systems (March 2004) |  

Broader source: Energy.gov (indexed) [DOE]

GAO Challenges and Efforts to Secure Control Systems (March 2004) GAO Challenges and Efforts to Secure Control Systems (March 2004) GAO Challenges and Efforts to Secure Control Systems (March 2004) Computerized control systems perform vital functions across many of our nation's critical infrastructures. For example, in natural gas distribution, they can monitor and control the pressure and flow of gas through pipelines. In October 1997, the President's Commission on Critical Infrastructure Protection emphasized the increasing vulnerability of control systems to cyber attacks. The House Committee on Government Reform and its Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census asked GAO to report on potential cyber vulnerabilities, focusing on (1) significant cybersecurity risks associated with control systems (2) potential and reported cyber attacks

129

Surreptitious security violation in the MVS operating system  

Science Journals Connector (OSTI)

Even in the well-protected IBM MVS operating system users can force breaches in the standard protection mechanisms and obtain control over the entire installation regardless of RACF or TOP SECRET protection software. This paper encourages computing center management to appoint security officers to prevent and detect security violations. The need for these officers will be demonstrated as a consequence of the violations shown.

Ronal Paans; Guus Bonnes

1983-01-01T23:59:59.000Z

130

Crops reap benefits of Pantex irrigation system | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Crops reap benefits of Pantex irrigation system | National Nuclear Security Crops reap benefits of Pantex irrigation system | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Crops reap benefits of Pantex irrigation system Home > content > Crops reap benefits of Pantex irrigation system Crops reap benefits of Pantex irrigation system

131

Manual of Security Requirements for the Classified Automated Information System Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides specific instructions and delineates the requirements to ensure the graded security of classified information entrusted to the Department of Energy (DOE) that is processed, stored, transferred, or accessed on Automated Information Systems (AISs) and AIS networks. Canceled by DOE M 471.2-2.

1994-07-15T23:59:59.000Z

132

INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY  

SciTech Connect (OSTI)

Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

133

Pressurized security barrier and alarm system  

DOE Patents [OSTI]

A security barrier for placement across a passageway is made up of interconnected pressurized tubing made up in a grid pattern with openings too small to allow passage. The tubing is connected to a pressure switch, located away from the barrier site, which activates an alarm upon occurrence of a pressure drop. A reinforcing bar is located inside and along the length of the tubing so as to cause the tubing to rupture and set off the alarm upon an intruder`s making an attempt to crimp and seal off a portion of the tubing by application of a hydraulic tool. Radial and rectangular grid patterns are disclosed. 7 figures.

Carver, D.W.

1995-04-11T23:59:59.000Z

134

Computational Systems & Software Environment | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Computational Systems & Software Environment | National Nuclear Security Computational Systems & Software Environment | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog CSSE Computational Systems & Software Environment Home > About Us > Our Programs > Defense Programs > Future Science & Technology Programs > Office of Advanced Simulation and Computing and

135

Investigating alternative concepts of operations for a maritime security system of systems  

E-Print Network [OSTI]

For complex systems of systems, such as those required to perform maritime security, system architects have numerous choices they may select from, both in the components and in the way the system operates. Component choices, ...

Mekdeci, Brian Anthony

136

Zicom Electronic Security Systems Ltd | Open Energy Information  

Open Energy Info (EERE)

Zicom Electronic Security Systems Ltd Zicom Electronic Security Systems Ltd Jump to: navigation, search Name Zicom Electronic Security Systems Ltd. Place Mumbai, Maharashtra, India Zip 400093 Sector Solar, Wind energy Product Mumbai-based electronic security systems integrator. The firm plans to sell its security business and foray into solar and wind power. Coordinates 19.076191°, 72.875877° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":19.076191,"lon":72.875877,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

137

Improving Security in the ATLAS PanDA System  

E-Print Network [OSTI]

The security challenges faced by users of the grid are considerably different to those faced in previous environments. The adoption of pilot jobs systems by LHC experiments has mitigated many of the problems associated with the inhomogeneities found on the grid and has greatly improved job reliability; however, pilot jobs systems themselves must then address many security issues, including the execution of multiple users' code under a common `grid' identity. In this paper we describe the improvements and evolution of the security model in the ATLAS PanDA (Production and Distributed Analysis) system. We describe the security in the PanDA server which is in place to ensure that only authorized members of the VO are allowed to submit work into the system and that jobs are properly audited and monitored. We discuss the security in place between the pilot code itself and the PanDA server, ensuring that only properly authenticated workload is delivered to the pilot for execution. When the code to be executed is fro...

Caballero, J; The ATLAS collaboration; Nilsson, P; Stewart, G; Potekhin, M; Wenaus, T

2011-01-01T23:59:59.000Z

138

Certification and Accreditation Process for Information Systems Including National Security Systems  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Notice ensures the effectiveness of security controls on DOE Federal information systems including national security systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. No cancellations. DOE N 205.15, dated 3-18-05, extends this directive until 3-18-06.

2004-02-19T23:59:59.000Z

139

Control Systems Security News Archive | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

News Archive News Archive Control Systems Security News Archive Control Systems Security News Archive September 2010 - Secretary Chu Announces Latest Efforts to Address Cybersecurity August 2010: - DOE 2010 Cybersecurity Peer Review Update March 2010 - DOE and Industry Showcase New Control Systems Security Technologies at DistribuTECH Feb. 2010 - DOE Issues National Energy Sector Cyber Organization Notice of Intent Nov. 2009 - New TCIPG Research Program Builds on Past Successes with Nearly $18.8 Million DOE Award October 2009 - DOE NSTB researchers demonstrated R&D successes to asset owners at EnergySec Conference September 2009 - ISA approves standard for wireless automation in process control applications Sept. 2009 - Government and Industry a Force for Collaboration at the

140

AMIS (Smart Grid Project) | Open Energy Information  

Open Energy Info (EERE)

AMIS (Smart Grid Project) AMIS (Smart Grid Project) Jump to: navigation, search Project Name AMIS Country Austria Headquarters Location Steyr, Austria Coordinates 48.050091°, 14.41827° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":48.050091,"lon":14.41827,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Roadmap to Secure Control Systems in the Energy: Executive Summary  

Broader source: Energy.gov (indexed) [DOE]

Foreword Foreword T his document, the Roadmap to Secure Control Systems in the Energy Sector, outlines a coherent plan for improving cyber security in the energy sector. It is the result of an unprecedented collaboration between the energy sector and government to identify concrete steps to secure control systems used in the electricity, oil, and natural gas sectors over the next ten years. The Roadmap provides a strategic framework for guiding industry and government efforts based on a clear vision supported by goals and time-based milestones. It addresses the energy sector's most urgent challenges as well as longer-term needs and practices. A distinctive feature of this collaborative effort is the active involvement and leadership of energy asset owners and operators in developing the Roadmap content and priorities. The Roadmap synthesizes

142

MODELING SECURITY IN CYBER-PHYSICAL SYSTEMS  

E-Print Network [OSTI]

novel aspects of networked systems that include integrating dis- tributed computing systems with monitoring and controlling entities in the physical environment. For example, in real-time control systems stations. Other examples include smart grid systems and supervisory control and data acquisition (SCADA

Burmester, Mike

143

The Vital Core Connectivity Problem Sylvia Boyd and Amy Cameron  

E-Print Network [OSTI]

The Vital Core Connectivity Problem Sylvia Boyd and Amy Cameron School of Information Technology. Sylvia Boyd: sylvia@site.uottawa.ca, Amy Cameron: acame097@uottawa.ca Published in: A. Cameron

Boyd, Sylvia

144

Study on Threats to Security of Space TT&C Systems  

Science Journals Connector (OSTI)

A space Tracking, Telemetry and Command (TT&C) system is a spaceflight support system and its security is of great significance. A framework of space TT&C system security threat assessment is proposed and it comp...

Qi Wang; Bo Wang; Bin Wu

2013-01-01T23:59:59.000Z

145

NERSC Increases System Storage and Security for Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Increases Increases System Storage and Security for Users NERSC Increases System Storage and Security for Users April 28, 2009 Franklin Upgrades Improve I/O Performance Throughout the month of March the Cray XT4 machine Franklin underwent a series of upgrades and improvements, including a major I/O upgrade. The disk capacity of the scratch file system was increased by 30% to 460 TB, and the I/O bandwidth was nearly tripled to an aggregate write performance of 32 GB/sec, compared to 11 GB/s before the upgrade. Instead of adding the new hardware to the existing scratch file system, NERSC chose to implement a second scratch file system so that Franklin now has two scratch file systems, each with a peak write bandwidth of 16 GB/sec. "We doubled the amount of I/O hardware and nearly tripled the bandwidth,

146

Critical issues in process control system security : DHS spares project.  

SciTech Connect (OSTI)

The goals of this event are: (1) Discuss the next-generation issues and emerging risks in cyber security for control systems; (2) Review and discuss common control system architectures; (3) Discuss the role of policy, standards, and supply chain issues; (4) Interact to determine the most pertinent risks and most critical areas of the architecture; and (5) Merge feedback from Control System Managers, Engineers, IT, and Auditors.

Hernandez, Jacquelynne; McIntyre, Annie; Henrie, Morgan

2010-10-01T23:59:59.000Z

147

On Cyber Security for Networked Control Systems  

E-Print Network [OSTI]

infrastructure systems in the analysis of safety and stability - a significant contribution to the theory of hybrid

Amin, Saurabh

2011-01-01T23:59:59.000Z

148

AMIS Training Material 1 Institutional Research and Planning October 2012  

E-Print Network [OSTI]

AMIS Training Material 1 Institutional Research and Planning October 2012 University of Nebraska Panel" #12;AMIS Training Material 2 Institutional Research and Planning October 2012 University of Nebraska-Lincoln Page 2 of 9 Change View by: "Category" to "Small Icons" #12;AMIS Training Material 3

Farritor, Shane

149

Securely Sealing Multi-FPGA Systems Tim Guneysu1  

E-Print Network [OSTI]

G¨ortz Institute for IT-Security, Ruhr-University Bochum, Germany 2 University of Michigan, 2260-growing supply chains that disentangle chip designers and manufacturers from OEMs. Our work shows how automatically enforces the system configuration detected upon power-up and bans further mod- ifications. 1

Markov, Igor

150

The Freight Shuttle System: Automated-Secure Trade  

E-Print Network [OSTI]

the same volume) #12;HDD Truck vs. FSS (CO2 required to service the same volume) #12;Next Steps · Finalize footprint guide way ­ To be built within existing highway ROW The Freight Shuttle System 24/7 operations transportation #12;#12;#12;#12;Port of Entry Security #12;Ciudad Juarez El Paso Scan-in-motion Scan

151

Auction Market System in Electronic Security Trading Platform  

E-Print Network [OSTI]

in electronic trading platforms, although they implement the same fundamental principle of maximum tradingAuction Market System in Electronic Security Trading Platform Li Xihao Bielefeld Graduate School of Economics and Management Discussion Paper: May 11, 2010 Abstract Under the background of the electronic

Tesfatsion, Leigh

152

SRS upgrades helium recovery system | National Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

upgrades helium recovery system | National Nuclear Security upgrades helium recovery system | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > SRS upgrades helium recovery system SRS upgrades helium recovery system Posted By Office of Public Affairs Savannah River Site (SRS) Tritium Programs recently completed a project to design, build and relocate a new system for separating and capturing

153

Ensuring system security through formal software evaluation  

SciTech Connect (OSTI)

With the increasing use of computer systems and networks to process safeguards information in nuclear facilities, the issue of system and data integrity is receiving worldwide attention. Among the many considerations are validation that the software performs as intended and that the information is adequately protected. Such validations are often requested of the Safeguards Systems Group of the Los Alamos National Laboratory. This paper describes our methodology for performing these software evaluations.

Howell, J A; Fuyat, C [Los Alamos National Lab., NM (United States)] [Los Alamos National Lab., NM (United States); Elvy, M [Marble Associates, Boston, MA (United States)] [Marble Associates, Boston, MA (United States)

1992-01-01T23:59:59.000Z

154

DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY  

SciTech Connect (OSTI)

Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

155

T3: Secure, Scalable, Distributed Data Movement and Remote System Control for Enterprise Level Cyber Security  

SciTech Connect (OSTI)

Enterprise level cyber security requires the deployment, operation, and monitoring of many sensors across geographically dispersed sites. Communicating with the sensors to gather data and control behavior is a challenging task when the number of sensors is rapidly growing. This paper describes the system requirements, design, and implementation of T3, the third generation of our transport software that performs this task. T3 relies on open source software and open Internet standards. Data is encoded in MIME format messages and transported via NNTP, which provides scalability. OpenSSL and public key cryptography are used to secure the data. Robustness and ease of development are increased by defining an internal cryptographic API, implemented by modules in C, Perl, and Python. We are currently using T3 in a production environment. It is freely available to download and use for other projects.

Thomas, Gregory S.; Nickless, William K.; Thiede, David R.; Gorton, Ian; Pitre, Bill J.; Christy, Jason E.; Faultersack, Elizabeth M.; Mauth, Jeffery A.

2009-07-20T23:59:59.000Z

156

Asbestos : operating system security for mobile devices  

E-Print Network [OSTI]

This thesis presents the design and implementation of a port of the Asbestos operating system to the ARM processor. The port to the ARM allows Asbestos to run on mobile devices such as cell phones and personal digital ...

Stevenson, Martijn

2006-01-01T23:59:59.000Z

157

CS2SAT: THE CONTROL SYSTEMS CYBER SECURITY SELF-ASSESSMENT TOOL  

SciTech Connect (OSTI)

The Department of Homeland Security National Cyber Security Division has developed the Control System Cyber Security Self-Assessment Tool (CS2SAT) that provides users with a systematic and repeatable approach for assessing the cyber-security posture of their industrial control system networks. The CS2SAT was developed by cyber security experts from Department of Energy National Laboratories and with assistance from the National Institute of Standards and Technology. The CS2SAT is a desktop software tool that guides users through a step-by-step process to collect facility-specific control system information and then makes appropriate recommendations for improving the systems cyber-security posture. The CS2SAT provides recommendations from a database of industry available cyber-security practices, which have been adapted specifically for application to industry control system networks and components. Each recommendation is linked to a set of actions that can be applied to remediate-specific security vulnerabilities.

Kathleen A. Lee

2008-01-01T23:59:59.000Z

158

AMI (Smart Grid Project) | Open Energy Information  

Open Energy Info (EERE)

Project Name AMI Project Name AMI Country Slovenia Headquarters Location Kranj, Slovenia Coordinates 46.239208°, 14.355654° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":46.239208,"lon":14.355654,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

159

Control Systems Cyber Security:Defense in Depth Strategies  

SciTech Connect (OSTI)

Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing defense-in-depth strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: Maintenance of various field devices, telemetry collection, and/or industrial-level process systems Access to facilities via remote data link or modem Public facing services for customer or corporate operations A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

David Kuipers; Mark Fabro

2006-05-01T23:59:59.000Z

160

Using Virtual Organizations Membership System with EDG's Grid Security and Database Access  

E-Print Network [OSTI]

Using Virtual Organizations Membership System with EDG's Grid Security and Database Access Marko University of Technology March 17, 2004 Keywords: Grid security, virtual organizations, Grid use case. This paper describes the European Data Grid's (EDG's) java security system and Spitfire database access

Haak, Hein

Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

A Key Management Scheme for Secure Communications of Advanced Metering Infrastructure  

Science Journals Connector (OSTI)

Key management for secure communications of Advanced Metering Infrastructure is an unsolved problem until now. The ... proposing a key management scheme based on a hybrid-tree graph for AMI. The cyber security...

Jinshan Chen; Nian Liu; Wenxia Liu; Hong Luo

2011-01-01T23:59:59.000Z

162

Technical and Human Issues in Computer-Based Systems Security Budi Arief and Denis Besnard  

E-Print Network [OSTI]

of hacking methods in technical terms; Section 3 outlines different players involved in computer security to make computer systems more secure. 2. TECHNICAL SIDE OF HACKING Hacking is usually a technical activity

Newcastle upon Tyne, University of

163

Enhancing the Hierarchical Clustering Mechanism of Storing Resources Security Policies in a Grid Authorization System  

Science Journals Connector (OSTI)

Many existing grid authorization systems adopt an inefficient structure of storing security policies for the available resources, which reduces ... scalability and leads to huge repetitions in checking security r...

Mustafa Kaiiali; Rajeev Wankar; C. R. Rao

2010-01-01T23:59:59.000Z

164

National SCADA Test Bed- Enhancing control systems security in the energy sector (September 2009)  

Broader source: Energy.gov [DOE]

Improving the security of energy control systems has become a national priority. Since the mid-1990s, security experts have become increasingly concerned about the threat of malicious cyber...

165

Roadmap to Secure Control Systems in the Energy Sector- January 2006  

Broader source: Energy.gov [DOE]

This document, the Roadmap to Secure Control Systems in the Energy Sector, outlines a coherent plan for improving cyber security in the energy sector. It is the result of an unprecedented...

166

Multi-objective Optimization for Pricing System Security in Electricity Markets  

E-Print Network [OSTI]

or hybrid markets, how to properly include system security is still an open question. This paper mainly focuses on hybrid markets and on the inclusion of proper security constraints through the use of a multi

Cañizares, Claudio A.

167

Control Systems Security Publications Library | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Publications Library Publications Library Control Systems Security Publications Library Publications Library Repository of documents, listed by topic. (Some of the documents in this section require Adobe Acrobat Reader. You can download a free copy of the Reader by visiting Adobe.) VULNERABILITY REPORTS PERIODICAL ARTICLES ENERGY SECTOR ROADMAP AND ROADMAP IMPLEMENTATION DOE NSTB PROGRAM PLANNING AND RESOURCE DOCUMENTS PROJECT FACT SHEETS TRAINING MATERIALS AND RECOMMENDED PRACTICES ASSESSMENT AND TECHNICAL PUBLICATIONS SANDIA NATIONAL LABORATORIES REPORTS FOR NSTB PACIFIC NORTHWEST NATIONAL LABORATORY REPORTS FOR NSTB IDAHO NATIONAL LABORATORY REPORTS FOR NSTB FEDERAL GUIDANCE AND POLICY DOCUMENTS VULNERABILITY REPORTS INL Common Vulnerabilities Report - 2008 NERC Top 10 Vulnerabilities of Control Systems and Their Associated

168

AmiGO: online access to ontology and annotation data  

SciTech Connect (OSTI)

AmiGO is a web application that allows users to query, browse, and visualize ontologies and related gene product annotation (association) data. AmiGO can be used online at the Gene Ontology (GO) website to access the data provided by the GO Consortium; it can also be downloaded and installed to browse local ontologies and annotations. AmiGO is free open source software developed and maintained by the GO Consortium.

Carbon, Seth; Ireland, Amelia; Mungall, Christopher J.; Shu, ShengQiang; Marshall, Brad; Lewis, Suzanna

2009-01-15T23:59:59.000Z

169

Initial CTBT international monitoring system security findings and recommendations  

SciTech Connect (OSTI)

An initial security evaluation of the proposed International Monitoring System (IMS) suggests safeguards at various points in the IMS to provide reliable information to the user community. Modeling the IMS as a network of information processing nodes provides a suitable architecture for assessing data surety needs of the system. The recommendations in this paper include the use of public-key authentication for data from monitoring stations and for commands issued to monitoring stations. Other monitoring station safeguards include tamper protection of sensor subsystems, preservation of data (i.e. short-term archival), and limiting the station`s network services. The recommendations for NDCs focus on the need to provide a backup to the IDC for data archival and data routing. Safeguards suggested for the IDC center on issues of reliability. The production of event bulletins should employ {open_quotes}two-man{close_quotes} procedures. As long as the data maintains its integrity, event bulletins can be produced by NDCs as well. The effective use of data authentication requires a sound key management system. Key management systems must be developed for the authentication of data, commands, and event bulletins if necessary. It is recommended that the trust placed in key management be distributed among multiple parties. The recommendations found in this paper offer safeguards for identified vulnerabilities in the IMS with regard to data surety. However, several outstanding security issues still exist. These issues include the need to formalize and obtain a consensus on a threat model and a trust model for the IMS. The final outstanding security issue that requires in-depth analysis concerns the IDC as a potential single point of failure in the current IMS design.

Craft, R.L.; Draelos, T.J.

1996-08-01T23:59:59.000Z

170

Security Certification & Accreditation of Federal Information Systems A Tutorial  

E-Print Network [OSTI]

& Accreditation ? Certification Accreditation Information + Evidence Risk Thresholds 1. Security Plan 2. C Output of C&A Process Security Plan Risk Assessments Contingency Plans Incident Response Plans Security Does the potential risk to the agency operations, assets or individuals described in the Security Plan

Madisetti, Vijay K.

171

Implementing data security in student lifecycle management system at the university of Prishtina  

Science Journals Connector (OSTI)

In this paper is presented a novel approach for fulfilling the data security criteria in a Student Lifecycle Management System at the University of Prishtina. The four main criteria of data security such as: privacy, authentication, integrity and non-repudiation ... Keywords: X.509 certificate, authentication, digital signature, non-repudiation, privacy, security, smart cards, student lifecycle management

Blerim Rexha; Haxhi Lajqi; Myzafere Limani

2010-07-01T23:59:59.000Z

172

Study on security based on PKI for e-commerce of statistics information system  

Science Journals Connector (OSTI)

In this paper, issues about the trend of statistics information merchandizing, and the present situation of statistics information network and statistics information system security, are analyzed. Security construction scheme is put forward, which is ... Keywords: PKI, e-commerce, security, statistics information

Min Liu; Shudong Sun; Miaotiao Xing

2005-08-01T23:59:59.000Z

173

National SCADA Test Bed Enhancing control systems security in the energy  

Broader source: Energy.gov (indexed) [DOE]

SCADA Test Bed Enhancing control systems security in the SCADA Test Bed Enhancing control systems security in the energy sector National SCADA Test Bed Enhancing control systems security in the energy sector Improving the security of energy control systems has become a national priority. Since the mid-1990's, security experts have become increasingly concerned about the threat of malicious cyber attacks on the vital supervisory control and data acquisition (SCADA) and distributed control systems (DCS) used to monitor and manage our energy infrastructure. Many of the systems still in use today were designed to operate in closed, proprietary networks. National SCADA Test Bed Enhancing control systems security in the energy sector More Documents & Publications NSTB Summarizes Vulnerable Areas Transmission and Distribution World March 2007: DOE Focuses on Cyber

174

A Summary of Control System Security Standards Activities in the Energy  

Broader source: Energy.gov (indexed) [DOE]

A Summary of Control System Security Standards Activities in the A Summary of Control System Security Standards Activities in the Energy Sector (October 2005) A Summary of Control System Security Standards Activities in the Energy Sector (October 2005) This document is a compilation of the activities and initiatives concerning control system security that are influencing the standards process in the development of secure communication protocols and systems. Also contained in this report is a comparison of several of the sector standards, guidelines, and technical reports, demonstrating standards coverage by security topic. This work focuses on control systems standards applicable to the energy (oil, gas, and electric, but not nuclear) sector. Summary of CS Standards Activities in the Energy Sector.pdf More Documents & Publications

175

Cost/benefit analysis for video security systems  

SciTech Connect (OSTI)

Dr. Don Hush and Scott Chapman, in conjunction with the Electrical and Computer Engineering Department of the University of New Mexico (UNM), have been contracted by Los Alamos National Laboratories to perform research in the area of high security video analysis. The first phase of this research, presented in this report, is a cost/benefit analysis of various approaches to the problem in question. This discussion begins with a description of three architectures that have been used as solutions to the problem of high security surveillance. An overview of the relative merits and weaknesses of each of the proposed systems is included. These descriptions are followed directly by a discussion of the criteria chosen in evaluating the systems and the techniques used to perform the comparisons. The results are then given in graphical and tabular form, and their implications discussed. The project to this point has involved assessing hardware and software issues in image acquisition, processing and change detection. Future work is to leave these questions behind to consider the issues of change analysis - particularly the detection of human motion - and alarm decision criteria. The criteria for analysis in this report include: cost; speed; tradeoff issues in moving primative operations from software to hardware; real time operation considerations; change image resolution; and computational requirements.

NONE

1997-01-01T23:59:59.000Z

176

AMIS-Training Material iReport Training Part 2  

E-Print Network [OSTI]

AMIS- Training Material iReport Training ­Part 2 (iReport-3.0.0) Topic: Parameters · Open a report- Training Material · Open the `Document structure' Page 2 of 7 6/27/2008 Institutional Research and Planning University of Nebraska-Lincoln #12;AMIS- Training Material · Right click on `Parameters' > Add > Parameter

Farritor, Shane

177

Modeling and simulation for cyber-physical system security research, development and applications.  

SciTech Connect (OSTI)

This paper describes a new hybrid modeling and simulation architecture developed at Sandia for understanding and developing protections against and mitigations for cyber threats upon control systems. It first outlines the challenges to PCS security that can be addressed using these technologies. The paper then describes Virtual Control System Environments (VCSE) that use this approach and briefly discusses security research that Sandia has performed using VCSE. It closes with recommendations to the control systems security community for applying this valuable technology.

Pollock, Guylaine M.; Atkins, William Dee; Schwartz, Moses Daniel; Chavez, Adrian R.; Urrea, Jorge Mario; Pattengale, Nicholas; McDonald, Michael James; Cassidy, Regis H.; Halbgewachs, Ronald D.; Richardson, Bryan T.; Mulder, John C.

2010-02-01T23:59:59.000Z

178

Using Operational Security (OPSEC) to Support a Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

179

Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs for Phase 2 of the Secure Power Systems Professional project  

Broader source: Energy.gov (indexed) [DOE]

53 53 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs for Phase 2 of the Secure Power Systems Professional project LR O'Neil TJ Vanderhorst, Jr MJ Assante J Januszewski, III DH Tobey R Leo TJ Conway K Perman August 2013 PNNL- 22653 Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs for Phase 2 of the Secure Power Systems Professional project LR O'Neil TJ Vanderhorst, Jr MJ Assante J Januszewski, III DH Tobey R Leo TJ Conway K Perman Contributors: SGC Panel Members August 2013 Prepared by: Pacific Northwest National Laboratory and

180

Activities to Secure Control Systems in the Energy Sector  

Broader source: Energy.gov (indexed) [DOE]

sector sector NSTB November 2008 Hank Kenchington - Program Manager Office of Electricity of Delivery and Energy Reliability U.S. Department of Energy Activities to Secure Control Systems in the Energy Sector * 2,000,000 Miles of Oil Pipelines * 1,300,000 Miles of Gas Pipelines * 2,000 Petroleum Terminals * ~1,000,000 Wells * Extensive Ports, Refineries, Transportation, and LNG Facilities * 160,000 Miles of Electrical Transmission lines * ~17,000 Generators; 985,000 Megawatts (net summer capacity) * Over 3,100 Electric Utilities, with 131 million customers Refinery Locations, Crude and Product Pipelines Source: Energy Information Administration, Office of Oil & Gas LNG Import Facilities (Reactivation underway) Legend Interstate Pipelines Intrastate and Other Pipelines

Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Selective Versioning in a Secure Disk System Appears in the Proceedings of the 17th USENIX Security Symposium  

E-Print Network [OSTI]

Symposium Swaminathan Sundararaman Stony Brook University Gopalan Sivathanu Stony Brook University Erez are minimal. 1 Introduction Protecting disk data against malicious damage is one of the key requirements in computer systems security. Stored data is one the most valuable assets for most or- ganizations and damage

Zadok, Erez

182

Selective Versioning in a Secure Disk System Appears in the Proceedings of the 17th USENIX Security Symposium  

E-Print Network [OSTI]

Symposium Swaminathan Sundararaman Stony Brook University Gopalan Sivathanu Stony Brook University Erez are minimal. 1 Introduction Protecting disk data against malicious damage is one of the key requirements in computer systems security. Stored data is one the most valuable assets for most or­ ganizations and damage

Zadok, Erez

183

Securing Offshore Infrastructures Through a Global Alert and Graded Response System  

E-Print Network [OSTI]

1 « SARGOS » Securing Offshore Infrastructures Through a Global Alert and Graded Response System and graded response system to answer the recent but strong need for securing critical civilian offshore of their 2009 global safety program (CSOSG). 1. Introduction Offshore oil installations are critical energy

Paris-Sud XI, Université de

184

Security | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Security Security Security Security program under Office of Health, Safety and Security developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented. Headquarters Facilities Master Security Plan The purpose of the Headquarters Facility Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures

185

SRS upgrades helium recovery system | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

detectors employed by the United States Department of Homeland Security to detect neutron activity from nuclear material. Savannah River Nuclear Solutions, LLC, the management...

186

Securing linked transportation systems: economic implications and investment strategies  

E-Print Network [OSTI]

implications and investment strategies Adib Kanafani &research explores agency investment behavior in multi-agencysystems develops guidelines for investments in security. The

Kanafani, Adib; Huang, Jiangchuan

2010-01-01T23:59:59.000Z

187

2014 User Training Meeting Presentations | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

within the United States Irene Wu - NRC Update- National Source Tracking System Amy Johnson - Lessons Learned associated with Obtaining License for a New Enrichment Plant Gary...

188

Roadmap to Secure Control Systems in the Energy: Executive Summary - 2006 |  

Broader source: Energy.gov (indexed) [DOE]

Energy: Executive Summary Energy: Executive Summary - 2006 Roadmap to Secure Control Systems in the Energy: Executive Summary - 2006 This document, the Roadmap to Secure Control Systems in the Energy Sector, outlines a coherent plan for improving cyber security in the energy sector. It is the result of an unprecedented collaboration between the energy sector and government to identify concrete steps to secure control systems used in the electricity, oil, and natural gas sectors over the next ten years. The Roadmap provides a strategic framework for guiding industry and government efforts based on a clear vision supported by goals and time-based milestones. It addresses the energy sector's most urgent challenges as well as longer-term needs and practices. Roadmap to Secure Control Systems in the Energy: Executive Summary

189

Roadmap to Secure Control Systems in the Energy Sector - 2006 | Department  

Broader source: Energy.gov (indexed) [DOE]

- 2006 - 2006 Roadmap to Secure Control Systems in the Energy Sector - 2006 This document, the Roadmap to Secure Control Systems in the Energy Sector, outlines a coherent plan for improving cyber security in the energy sector. It is the result of an unprecedented collaboration between the energy sector and government to identify concrete steps to secure control systems used in the electricity, oil, and natural gas sectors over the next ten years. The Roadmap provides a strategic framework for guiding industry and government efforts based on a clear vision supported by goals and time-based milestones. It addresses the energy sector's most urgent challenges as well as longer-term needs and practices. Roadmap to Secure Control Systems in the Energy Sector More Documents & Publications

190

Special feature: Creating security applications based on The Global Certificate Management System  

Science Journals Connector (OSTI)

The Certificate Management System (CMS) is a global network system whose primary services are generation, distribution, storage and verification of certificates. It supports various security applications which use public key cryptography by providing ...

Nada Kapidzic

1998-01-01T23:59:59.000Z

191

1398 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 20, NO. 3, AUGUST 2005 Model Uncertainty in Security  

E-Print Network [OSTI]

1398 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 20, NO. 3, AUGUST 2005 Model Uncertainty in Security in a power market. The paper addresses two types of uncertainties: 1) struc- tural (e.g., branch outages minimal corrections in existing contractual transactions that ensure security. Given our interest in real

Stankoviæ, Aleksandar

192

Security and Privacy in Smart Grid Demand Response Systems  

Science Journals Connector (OSTI)

Various research efforts have focussed on the security and privacy concerns arising from the introduction of smart energy meters. However, in addition to smart metering, the ultimate vision of the smart grid incl...

Andrew Paverd; Andrew Martin; Ian Brown

2014-01-01T23:59:59.000Z

193

An Analysis of Security Services in Grid Storage Systems  

Science Journals Connector (OSTI)

With the wide-spread deployment of Data Grids, storage services are becoming a critical aspect of the Grid infrastructure. Due to the sensitive and critical nature of the data being stored, security issues relate...

Jesus Luna; Michail D. Flouris; Manolis Marazakis

2008-01-01T23:59:59.000Z

194

Cyber Security Requirements for Wireless Devices and Information Systems  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Notice establishes DOE policy requirements and responsibilities for using wireless networks and devices within DOE and implements the requirements of DOE 0 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, including requirements for cyber resource protection, risk management, program evaluation, and cyber security plan development and maintenance. No cancellation. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

2004-02-11T23:59:59.000Z

195

Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems  

Broader source: Energy.gov (indexed) [DOE]

U.S. Department of Energy U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Enhancing control systems security in the energy sector NSTB September 2006 LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS Raymond K. Fink David F. Spencer Rita A. Wells NSTB INL/CON-06-11665 iii ABSTRACT Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems, or components of those systems, were reviewed to identify common problem areas. The common vulnerabilities identified ranged from conventional IT security issues to specific weaknesses in control system protocols. In each vulnerability category, relative measures were assigned to the severity of the vulnerability and

196

Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs-Summary Report  

Broader source: Energy.gov (indexed) [DOE]

41 41 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs-Summary Report LR O'Neil TJ Vanderhorst, Jr MJ Assante J Januszewski, III DH Tobey R Leo TJ Conway K Perman July 2013 PNNL- 22641 Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs-Summary Report LR O'Neil TJ Vanderhorst, Jr MJ Assante J Januszewski, III DH Tobey R Leo TJ Conway K Perman Contributors: SGC Panel Members July, 2013 Prepared by: Pacific Northwest National Laboratory and NBISE Secure Power Systems Professional Project Team This document is a summarization of the report, Developing Secure Power Systems

197

An Information Systems Security Risk Assessment Model Under Dempster- Schafer Theory of Belief Functions  

E-Print Network [OSTI]

This study develops an alternative methodology for the risk analysis of information systems security (ISS), an evidential reasoning approach under the Dempster-Shafer theory of belief functions. The approach has the ...

Sun, Lili; Srivastava, Rajendra P.; Mock, Theodore J.

2006-01-01T23:59:59.000Z

198

Transmission pricing of distributed multilateral energy transactions to ensure system security and guide economic dispatch  

E-Print Network [OSTI]

In this paper we provide a simulations-based demonstration of a hybrid electricity market that combines the distributed competitive advantages of decentralized markets with the system security guarantees of centralized ...

Ilic, Marija D.

2002-01-01T23:59:59.000Z

199

A Security-enabled Grid System for MINDS Distributed Data Mining  

Science Journals Connector (OSTI)

Interest has been increasing in mining information from a huge amount of data for various purposes such as business processes, scientific discoveries, and security. MINDS (Minnesota INtrusion Detection System) is...

Seonho Kim; Jinoh Kim; Jon B. Weissman

2014-09-01T23:59:59.000Z

200

Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development ProgramsSummary Report  

SciTech Connect (OSTI)

This document is a summarization of the report, Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs, the final report for phase 2 of the SPSP (DOE workforce study) project.

O'Neil, Lori Ross; Assante, Michael; Tobey, D. H.; Conway, T. J.; Vanderhorst, Jr, T. J.; Januszewski, III, J.; Leo, R.; Perman, K.

2013-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

SP 800-37 Rev. 1. Guide for Applying the Risk Management Framework to Federal Information Systems: a Security Life Cycle Approach  

Science Journals Connector (OSTI)

The purpose of SP 800-37 Rev 1 is to provide guidelines for applying the Risk Management Framework to federal information systems to include conducting the activities of security categorization, security control selection and implementation, security ... Keywords: FISMA, Risk management framework, categorize, common controls, continuous monitoring, information systems, roles and responsibilities, security authorization, security controls

Joint Task Force Transformation Initiative

2010-02-01T23:59:59.000Z

202

Risk assessment of climate systems for national security.  

SciTech Connect (OSTI)

Climate change, through drought, flooding, storms, heat waves, and melting Arctic ice, affects the production and flow of resource within and among geographical regions. The interactions among governments, populations, and sectors of the economy require integrated assessment based on risk, through uncertainty quantification (UQ). This project evaluated the capabilities with Sandia National Laboratories to perform such integrated analyses, as they relate to (inter)national security. The combining of the UQ results from climate models with hydrological and economic/infrastructure impact modeling appears to offer the best capability for national security risk assessments.

Backus, George A.; Boslough, Mark Bruce Elrick; Brown, Theresa Jean; Cai, Ximing [University of Illinois-Urbana; Conrad, Stephen Hamilton; Constantine, Paul [Stanford University; Dalbey, Keith R.; Debusschere, Bert J.; Fields, Richard; Hart, David Blaine; Kalinina, Elena Arkadievna; Kerstein, Alan R.; Levy, Michael [National Center for Atmospheric Research; Lowry, Thomas Stephen; Malczynski, Leonard A.; Najm, Habib N.; Overfelt, James Robert; Parks, Mancel Jordan; Peplinski, William J.; Safta, Cosmin; Sargsyan, Khachik; Stubblefield, William Anthony; Taylor, Mark A.; Tidwell, Vincent Carroll; Trucano, Timothy Guy; Villa, Daniel L.

2012-10-01T23:59:59.000Z

203

Towards Simple and Scalable Analysis of Secure Systems Jason Franklin, Deepak Garg, Dilsun Kaynar, Anupam Datta  

E-Print Network [OSTI]

Towards Simple and Scalable Analysis of Secure Systems Jason Franklin, Deepak Garg, Dilsun Kaynar in system modeling and analysis. Despite substantial progress, the goal of proving deep properties of system abstraction: modeling and analysis of system designs at a high­level where in­depth analysis can identify

Garlan, David

204

Management of Control System Information SecurityI: Control System Patch Management  

SciTech Connect (OSTI)

The use of information technologies in control systems poses additional potential threats due to the frequent disclosure of software vulnerabilities. The management of information security involves a series of policy-making on the vulnerability discovery, disclosure, patch development and patching. In this paper, we use a system approach to devise a model to understand the interdependencies of these decision processes. In more details, we establish a theoretical framework for making patching decision for control systems, taking into account the requirement of functionability of control systems. We illustrate our results with numerical simulations and show that the optimal operation period of control systems given the currently estimated attack rate is roughly around a half a month.

Quanyan Zhu; Miles McQueen; Craig Rieger; Tamer Basar

2011-09-01T23:59:59.000Z

205

Towards Simple and Scalable Analysis of Secure Systems Jason Franklin, Deepak Garg, Dilsun Kaynar, Anupam Datta  

E-Print Network [OSTI]

Towards Simple and Scalable Analysis of Secure Systems Jason Franklin, Deepak Garg, Dilsun Kaynar and analysis. Despite substantial progress, the goal of proving deep properties of system implementations: modeling and analysis of system designs at a high-level where in-depth analysis can identify flawed de

Garlan, David

206

The potential of intelligent vehicle highway systems for enhanced traveler security  

SciTech Connect (OSTI)

The Intelligent Vehicle Highway System (IVHS) program that was mandated by the Intermodal Surface Transportation Efficiency Act of 1991 (ISTEA) presents a number of opportunities and challenges. While the program primarily is intended to address the problem of traffic congestion, the technologies it will require could also be used to enhance the safety and security of the traveling public. Public transit systems offer the most likely near-term opportunities both for IVHS-type technologies, and for new security measures to be applied. This paper will address some of the possible security functions that could be applied to transit systems by utilizing the availability of Automatic Vehicle Location systems (AVL), broadband digital communication systems, and other IVHS functions.

Caskey, D.L.

1992-12-31T23:59:59.000Z

207

Concepts and applications of wireless security systems for tactical, portable, and fixed sites  

SciTech Connect (OSTI)

Intrusion detection systems sometimes use radio signals to convey sensor status in areas that wire conduits do not service or as a redundant path to wired systems. Some applications benefit from radio technology by minimizing setup time and reducing installation and operation costs. In recent years with the explosion in wireless communications, these radio-based security systems have become more capable while lowering costs, size, and power consumption. However, the very nature of radio communication raises issues regarding setup, operation, and security of these systems. Sandia National Laboratories, in cooperation with government and industry, has addressed many of these issues through the analysis and development of security systems, communications protocols, and operational procedures. Message encryption and frequent channel supervision are used to enhance security. Installation and maintenance of these systems are simplified by incorporating built-in radio link analysis, menu-driven configuration equipment, and other techniques. Commercial communications satellites and spread-spectrum radios are also being integrated to provide unique capabilities to the security community. The status of this work is presented here along with details of its development.

Harrington, J.J.

1997-06-01T23:59:59.000Z

208

Information Retrieval and Web Search Amy N. Langville  

E-Print Network [OSTI]

Information Retrieval and Web Search Amy N. Langville Carl D. Meyer January, 2006 Information and Web collections. Traditional information retrieval is search within small, controlled, nonlinked collections (e.g., a collection of medical or legal documents), whereas Web information retrieval is search

Kunkle, Tom

209

TO: ALL UNIVERSITY FACULTY AND STAFF FROM: Amy S. Kelso,  

E-Print Network [OSTI]

MEMORANDUM TO: ALL UNIVERSITY FACULTY AND STAFF FROM: Amy S. Kelso, Senior Associate General Counsel DATE: October 5, 2012 SUBJECT: Copyright Infringement Reminder Digital file sharing technology has works, which is broadly interpreted to cover any tangible expression of an idea. Text (including email

Howitt, Ivan

210

First steps toward scientific cyber-security experimentation in wide-area cyber-physical systems  

Science Journals Connector (OSTI)

This extended abstract reports on steps towards an environment for repeatable and scalable experiments on wide-area cyber-physical systems. The cyber-physical systems that underlie the world's critical infrastructure are increasingly vulnerable to attack ... Keywords: cyber-physical, cyber-security, experimental research, overlay network, smart grid, testbed

Ryan Goodfellow; Robert Braden; Terry Benzel; David E. Bakken

2013-01-01T23:59:59.000Z

211

Security threats on EPC based RFID systems J. G. Alfaro ,, M. Barbeau, and E. Kranakis  

E-Print Network [OSTI]

Security threats on EPC based RFID systems J. G. Alfaro ,, M. Barbeau, and E. Kranakis Abstract: We present an evaluation of threats on the Radio Frequency IDentification (RFID) system of the Electronic components due to the use of an insecure wireless channel. We analyze the threats according

Garcia-Alfaro, Joaquin

212

UPDATE/PATCH MANAGEMENT SYSTEMS: a protocol taxonomy with security implications  

E-Print Network [OSTI]

UPDATE/PATCH MANAGEMENT SYSTEMS: a protocol taxonomy with security implications Andrew Colarik, patches and updates are issued periodically to extend the functional life cycle of software products industry has responded with update and patch management systems. Because of the proprietary nature

Thomborson, Clark

213

A Coal Mine Security Monitoring System Based on Multiplexed Fibre Bragg Grating Sensors and Coherence-Multiplexing Technique  

Science Journals Connector (OSTI)

Abstract: An FBG sensing system for coal mine security monitoring is proposed in this paper. It works over a Spatial-division-multiplexing/coherence-multiplexing network to realize...

Xia, Tianhao; Zhou, Bin; Liu, Weisheng; Guan, Zuguang

214

Use of Multi-attribute Utility Functions in Evaluating Security Systems  

SciTech Connect (OSTI)

In analyzing security systems, we are concerned with protecting a building or facility from an attack by an adversary. Typically, we address the possibility that an adversary could enter a building and cause damage resulting in an immediate loss of life, or at least substantial disruption in the operations of the facility. In response to this setting, we implement security systems including devices, procedures, and facility upgrades designed to (a) prevent the adversary from entering, (b) detect and neutralize him if he does enter, and (c) harden the facility to minimize damage if an attack is carried out successfully. Although we have cast this in terms of physical protection of a building, the same general approach can be applied to non-physical attacks such as cyber attacks on a computer system. A rigorous analytic process is valuable for quantitatively evaluating an existing system, identifying its weaknesses, and proposing useful upgrades. As such, in this paper we describe an approach to assess the degree of overall protection provided by security measures. Our approach evaluates the effectiveness of the individual components of the system, describes how the components work together, and finally assesses the degree of overall protection achieved. This model can then be used to quantify the amount of protection provided by existing security measures, as well as to address proposed upgrades to the system and help identify a robust and cost effective set of improvements. Within the model, we use multiattribute utility functions to perform the overall evaluations of the system.

Meyers, C; Lamont, A; Sicherman, A

2008-06-13T23:59:59.000Z

215

Interdependence of the Electricity Generation System and the Natural Gas System and Implications for Energy Security  

E-Print Network [OSTI]

Approved for public release; distribution is unlimited. Lexington Massachusetts This page intentionally left blank. EXECUTIVE SUMMARY Concern about energy security on domestic Department of Defense installations has led to the possibility of using natural gas-fired electricity generators to provide power in the event of electric grid failures. As natural gas is an increasingly base-load fuel for electricity generation in the United States, the electricity generation system has become increasingly dependent on the operation of the natural gas system. However, as the natural gas system is also partly dependent on electricity for its ability to deliver natural gas from the well-head to the consumer, the question arises of whether, in the event of an electric grid failure, the natural gas would continue to flow. As the natural gas transmission system largely uses natural gas from the pipelines as a source of power, once the gas has been extracted from the ground, the system is less dependent on the electric grid. However, some of the drilling rigs, processing units, and pipeline compressors do depend on electric power, making the vulnerability to the system to a disruption in the national electricity supply network vary depending on the cause, breadth, and geographic location of the disruption. This is due to the large numbers of players in the natural gas production and

N. Judson; N. Judson

2013-01-01T23:59:59.000Z

216

S-Security Protective Force and Systems Services for the Nevada Site  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

S-Security Protective Force and Systems Services for the Nevada Site S-Security Protective Force and Systems Services for the Nevada Site Office Solicitation Number: DE-SOL-0002014 Agency: Department of Energy Office: Federal Locations Location: All DOE Federal Contracting Offices Notice Type: Modification/Amendment Original Posted Date: June 22, 2010 Posted Date: June 13, 2011 Response Date: Jul 13, 2011 5:00 pm Mountain Original Response Date: July 7, 2010 Archiving Policy: Manual Archive Original Archive Date: August 6, 2010 Archive Date: - Original Set Aside: N/A Set Aside: N/A Classification Code: S -- Utilities and housekeeping services NAICS Code: 561 -- Administrative and Support Services/561612 -- Security Guards and Patrol Services Solicitation Number: DE-SOL-0002014 Notice Type:

217

DOE/CX-00007 CATEGORICAL EXCLUSION SAFEGUARDS AND SECURITY ENHANCED ASSESSMENT SYSTEM  

Broader source: Energy.gov (indexed) [DOE]

07 07 CATEGORICAL EXCLUSION SAFEGUARDS AND SECURITY ENHANCED ASSESSMENT SYSTEM (PROJECT S-221) HANFORD SITE, RICHLAND, WASHINGTON PROPOSED ACTION The U.S. Department of Energy (DOE) proposes to install six wooden utility poles to support the safeguards and security enhanced assessment system. LOCATION OF ACTION The locations of the proposed action are generally within and around 200 East Area of the Hanford Site. The specific locations cannot be disclosed due to their safeguards and security related nature, and the locations have been designated Official Use Only. It is the policy of the DOE to make records available to the public to the greatest extent possible, in keeping with the spirit of the Freedom of Information Act (FOIA), while at the same time

218

Designing security into software  

E-Print Network [OSTI]

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

219

Review: Intranet Security  

Science Journals Connector (OSTI)

......Review Review: Intranet Security Reviewed by John Williamson Intranet Security John Vacca...Advanced Computer Technology and the Law Curtis...that in advanced technology the legal system...Wolverhampton University Intranet Security ?? Intranet......

John Williamson

1998-05-01T23:59:59.000Z

220

Information System Security Officer (ISSO) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

system. ISSO Core Competency Training Worksheet More Documents & Publications Cybersecurity Program Manager (CSPM) Authorizing Official Designated Representative (AODR)...

Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Amy Van Asselt PhD Student  

E-Print Network [OSTI]

, thus the benefits of installed renewable systems are not fully realized · Thermal energy storage empirical data and model an existing phase change thermal energy storage system · Utilize currently advantage of significant penetration of thermal energy storage on a utility's investment in infrastructure

Wisconsin at Madison, University of

222

SP 800-82. Guide to Industrial Control Systems (ICS) Security: Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC)  

Science Journals Connector (OSTI)

The purpose of this document is to provide guidance for securing industrial control systems (ICS), including supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), and other systems performing control functions. ... Keywords: Cyber-physcial systems, ICS, Industrial Control Systems, SCADA, Supervisory Control and Data Acquisition, security controls, threats, vulnerabilities

Keith A. Stouffer; Joseph A. Falco; Karen A. Scarfone

2011-06-01T23:59:59.000Z

223

CPSC 601.xx: Information Systems Security Analysis Statement of Ethical Considerations  

E-Print Network [OSTI]

permission and informed consent of the system's owner. Ethical Hacking Principles Hacking is, unfortunately misuse of the special skills they possess. Similarly, hacking is a special technological skill that can the term "hacking" to refer to the skill to question security and trust assumptions expressed in software

Locasto, Michael E.

224

Combining Provenance and Security Policies in a Web-based Document Management System  

E-Print Network [OSTI]

Combining Provenance and Security Policies in a Web-based Document Management System Brian J policies with provenance tracking. For instance, an on- line stock trading website might restrict access. Similarly, the application might need to track the provenance of transaction infor- mation to support

Hicks, Michael

225

Secure Systems Editor: S.W. Smith, sws@cs.dartmouth.edu  

E-Print Network [OSTI]

Secure Systems Editor: S.W. Smith, sws@cs.dartmouth.edu side of the picture--the computers which we train students, young and old, to be effective cyber-citizens; and the media coverage or produce more effective tailors. S.W. SMITH Dartmouth College T oalargeextent,computingsystemsareu

Smith, Sean W.

226

Security in Information Systems: New Challenges and Opportunities  

E-Print Network [OSTI]

systems considers the protection of information and of the systems that manage it, against a wide range of threats in order to ensure business continuity, minimize risks and maximize the return on investment. This Special Issue of the international Journal of Universal Computer Science includes papers received from

Jurjens, Jan

227

Design for a Decentralized Security System for Network Attached Storage  

E-Print Network [OSTI]

Storage Systems, held jointly with the 17th IEEE Symposium on Mass Storage Systems, College Park, MD reliability, since one drive having a catastrophic failure such as catching on fire will not damage the other. This mechanism ensures that any files on the file server are protected from reading or from undetected

Miller, Ethan L.

228

The Center for Information Systems Security Studies and  

E-Print Network [OSTI]

composition; functional mechanisms; & lifecycle assurance techniques. CS3695 Network Vulnerability Assessment assessment & vulnerability tools; (5) describe the motivations & different types of hackers. CS4652 Applied, describe the inherent trust problems relating to the composition of systems and components, & perform

229

GS3: a Grid Storage System with Security Features  

Science Journals Connector (OSTI)

Technological trend and the advent of worldwide networks, such as the Internet, made computing systems more and more powerful, increasing both processing and storage capabilities. In Grid computing infrastructure...

Vincenzo D. Cunsolo; Salvatore Distefano; Antonio Puliafito

2010-09-01T23:59:59.000Z

230

Interdependent infrastructures and multi-mode attacks and failures: improving the security of urban water systems and fire response  

E-Print Network [OSTI]

This dissertation examines the interdependence between urban water distribution systems and urban fire response. The focus on interdependent critical infrastructures is driven by concern for security of water systems and the effects on related...

Bristow, Elizabeth Catherine

2009-05-15T23:59:59.000Z

231

Security Control Assessor | Department of Energy  

Energy Savers [EERE]

Training Worksheet More Documents & Publications Information System Security Manager (ISSM) Cybersecurity Program Manager (CSPM) Information System Security Officer (ISSO)...

232

Unmanned Systems: an Emerging Threat to Waterside Security  

E-Print Network [OSTI]

Domain Awareness (MDA) for ports, harbors, and protection of cruise ship and military marine assets has Autonomous Systems Laboratory Virginia Institute of Marine Science Gloucester Point, Virginia, 23062, USA mrp capability at this time. Detection of bad robots and strategies for reducing the success of an attack

Graves, John E.

233

GAO-04-354, CRITICAL INFRASTRUCTURE PROTECTION: Challenges and Efforts to Secure Control Systems  

Broader source: Energy.gov (indexed) [DOE]

Report to Congressional Requesters Report to Congressional Requesters United States General Accounting Office GAO March 2004 CRITICAL INFRASTRUCTURE PROTECTION Challenges and Efforts to Secure Control Systems GAO-04-354 www.gao.gov/cgi-bin/getrpt?GAO-04-354. To view the full product, including the scope and methodology, click on the link above. For more information, contact Robert F. Dacey at (202) 512-3317 or daceyr@gao.gov. Highlights of GAO-04-354, a report to congressional requesters March 2004 CRITICAL INFRASTRUCTURE PROTECTION Challenges and Efforts to Secure Control Systems In addition to general cyber threats, which have been steadily increasing, several factors have contributed to the escalation of the risks of cyber attacks against control systems. These include the adoption of standardized

234

Energy Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Security Energy Security Energy Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. April 12, 2012 A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. Proponents of such bioreactors (compared to open ponds) say the growth environment can be more easily controlled; they prevent evaporation; and light penetrates through all sides of the container, which increases cell density. However, bioreactors suffer high materials and energy costs as well as mixing and gas-exchange

235

Microsoft PowerPoint - 6_AMY_JOHNSON_MMSS 2014 AJohnson UUSA...  

National Nuclear Security Administration (NNSA)

Lessons Learned Associated with Obtaining License for a New Enrichment Plant Amy Johnson, URENCO USA URENCO USA History June to June - Combined License (COL) approval to production...

236

Security and stability control system for offshore platforms power grid  

Science Journals Connector (OSTI)

The key technology for offshore platform power grid interlinked-Energy Management System (EMS) is studied in this article. The perfect EMS control solutions are formulated and carried on by the studies of the control strategies of frequency control, voltage control, precedence load shedding, high frequency trip generator, communication failure, and so on according to the power flow and fault simulation calculations against all kinds of working modes of the grid. The power supply effects before and after using the power grid interlink and EMS control are contrasted. Their application has improved the power supply reliability, boosted up the ability against impacts, decreased the spare capability of generators, reduced the maintenance work, and saved the investment.

Zhang Jifen; Hu Peng; Liu Jun

2009-01-01T23:59:59.000Z

237

January 2007 SECURITY CONTROLS FOR  

E-Print Network [OSTI]

for their information systems. Security controls are the management, operational, and technical safeguards for their information systems. Security controls are the management, operational, and technical safeguards

238

Roadmap to Secure Control Systems in the Energy Sector 2006- Presentation to the 2008 ieRoadmap Workshop  

Broader source: Energy.gov [DOE]

Presentation by Hank Kenchington on the 2006 roadmap to secure control systems in the energy sector at the ieRoadmap Workshop in Chicago, May 28-29, 2008.

239

Tag: GTRI | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Global Security Well Logging Security Initiatives GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the...

240

A Strategy for Information Security: TOGAF , A. Movasseghi2  

E-Print Network [OSTI]

Security Planning, Information Security, TOGAF 1 Introduction Today's globally distributed network systems

Ertaull, Levent

Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Office of Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Welcome to the Office of Security Mission and Functions The Office of Security (HS-50) developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. The Office of Security, through the Office of Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented.

242

Security Requirements for Remote Access to DOE and Applicable Contractor Information Technology Systems  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Notice establishes DOE policy requirements and responsibilities for remote connections to DOE and contractor information technology systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, to protect DOE information and information technology systems commensurate with the risk and magnitude of harm that could result from their unauthorized access, use, disclosure, modification or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06. No cancellations.

2004-02-19T23:59:59.000Z

243

NERSC Computer Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as possible at security@nersc.gov. You may also call the NERSC consultants (or NERSC Operations during non-business hours) at 1-800-66-NERSC. Please save any evidence of the break-in and include as many details as possible in your communication with us. NERSC Computer Security Tutorial

244

Cyber-physical security metric inference in smart grid critical infrastructures based on system administrators' responsive behavior  

Science Journals Connector (OSTI)

Abstract To protect complex power-grid control networks, efficient security assessment techniques are required. However, efficiently making sure that calculated security measures match the expert knowledge is a challenging endeavor. In this paper, we present EliMet, a framework that combines information from different sources and estimates the extent to which a control network meets its security objective. Initially, EliMet passively observes system operators' online reactive behavior against security incidents, and accordingly refines the calculated security measure values. To make the values comply with the expert knowledge, EliMet actively queries operators regarding those states for which sufficient information was not gained during the passive observation. Finally, EliMet makes use of the estimated security measure values for predictive situational awareness by ranking potential cyber-physical contingencies that the security administrators should plan for upfront. Our experimental results show that EliMet can optimally make use of prior knowledge as well as automated inference techniques to minimize human involvement and efficiently deduce the expert knowledge regarding individual states of that particular system.

Saman Zonouz; Parisa Haghani

2013-01-01T23:59:59.000Z

245

AMIS (Smart Grid Project) (Traun, Austria) | Open Energy Information  

Open Energy Info (EERE)

Traun, Austria) Traun, Austria) Jump to: navigation, search Project Name AMIS Country Austria Headquarters Location Traun, Austria Coordinates 48.226349°, 14.23442° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":48.226349,"lon":14.23442,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

246

AMI (Smart Grid Project) (Poland) | Open Energy Information  

Open Energy Info (EERE)

Poland) Poland) Jump to: navigation, search Project Name AMI Country Poland Coordinates 51.919437°, 19.145136° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":51.919437,"lon":19.145136,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

247

Renovated Korean nuclear safety and security system: A review and suggestions to successful settlement  

SciTech Connect (OSTI)

Questions of whether past nuclear regulatory body of Korea is not a proper system to monitor and check the country's nuclear energy policy and utilization have been raised. Moreover, a feeling of insecurity regarding nuclear safety after the nuclear accident in Japan has spread across the public. This has stimulated a renovation of the nuclear safety regime in Korea. The Nuclear Safety and Security Commission (NSSC) was launched on October 26, 2011 as a regulatory body directly under the President in charge of strengthening independence and nuclear safety. This was a meaningful event as the NSSC it is a much more independent regulatory system for Korea. However, the NSSC itself does not guarantee an enhanced public acceptance of the nuclear policy and stable use nuclear energy. This study introduces the new NSSC system and its details in terms of organization structure, appropriateness of specialty, budget stability, and management system. (authors)

Chung, W. S.; Yun, S. W.; Lee, D. S. [Korea Atomic Energy Research Inst., Dukjin-dong 150, Yusung-gu, Daejon, R.O., 305-353 (Korea, Republic of); Go, D. Y. [Kyung Hee Univ., Kyung Hee daero 26, Dongdaemoon-gu, Seoul, R.O., 130-701 (Korea, Republic of)

2012-07-01T23:59:59.000Z

248

Wind energy and system security the grid connection moratorium in Ireland  

Science Journals Connector (OSTI)

This examines the interaction between technical challenges and policy choices that are made regarding wind power, and uses the grid connection moratorium in Ireland as a case study. While total installed wind capacity in Ireland is low compared with Germany, Spain and Denmark, wind power penetration is higher in the Irish system than in either the British, UCTE or NORDEL systems. In December 2003 the system operators expressed concerns about high wind power penetration, in particular the challenges of maintaining power system stability, security and reliability, resulting in a moratorium on new grid connection agreements. Significant progress has since been made in grid codes and dynamic models for wind turbines. In March 2006, there remain almost 3000 MW of proposed wind capacity awaiting a grid connection agreement. This paper investigates the technical issues underpinning this moratorium, monitors progress made since its introduction and suggests alternative technical solutions to the moratorium.

B.P. O Gallachoir; P. Gardner; H. Snodin; E.J. McKeogh

2007-01-01T23:59:59.000Z

249

A Review on Indoor Optical Wireless Systems Chaturi Singh, AMIE  

E-Print Network [OSTI]

Kanpur, U.P.-208016 Joseph John, FIETE, Y.N.Singh MIETE, MIEEE Department of Electrical Engineering, IIT assistants for indoor use are rapidly growing in offices, manufacturing floors, shopping areas and warehouses cable free communication at very high bit rates (a few Gbps as compared to tens of Mbps supported

Singh Yatindra Nath

250

A systematic review of security requirements engineering  

Science Journals Connector (OSTI)

One of the most important aspects in the achievement of secure software systems in the software development process is what is known as Security Requirements Engineering. However, very few reviews focus on this theme in a systematic, thorough and unbiased ... Keywords: Requirements engineering, Secure development, Security, Security engineering, Security requirements, Security requirements engineering, Systematic review

Daniel Mellado; Carlos Blanco; Luis E. Snchez; Eduardo Fernndez-Medina

2010-06-01T23:59:59.000Z

251

Secure upgrade of hardware security modules in bank networks  

Science Journals Connector (OSTI)

We study the secure upgrade of critical components in wide networked systems, focussing on the case study of PIN processing Hardware Security Modules (HSMs). These tamper-resistant devices, used by banks to securely transmit and verify the PIN typed ... Keywords: PIN processing, hardware security modules, security APIs, upgrade strategies

Riccardo Focardi; Flaminia L. Luccio

2010-03-01T23:59:59.000Z

252

Energy Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Security SHARE Energy Security ORNL has supported the DOE Cybersecurity for Energy Delivery Systems (CEDS) program in making advances in cybersecurity capabilities for...

253

Security and Privacy Notices | NREL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security and Privacy Notices Security Notice This Web site is part of a Federal computer system used to accomplish Federal functions. The National Renewable Energy Laboratory...

254

GAO-07-1036, CRITICAL INFRASTRUCTURE PROTECTION: Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain  

Broader source: Energy.gov (indexed) [DOE]

Congressional Requesters Congressional Requesters CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain September 2007 GAO-07-1036 What GAO Found United States Government Accountability Office Why GAO Did This Study Highlights Accountability Integrity Reliability September 2007 CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain Highlights of GAO-07-1036, a report to congressional requesters Control systems-computer-based systems that monitor and control sensitive processes and physical functions-perform vital functions in many of our nation's critical infrastructures, including electric power, oil and gas, water treatment, and chemical production. The disruption of

255

INFORMATION SECURITY University Policy No: IM7800  

E-Print Network [OSTI]

Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

Herwig, Falk

256

Architectural support for enhancing security in clusters  

E-Print Network [OSTI]

to security, numerous security loopholes in cluster servers come to the forefront. Clusters usually rely on rewalls for their security, but the rewalls cannot prevent all security attacks; therefore, cluster systems should be designed to be robust...

Lee, Man Hee

2009-05-15T23:59:59.000Z

257

Building Security System Based on Grid Computing To Convert and Store Media Files  

Science Journals Connector (OSTI)

In the recent years, Grid Computing (GC) has made big steps ... This paper introduces an approach to integrate the security mechanisms, Grid Security Infrastructure (GSI) of the open source...

Hieu Nguyen Trung; Duy Nguyen; Tan Dang Cao

2010-01-01T23:59:59.000Z

258

Office of Security Assistance  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Director's Perspective Welcome to the Office of Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal Year 2007, HSS performed extensive assistance activities at the request of DOE/NNSA program offices and field sites. The activities ranged from special and routine site survey assistance, physical and technical security inspections in support of the Office of Intelligence, Vulnerability Assessment and Design Basis Threat (DBT) implementation assistance, third-party, adversary support, and DBT implementation and planning validation activities associated with the Site Assistance Visits and Technology Assistance Visits. The security assistance provided to our customers included technical expertise tailored to augment site capabilities in critical fields.

259

Secure Manufacturing | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Secure Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to optimize manufacturing and systems performance; and executing projects cost effectively and with timeliness. Y-12 accomplishes this mission to meet the national security challenges of today and those of the future, with capability and expertise in the following areas:

260

Security Notice | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Notice Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized users; to access, obtain, alter, damage, or destroy information; or otherwise to interfere with the system or its operation - all are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and

Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Analysis of operations and cyber security policies for a system of cooperating Flexible Alternating Current Transmission System (FACTS) devices.  

SciTech Connect (OSTI)

Flexible Alternating Current Transmission Systems (FACTS) devices are installed on electric power transmission lines to stabilize and regulate power flow. Power lines protected by FACTS devices can increase power flow and better respond to contingencies. The University of Missouri Rolla (UMR) is currently working on a multi-year project to examine the potential use of multiple FACTS devices distributed over a large power system region in a cooperative arrangement in which the FACTS devices work together to optimize and stabilize the regional power system. The report describes operational and security challenges that need to be addressed to employ FACTS devices in this way and recommends references, processes, technologies, and policies to address these challenges.

Phillips, Laurence R.; Tejani, Bankim; Margulies, Jonathan; Hills, Jason L.; Richardson, Bryan T.; Baca, Micheal J.; Weiland, Laura

2005-12-01T23:59:59.000Z

262

U.S. Patent Pending, Cyberspace Security System for Complex Systems, U.S. Patent Application No.: 14/134,949  

SciTech Connect (OSTI)

A computer implemented method monetizes the security of a cyber-system in terms of losses each stakeholder may expect to lose if a security break down occurs. A non-transitory media stores instructions for generating a stake structure that includes costs that each stakeholder of a system would lose if the system failed to meet security requirements and generating a requirement structure that includes probabilities of failing requirements when computer components fails. The system generates a vulnerability model that includes probabilities of a component failing given threats materializing and generates a perpetrator model that includes probabilities of threats materializing. The system generates a dot product of the stakes structure, the requirement structure, the vulnerability model and the perpetrator model. The system can further be used to compare, contrast and evaluate alternative courses of actions best suited for the stakeholders and their requirements.

Abercrombie, Robert K [ORNL] [ORNL; Sheldon, Frederick T [ORNL] [ORNL; Mili, Ali [New Jersey Insitute of Technology] [New Jersey Insitute of Technology

2013-01-01T23:59:59.000Z

263

Homeland Security Programs | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Homeland Security Programs Homeland Security Programs SHARE Homeland Security Programs The Homeland Security Programs support the Department of Homeland Security (DHS), other federal and state agencies, and commercial partners. Through the integration of a number of key competencies, ORNL is able to provide critical operational, technical, and scientific support to these sponsors. A key focus of this area is to translate the critical research into operational capability for the security, protection, response, and recovery of the nation against natural and man-made events. Research Areas detecting, preventing, and reversing the proliferation of weapons of mass destruction deploying integrated systems for incident awareness, detection, and response providing technology for detecting explosives at the

264

Global Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Applications Global Security science-innovationassetsimagesicon-science.jpg Global Security National security depends on science and technology. The United States relies on...

265

Lemnos Interoperable Security Program  

Broader source: Energy.gov (indexed) [DOE]

Lemnos Interoperable Security Program Lemnos Interoperable Security Program Creating common language and metrics for describing functions of network security tools and testing for interoperability As energy control systems employ more Internet-based features and routable communication methods, the need grows for enhanced security functions, such as firewalls, virtual private networks (VPNs), and intrusion detection systems. When purchasing network security products, today's control systems users cannot adequately compare products from different vendors because the industry lacks a widely accepted mechanism for evaluating functionality, performance,

266

A Fair and Secure Bandwidth Allocation for AMI Mesh Network in Smart Grid  

Science Journals Connector (OSTI)

......the peak time and thus save energy consumption cost.Additionally, The Computer...time is charged at a lower cost, the amount of energy consumption at the peak time...energy storage and distributed renewable energy resources. Since many......

Hyejin Son; Taeyoon Kang; Hwangnam Kim; Jong-Bae Park; Jae Hyung Roh

2012-10-01T23:59:59.000Z

267

Tag: Global Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Global Security Global Security Tag: Global Security Displaying 1 - 10 of 61... Category: Global Security Ultrasonic cleaner cuts costs, enhances safety The process of upgrading an old cleaning unit revealed how things were once done and the advances that have followed. More... Category: Global Security Well Logging Security Initiatives GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the security of these sources worldwide. More... Category: Global Security Y-12 Receives Two R&D 100 Awards Engineers at the National Nuclear Security Administration's Y-12 National Security Complex have won two R&D 100 Awards. More... Category: Global Security Y-12 researchers garner R&D 100 awards A research chemist and his revolutionary cloth invented to clean surfaces

268

Security as a New Dimension in Embedded System Design Paul Kocher, Ruby Lee, Gary McGraw, Anand Raghunathan and Srivaths Ravi  

E-Print Network [OSTI]

-end network equipment such as routers, gateways, firewalls, storage and web servers. Technologi- cal advances-resistant embedded system design, processing requirements for security, impact of security on battery life for battery-powered systems, etc.). We also survey solution techniques to address these challenges, drawing

Lee, Ruby B.

269

A Review of the Security of Insulin Pump Infusion Systems Nathanael Paul, Ph.D. Tadayoshi Kohno, Ph.D. David C. Klonoff, M.D., FACP  

E-Print Network [OSTI]

A Review of the Security of Insulin Pump Infusion Systems Nathanael Paul, Ph.D. Tadayoshi Kohno, Ph is to help create a trustworthy infusion pump system that will ultimately strengthen pump safety, and we safety and information security. From 2005 to 2009, there were 56,000 adverse events in infusion pump

Matsuoka, Yoky

270

Security Assistance | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Security Assistance Security Assistance Security Assistance Welcome to Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal

271

PAPER ACCEPTED TO THE IEEE TRANSACTIONS ON POWER SYSTEMS 1 Sensitivity-based Security-constrained OPF Market  

E-Print Network [OSTI]

PAPER ACCEPTED TO THE IEEE TRANSACTIONS ON POWER SYSTEMS 1 Sensitivity-based Security-constrained OPF Market Clearing Model F. Milano, Member, IEEE, C. A. Ca~nizares, Senior Member, IEEE, and A. J constraints that properly include voltage stability limits in the operation of competitive electricity markets

Cañizares, Claudio A.

272

VLSI ARCHITECTURE OF AN INVISIBLE WATERMARKING UNIT FOR A BIOMETRIC-BASED SECURITY SYSTEM IN A DIGITAL CAMERA  

E-Print Network [OSTI]

VLSI ARCHITECTURE OF AN INVISIBLE WATERMARKING UNIT FOR A BIOMETRIC-BASED SECURITY SYSTEM is performed using an invisible watermarking algorithm that allows for verification of the image as well implementing the invisible watermarking algorithm towards the development of the camera. I. INTRODUCTION

Mohanty, Saraju P.

273

Secure OFDM-PON System Based on Chaos and Fractional Fourier Transform Techniques  

Science Journals Connector (OSTI)

We propose a novel method to simultaneously improve the physical layer security and the transmission performance of the orthogonal frequency division multiplexing (OFDM) passive...

Deng, Lei; Cheng, Mengfan; Wang, Xiaolong; Li, Hao; Tang, Ming; Fu, Songnian; Shum, Ping; Liu, Deming

2014-01-01T23:59:59.000Z

274

Some Physics And System Issues In The Security Analysis Of Quantum Key Distribution Protocols  

E-Print Network [OSTI]

In this paper we review a number of issues on the security of quantum key distribution (QKD) protocols that bear directly on the relevant physics or mathematical representation of the QKD cryptosystem. It is shown that the cryptosystem representation itself may miss out many possible attacks which are not accounted for in the security analysis and proofs. Hence the final security claims drawn from such analysis are not reliable, apart from foundational issues about the security criteria that are discussed elsewhere. The cases of continuous-variable QKD and multi-photon sources are elaborated upon.

Horace P. Yuen

2014-05-07T23:59:59.000Z

275

Argonne Team Challenges Physical Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Engineering & Systems Analysis Engineering & Systems Analysis Success Stories For further information, contact Roger Johnston, rogerj@anl.gov "Real security is thinking like the bad guys," maintains Roger Johnston, head of Argonne's VAT. Argonne Team Challenges Physical Security Physical security-the art of protecting tangible assets-is the counterpart to cyber security. Physical security can take the form of locks, tamper-indicating seals, guards who stand watch

276

Introduction JACQUELINE P. WILLIAMS, AMY K. HUSER, & DAVID J. BRENNER  

E-Print Network [OSTI]

an improvised nuclear device (IND) or a radiological dispersal device (RDD) (Homeland Security Council 2006 that terrorist groups continue to pursue the acquisition of nuclear or radiological devices to use against, Kaminski J, Norman MK, Maidment B, Hatchett R. 2010. NIAID/NIH radiation/nuclear medical countermeasures

Brenner, David Jonathan

277

Security and Privacy Notice  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security and Privacy Notice Security and Privacy Notice Thank you for visiting the Office of Health, Safety and Security (HSS) web site and reviewing our position on security and privacy. SECURITY NOTICE This web site is part of a Federal computer system and is the property of the United States Government. It is for authorized use only. The Department of Energy monitors this web site for security purposes to ensure it remains available and to protect information in the system. The Department of Energy uses software programs and additional equipment to monitor network traffic to identify unauthorized attempts to access, obtain, alter, damage or destroy information, or otherwise to interfere with the system or its operation. Any and all uses of this system and all files on this system

278

Nevada National Security Site - Reports  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Reports Reports Nevada National Security Site Review Reports 2013 Independent Oversight Targeted Review of the Safety Significant Blast Door and Special Door Interlock Systems and Review of Federal Assurance Capability at the Nevada National Security Site, December 2013 Review of the Nevada National Security Site Criticality Safety Program Corrective Action Plan Closure, May 2013 Review Reports 2012 Review of the Nevada National Security Site Implementation Verification Review Processes, March 2012 Activity Reports 2012 Nevada National Security Site Operational Awareness Visit, December 2012 Operational Awareness Oversight of the Nevada National Security Site, August 2012 Review Reports 2011 Review of Nevada Site Office and National Security Technologies, LLC, Line Oversight and Contractor Assurance Systems

279

Framework for SCADA Security Policy  

Broader source: Energy.gov (indexed) [DOE]

Framework for SCADA Security Policy Framework for SCADA Security Policy Dominique Kilman Jason Stamp dkilman@sandia.gov jestamp@sandia.gov Sandia National Laboratories Albuquerque, NM 87185-0785 Abstract - Modern automation systems used in infrastruc- ture (including Supervisory Control and Data Acquisition, or SCADA) have myriad security vulnerabilities. Many of these relate directly to inadequate security administration, which precludes truly effective and sustainable security. Adequate security management mandates a clear administrative struc- ture and enforcement hierarchy. The security policy is the root document, with sections covering purpose, scope, posi- tions, responsibilities, references, revision history, enforce- ment, and exceptions for various subjects relevant for system

280

Closure Report for Corrective Action Unit 562: Waste Systems, Nevada National Security Site, Nevada  

SciTech Connect (OSTI)

This Closure Report (CR) presents information supporting closure of Corrective Action Unit (CAU) 562, Waste Systems, and provides documentation supporting the completed corrective actions and confirmation that closure objectives for CAU 562 were met. This CR complies with the requirements of the Federal Facility Agreement and Consent Order (FFACO) that was agreed to by the State of Nevada; the U.S. Department of Energy (DOE), Environmental Management; the U.S. Department of Defense; and DOE, Legacy Management (FFACO, 1996 as amended). CAU 562 consists of the following 13 Corrective Action Sites (CASs), located in Areas 2, 23, and 25 of the Nevada National Security Site: CAS 02-26-11, Lead Shot CAS 02-44-02, Paint Spills and French Drain CAS 02-59-01, Septic System CAS 02-60-01, Concrete Drain CAS 02-60-02, French Drain CAS 02-60-03, Steam Cleaning Drain CAS 02-60-04, French Drain CAS 02-60-05, French Drain CAS 02-60-06, French Drain CAS 02-60-07, French Drain CAS 23-60-01, Mud Trap Drain and Outfall CAS 23-99-06, Grease Trap CAS 25-60-04, Building 3123 Outfalls Closure activities began in October 2011 and were completed in April 2012. Activities were conducted according to the Corrective Action Plan for CAU 562 (U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office [NNSA/NSO], 2011). The corrective actions included No Further Action and Clean Closure. Closure activities generated sanitary waste and hazardous waste. Some wastes exceeded land disposal limits and required offsite treatment prior to disposal. Other wastes met land disposal restrictions and were disposed in appropriate onsite or offsite landfills. NNSA/NSO requests the following: A Notice of Completion from the Nevada Division of Environmental Protection to NNSA/NSO for closure of CAU 562 The transfer of CAU 562 from Appendix III to Appendix IV, Closed Corrective Action Units, of the FFACO

NSTec Environmental Restoration

2012-08-15T23:59:59.000Z

Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Departmental Personnel Security- Clearance Automation  

Broader source: Energy.gov [DOE]

The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

282

Global Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security Global Security We train nuclear industry professionals, emergency responders and security forces from around the world to safeguard vulnerable materials. Nuclear nonproliferation - stopping the spread of nuclear materials - is a critical part of creating a safer world. Y-12 has been working in nonproliferation since the early 1990s in more than 25 countries. As the nation reduces the size of its arsenal, Y-12 will play a central role in decommissioning weapons systems and providing weapons material for peacetime uses. We are a leader across the National Nuclear Security Administration in implementing technology and current training to ensure materials are protected with the highest degree of confidence. We provide the expertise to secure highly enriched uranium - domestically

283

AMIS (Smart Grid Project) (Vöcklabruck, Austria) | Open Energy Information  

Open Energy Info (EERE)

AMIS (Smart Grid Project) (Vöcklabruck, Austria) AMIS (Smart Grid Project) (Vöcklabruck, Austria) Jump to: navigation, search Project Name AMIS Country Austria Headquarters Location Vöcklabruck, Austria Coordinates 48.003342°, 13.65613° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":48.003342,"lon":13.65613,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

284

Security Rulemaking | Department of Energy  

Office of Environmental Management (EM)

Security Rulemaking Security Rulemaking Transportation Security Rulemaking Activities Security Rulemaking More Documents & Publications Transportation Security Rulemaking...

285

Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber...

286

Mapping the Impact of Security Threats on Safety-Critical Global Navigation Satellite Systems Chris W. Johnson (1), A. Atencia Yepez (2)  

E-Print Network [OSTI]

Mapping the Impact of Security Threats on Safety-Critical Global Navigation Satellite Systems Chris of attack scenarios can be used to assess the resilience of safety cases to the impact of external security accident advocated the development of safety argumentation across the oil and gas industry (US Presidential

Johnson, Chris

287

770 IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 A Resilient Real-Time System Design for a Secure  

E-Print Network [OSTI]

Design for a Secure and Reconfigurable Power Grid Hairong Qi, Senior Member, IEEE, Xiaorui Wang, Member architecture design that can help assure the security and reliability of the power grid. In this paper, we770 IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 A Resilient Real-Time System

Tolbert, Leon M.

288

PNNL: Security & Privacy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security & Privacy Security & Privacy Thank you for visiting the Pacific Northwest National Laboratory (PNNL) website (pnnl.gov) and reviewing our security and privacy policies. The following policies apply to all pages and sites in the pnnl.gov domain, unless otherwise noted. Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or

289

Cyber Security  

Office of Environmental Management (EM)

Associate CIO for Cyber Security (IM-30) Rod Turk Deputy Associate CIO for Cyber Security (IM-30) Paul Cunningham Incident Management Division (IM-32) Rob Ciochon Director Policy,...

290

AMIE (ARM MJO Investigation Experiment): Observations of the Madden-Julian Oscillation for Modeling Studies Science Plan  

SciTech Connect (OSTI)

Deep convection in the tropics plays an important role in driving global circulations and the transport of energy from the tropics to the mid-latitudes. Understanding the mechanisms that control tropical convection is a key to improving climate modeling simulations of the global energy balance. One of the dominant sources of tropical convective variability is the Madden-Julian Oscillation (MJO), which has a period of approximately 3060 days. There is no agreed-upon explanation for the underlying physics that maintain the MJO. Many climate models do not show well-defined MJO signals, and those that do have problems accurately simulating the amplitude, propagation speed, and/or seasonality of the MJO signal. Therefore, the MJO is a very important modeling target for the ARM modeling community geared specifically toward improving climate models. The ARM MJO Investigation Experiment (AMIE) period coincides with a large international MJO initiation field campaign called CINDY2011 (Cooperative Indian Ocean experiment on intraseasonal variability in the Year 2011) that will take place in and around the Indian Ocean from October 2011 to January 2012. AMIE, in conjunction with CINDY2011 efforts, will provide an unprecedented data set that will allow investigation of the evolution of convection within the framework of the MJO. AMIE observations will also complement the long-term MJO statistics produced using ARM Manus data and will allow testing of several of the current hypotheses related to the MJO phenomenon. Taking advantage of the expected deployment of a C-POL scanning precipitation radar and an ECOR surface flux tower at the ARM Manus site, we propose to increase the number of sonde launches to eight per day starting in about mid-October of the field experiment year, which is climatologically a period of generally suppressed conditions at Manus and just prior to the climatologically strongest MJO period. The field experiment will last until the end of the MJO season (typically March), affording the documentation of conditions before, during, and after the peak MJO season. The increased frequency of sonde launches throughout the experimental period will provide better diurnal understanding of the thermodynamic profiles, and thus a better representation within the variational analysis data set. Finally, a small surface radiation and ceilometer system will be deployed at the PNG Lombrum Naval Base about 6 km away from the ARM Manus site in order to provide some documentation of scale variability with respect to the representativeness of the ARM measurements.

Long, C; Del Genio, A; Gustafson, W; Houze, R; Jakob, C; Jensen, M; Klein, S; Leung, L Ruby; Liu, X; Luke, E; May, P; McFarlane, S; Minnis, P; Schumacher, C; Vogelmann, A; Wang, Y; Wu, X; Xie, S

2010-03-22T23:59:59.000Z

291

Composite Data Products (CDPs) from the Hydrogen Secure Data Center (HSDC) at the Energy Systems Integration Facility (ESIF), NREL  

DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

The Hydrogen Secure Data Center (HSDC) at NREL's Energy Systems Integration Facility (ESIF) plays a crucial role in NREL's independent, third-party analysis of hydrogen fuel cell technologies in real-world operation. NREL partners submit operational, maintenance, safety, and cost data to the HSDC on a regular basis. NREL's Technology Validation Team uses an internal network of servers, storage, computers, backup systems, and software to efficiently process raw data, complete quarterly analysis, and digest large amounts of time series data for data visualization. While the raw data are secured by NREL to protect commercially sensitive and proprietary information, individualized data analysis results are provided as detailed data products (DDPs) to the partners who supplied the data. Individual system, fleet, and site analysis results are aggregated into public results called composite data products (CDPs) that show the status and progress of the technology without identifying individual companies or revealing proprietary information. These CDPs are available from this NREL website: 1) Hydrogen Fuel Cell Vehicle and Infrastructure Learning Demonstration; 2) Early Fuel Cell Market Demonstrations; 3) Fuel Cell Technology Status [Edited from http://www.nrel.gov/hydrogen/facilities_secure_data_center.html].

292

PRIVACY/SECURITY NOTICE  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

PRIVACY/SECURITY NOTICE PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system employs software programs to monitor network traffic to identify unauthorized activities. By accessing this Web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized

293

Computer Security Division 2009 Annual Report  

E-Print Network [OSTI]

Security 12 Smart Grid Cyber Security 13 Supply Chain Risk Management 13 Cryptographic Validation Programs Computing Project 36 Policy Machine 36 Security for Grid and Pervasive Systems 38 Security OntologiesComputer Security Division 2009 Annual Report #12;Table of Contents Welcome 1 Division

294

Access control models and security labelling  

Science Journals Connector (OSTI)

Security labels convey information that is utilised to perform access control decisions, specify protective measures, and aid in the determination of additional handling restrictions required by security policies. In discussing security labelling, one ... Keywords: access control, assurance, dynamic labelling model, open system, security label, security policy

Chuchang Liu; Angela Billard; Maris Ozols; Nikifor Jeremic

2007-01-01T23:59:59.000Z

295

Amy G. Froelich Ph.D. in Statistics 10/00  

E-Print Network [OSTI]

Amy G. Froelich Education Ph.D. in Statistics 10/00 University of Illinois at Urbana-Champaign Highest University Honors - Bronze Tablet Professional Employment Associate Professor 8/08 - present Department of Statistics, Iowa State University Faculty Member 8/06 - present Master of School Mathematics

Froelich, Amy G.

296

Genetics of caffeine consumption and responses to caffeine Amy Yang & Abraham A. Palmer & Harriet de Wit  

E-Print Network [OSTI]

REVIEW Genetics of caffeine consumption and responses to caffeine Amy Yang & Abraham A. Palmer genetics affects consumption, acute re- sponse, or the long-term effects of caffeine. Objective This paper heritability of consumption and of caffeine-related traits, including withdrawal symptoms, caffeine

Ober, Carole

297

NASA's Global Climate Change Education Sneha Rao Mark Becker Amy Work  

E-Print Network [OSTI]

NASA's Global Climate Change Education Sneha Rao Mark Becker Amy Work Center for International of NASA's Global Climate Change Education (GCCE) project is to provide educators the tools and resources health across the globe at secondary, and post-secondary school level, by using NASA climate information

Columbia University

298

Guidelines for Emotion Annotation in AMI (based on the original FeelTrace documentation)  

E-Print Network [OSTI]

Guidelines for Emotion Annotation in AMI (based on the original FeelTrace documentation) Revision. This scheme uses a program called FEELTRACE to track the perceived emotional state in data continuously over time. This document is an almost exact reproduction of the guidelines that are provided

Edinburgh, University of

299

BBuulllleettiinnJUNE 2009 DR. AMY WRIGHT NAMED FAU RESEARCHER OF THE YEAR  

E-Print Network [OSTI]

BBuulllleettiinnJUNE 2009 DR. AMY WRIGHT NAMED FAU RESEARCHER OF THE YEAR Florida Atlantic Wright was selected for her breakthrough work in the category of Professor, Sponsored/ Project-Oriented work. Dr. Wright's research focuses on the discovery of novel marine natural products that have utility

Fernandez, Eduardo

300

Nuclear Safeguards and Security Challenge:  

National Nuclear Security Administration (NNSA)

Nuclear Safeguards and Security Nuclear Safeguards and Security Challenge: The international safeguards and security system is being challenged by evolving proliferation and terrorism threats, expanding International Atomic Energy Agency (IAEA) responsibilities, a retiring safeguards workforce, and the need for better technologies to detect and deter proliferation, theft, and sabotage. Response: Revitalize, strengthen, and sustain U.S. and international safeguards and security capabilities through the Next Generation Safeguards Initiative (NGSI) and International Nuclear Security programs that: * Support the development of safeguards and security policies, concepts and approaches * Develop human capital through training and education * Develop and implement new safeguards systems,

Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability  

E-Print Network [OSTI]

of Smart Grid devices ? Describe progress made in Smart Grid security ? Propose a more robust approach to SG security ? Describe needs for further research and development ESL-HH-10-08-09 Proceedings of the 17th Symposium for Improving Building Systems...? ? Advanced security methods ? Power analysis for key discovery ? Hardware attacks such as ?decapping? chips ? Developing vulnerability exploits ? Security analysis of smart grid systems & communications ? Reverse engineering ? Penetration testing ? Threat...

Ragsdale, G.

302

Automated analysis of security APIs  

E-Print Network [OSTI]

Attacks on security systems within the past decade have revealed that security Application Programming Interfaces (APIs) expose a large and real attack surface but remain to be a relatively unexplored problem. In 2000, ...

Lin, Amerson H

2005-01-01T23:59:59.000Z

303

DOE Cyber Security Role, Competency and Functional Matrix  

Broader source: Energy.gov (indexed) [DOE]

5/4/2011 5/4/2011 DOE Cyber Security Role, Competency and Functional Matrix DOE Cyber Security EBK: A Competency and Functional Framework for Cyber Security Workforce Development DOE Cyber Security Functional Roles Chief Information Officer (CIO) Information Owner/Steward Chief Information Security Officer (CISO) Authorizing Official (AO) AO Designated Representative (AODR) Common Control Provider Information System Owner Cyber Security Program Manager (CSPM) Information System Security Officer (ISSO) Information Security Architect Information System Security Engineer Security Control Assessor Core Competencies Data Security ● ● ● ● ● ● ● ● ● ● Enterprise Continuity ● ● ● ● ● ● ● ● ● ● ●

304

E-Print Network 3.0 - african farming systems Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Information Officer Summary: of operating Carbon Free Water system by 2015 Diverse energy portfolio 12; Farms to Fuel Agriculture... Farms to Fuel Amy Bolten Public...

305

Formal specification of role-based security policies for clinical information systems  

Science Journals Connector (OSTI)

Many healthcare organizations have transited from their old and disparate business models based on ink and paper to a new, consolidated ones based on electronic patient records. There are significant demands on secure mechanisms for collaboration and ... Keywords: LTL, authorisation constraints, healthcare environments

Karsten Sohr; Michael Drouineaud; Gail-Joon Ahn

2005-03-01T23:59:59.000Z

306

AgSec: Secure and Efficient CDMA-based Aggregation for Smart Metering Systems  

E-Print Network [OSTI]

, USA Email: {nxalamatsaz,axboustani,murtuza.jadliwala,vinod.namboodiri}@wichita.edu Abstract-- Security and energy. Hence, utilizing data aggregation algorithms, the limited bandwidth can be efficiently utilized the biggest blackout in North American history in 2003. Investigations showed that the outage was because

Namboodiri, Vinod

307

An Approach to Securely Identifying Beneficial Collaboration in Decentralized Logistics Systems  

Science Journals Connector (OSTI)

The problem of sharing manufacturing, inventory, or capacity to improve performance is applicable in many decentralized operational contexts. However, the solution of such problems commonly requires an intermediary or a broker to manage information security ... Keywords: algorithm, collaboration, cryptography, incentive compatible, routing, space-filling curve

Chris Clifton; Ananth Iyer; Richard Cho; Wei Jiang; Murat Kantarc?o?lu; Jaideep Vaidya

2008-01-01T23:59:59.000Z

308

Security in Physical Environments: Algorithms and System for Automated Detection of  

E-Print Network [OSTI]

of that person within that environment are usually not further monitored other than detecting outright breaches is surreptitiously obtained (RFID sniffing) and used to create a clone of the RFID tag which can then be used in RFID, security personnel could be alerted to monitor the suspicious person closely to determine whether

Fong, Chi Chiu "Simon"

309

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

1992-10-19T23:59:59.000Z

310

Information Security: Coordination of Federal Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

311

Lemnos Interoperable Security | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Security Security Lemnos Interoperable Security The Lemnos Interoperable Security Program began with one logical concept: If vendors develop control systems security products using an agreed-upon set of capability and operational requirements, energy asset owners can better evaluate product functions and purchase products from different vendors knowing they will be interoperable. Three years later, the Lemnos team developed those specifications-called interoperable configuration profiles-and one of the first products built to those profiles is in the market. Lemnos Interoperable Security More Documents & Publications Lemnos Interoperable Security Program SECURITY CORE FUNCTION AND DEFINITION REPORT Cybersecurity for Energy Delivery Systems 2010 Peer Review Presentations -

312

New Security Challenges in the Global Era: Environmental Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

New Security Challenges in the Global Era: Environmental Security New Security Challenges in the Global Era: Environmental Security Speaker(s): Beth Chalecki Date: October 4, 2001 - 12:00pm Location: Bldg. 90 Seminar Host/Point of Contact: Mithra Moezzi The environment is the planetary support system on which all other human enterprises depend. If political, social, cultural, religious, and most importantly economic systems are to remain secure and viable, the environment must also remain secure and viable. This makes global environmental conditions a legitimate U.S. national security concern. The security of individuals, communities, nations, and the entire global community is increasingly jeopardized by unpremeditated, non-military environmental threats. These threats are self-generated: we perpetrate them on ourselves, by fouling our air and water, and over-harvesting our land.

313

There is an increasing order in digitized technology. This increasing order requires high qualitative document management system which can be used in secure fashion especially for organization with  

E-Print Network [OSTI]

qualitative document management system which can be used in secure fashion especially for organization. The proposed framework provides the necessary options for creating an effective document management system document management system, the end product will be suitable for organization and guaranteed to satisfy

314

Privacy/Security Policy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Privacy/Security Privacy/Security Privacy/Security Policy This web site is part of a federal computer system used to accomplish federal functions. Read the following important privacy and security information carefully. Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The Department of Energy monitors this web site for security purposes to ensure that it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of 1986 (Pub. L. 99-474) and the National Information Infrastructure Protection Act of 1996 (Pub. L. 104-294), (18 U.S.C. 1030), or other applicable criminal laws.

315

Fast Onset Medications through Thermally Generated Aerosols Joshua D. Rabinowitz, Martin Wensley, Peter Lloyd, Daniel Myers, William Shen, Amy Lu,  

E-Print Network [OSTI]

, Peter Lloyd, Daniel Myers, William Shen, Amy Lu, Craig Hodges, Ron Hale, Daniel Mufson, and Alejandro to elevated temperatures, thereby preventing its thermal decomposition. The vaporized, gas-phase drug rapidly

Rabinowitz, Joshua D.

316

Breast Tissue Parameter Identification for a Nonlinear Constitutive Model Petr Jordan, Amy E. Kerdok, Simona Socrate, Robert D. Howe  

E-Print Network [OSTI]

Breast Tissue Parameter Identification for a Nonlinear Constitutive Model Petr Jordan, Amy E modulus, bulk modulus, prestretch, locking stretch, and relative permeability), we solve the inverse, locking stretch, and bulk modulus increase while the relative permeability decreases with pathological

317

Security Cases  

Broader source: Energy.gov (indexed) [DOE]

security-cases Office of Hearings and Appeals 1000 security-cases Office of Hearings and Appeals 1000 Independence Ave., SW Washington, DC, 20585 202-287-1566 en PSH-13-0103 - In the Matter of Personnel Security http://energy.gov/oha/downloads/psh-13-0103-matter-personnel-security security" class="title-link">PSH-13-0103 - In the Matter of Personnel Security

318

Infrastructure Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security and prosperity...

319

GRID Security Review  

Science Journals Connector (OSTI)

A Computational GRID is a collection of heterogeneous computing resources ... computational power of current micro-processors, Computational GRIDs or meta-systems have gradually become more ... a secure environme...

Lazaros Gymnopoulos; Stelios Dritsas; Stefanos Gritzalis

2003-01-01T23:59:59.000Z

320

Environment/Health/Safety/Security (EHSS): Security & Emergency Services:  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security & Emergency Services Security & Emergency Services Security Update ID Cards Gate Procedures Visitor/Guest Access Bus/Shuttle Reporting Foreign Contacts Mail Handling Contacts Cyber Protection Website ISSM Website ISSM: Counterintelligence and Counterterrorism Emergency Services Website Security and Emergency Operations Website Security Update THREAT ASSESSMENT: January 9, 2004-- The Department of Energy has directed all DOE sites to lower their security status to Secon Level 3, to coincide with the Department of Homeland Security advisory system. Security measures as listed below are in place. If you have any questions, call Dan Lunsford at x6016. ID Cards: Every employee must have a valid LBNL proximity badge and either wear it or produce it upon request. Badges and clips are available in the Site Access

Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Cyber Security | National Security | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

National Security Home | Science & Discovery | National Security | Initiatives | Cyber Security SHARE Cyber Security Through Science A Science-Based Approach image ORNL uses a science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant, 'game-changing' transformation requires a science-based approach that combines fundamental understanding with experimentation, theory, and modeling. The most successful scientific programs use peer review to maximize intellectual capital and prioritize research needs. The Department of Energy has applied this approach through programs such as the Scientific Discovery through Advanced Computing (SciDAC) and ASCI,

322

Secure Data Center (Fact Sheet)  

SciTech Connect (OSTI)

This fact sheet describes the purpose, lab specifications, applications scenarios, and information on how to partner with NREL's Secure Data Center at the Energy Systems Integration Facility.

Not Available

2012-08-01T23:59:59.000Z

323

Leveraging Formal Methods and Fuzzing to Verify Security and Reliability Properties of Large-Scale High-Consequence Systems.  

SciTech Connect (OSTI)

Formal methods describe a class of system analysis techniques that seek to prove specific propertiesabout analyzed designs, or locate flaws compromising those properties. As an analysis capability,these techniques are the subject of increased interest fromboth internal and external customersof Sandia National Laboratories. Given this lab's other areas of expertise, Sandia is uniquelypositioned to advance the state-of-the-art with respect toseveral research and application areaswithin formal methods. This research project was a one-yeareffort funded by Sandia's CyberSecurity S&T Investment Area in its Laboratory Directed Research&Development program toinvestigate the opportunities for formal methods to impactSandia's present mission areas, morefully understand the needs of the research community in the area of formal methods and whereSandia can contribute, and clarify from those potential research paths those that would best advancethe mission-area interests of Sandia. The accomplishmentsfrom this project reinforce the utilityof formal methods in Sandia, particularly in areas relevantto Cyber Security, and set the stagefor continued Sandia investments to ensure this capabilityis utilized and advanced within thislaboratory to serve the national interest.4

Ruthruff, Joseph; Armstrong, Robert C.; Davis, Benjamin Garry; Mayo, Jackson; Punnoose, Ratish J.

2012-09-01T23:59:59.000Z

324

Future directions for behavioral information security research  

Science Journals Connector (OSTI)

Information Security (InfoSec) research is far reaching and includes many approaches to deal with protecting and mitigating threats to the information assets and technical resources available within computer based systems. Although a predominant weakness ... Keywords: Behavioral information security, Deviant security behavior, Future research, Information security, Research challenges

Robert E. Crossler, Allen C. Johnston, Paul Benjamin Lowry, Qing Hu, Merrill Warkentin, Richard Baskerville

2013-02-01T23:59:59.000Z

325

Safety, Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Safety, Security Safety, Security Safety, Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our work Our commitments We conduct our work safely and responsibly to achieve our mission. We ensure a safe and healthful environment for workers, contractors, visitors, and other on-site personnel. We protect the health, safety, and welfare of the general public. We do not compromise safety for personal, programmatic, or

326

Lab announces security changes  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security...

327

Lemnos Interoperable Security Program  

SciTech Connect (OSTI)

The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or ?? tunnels?, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

2012-01-31T23:59:59.000Z

328

Security Specialist  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve as a Security Specialist with responsibility as the performance monitor for protective force operations conducts line management oversight of the...

329

Global Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

nonpartisan organization with a mission to strengthen global security by reducing the risk of use and preventing the spread of nuclear, biological, and chemical weapons and to...

330

Global security  

SciTech Connect (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-14T23:59:59.000Z

331

Cyber Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyber Security Previous cybersecurity evaluations and designs were often dependent upon personal experience and limited empirical evidence. An LDRD project focused on cybersecurity...

332

Global security  

ScienceCinema (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-15T23:59:59.000Z

333

Infrastructure Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

to enhance the nation's security and prosperity through sustainable, transformative approaches to our most challenging energy, climate, and infrastructure problems. vision...

334

Transportation Security  

Broader source: Energy.gov (indexed) [DOE]

Preliminary Draft - For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work...

335

A GHS-Based Intelligent Management Platform with IP-Camera Security System  

Science Journals Connector (OSTI)

We have described an e-platform, with an IP camera for managing toxic and hazardous chemicals within an organization. The system allows: ... system (GHS) of classification and labeling of chemicals and printout t...

Kuo Yuan Hwa; Ming-Chuan Wu; Sang-Soo Yeo; Wenlung Li

2011-01-01T23:59:59.000Z

336

THE UNIVERSITY OF TEXAS AT DALLAS INFORMATION SECURITY  

E-Print Network [OSTI]

. Instead, these requirements should be integrated into a comprehensive system security plan. II. Scope

O'Toole, Alice J.

337

Amy Ross  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Kristen Honig Michael Torrez Monika Bittman Phil & Monica Noll Ron Barber Sheila Armstrong Related Articles All Stories Elena Giorgi Elena Giorgi-Murder mysteries with a twist...

338

Quantum-secured imaging  

E-Print Network [OSTI]

We have built an imaging system that uses a photon's position or time-of-flight information to image an object, while using the photon's polarization for security. This ability allows us to obtain an image which is secure against an attack in which the object being imaged intercepts and resends the imaging photons with modified information. Popularly known as "jamming," this type of attack is commonly directed at active imaging systems such as radar. In order to jam our imaging system, the object must disturb the delicate quantum state of the imaging photons, thus introducing statistical errors that reveal its activity.

Mehul Malik; Omar S. Magaa-Loaiza; Robert W. Boyd

2012-12-11T23:59:59.000Z

339

INL Cyber Security Research (2008) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

INL Cyber Security Research (2008) INL Cyber Security Research (2008) Cybersecurity research at INL will help protect critical infrastructure control system computers against worms...

340

Security Application of Failure Mode and Effect Analysis (FMEA)  

Science Journals Connector (OSTI)

Increasingly complex systems lead to an interweaving of security, safety, availability and reliability concerns. Most dependability analysis techniques do not include security aspects. In order to include securit...

Christoph Schmittner; Thomas Gruber

2014-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Report of the Cyber Security Research Needs for Open Science...  

Energy Savers [EERE]

Report of the Cyber Security Research Needs for Open Science Workshop Report of the Cyber Security Research Needs for Open Science Workshop Protecting systems and users, while...

342

Cyber-security analysis in smart grid SCADA systems: A game theoretic approach.  

E-Print Network [OSTI]

??Power grid systems deliver electricity from suppliers that generate the power to be transmitted through grids of interconnected networks and distributed to customers. Smart grids (more)

Rudrapattana, Sudeeptha Ranganath 1989-

2013-01-01T23:59:59.000Z

343

defense nuclear security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

nuclear security | National Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response...

344

nuclear security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

security | National Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

345

A Virtual Environment for Interactive Visualization of Power System Economic and Security Information  

E-Print Network [OSTI]

. In contrast, the purpose of the work presented here is to use a VE to interactively visualize more abstract of Illinois at Urbana-Champaign Urbana, IL 61801 USA Abstract Simulation and analysis of power systems often power system data. Thus this work is more akin to scientific visualization. An overview of using VEs

346

Chapter_11_Incidents_of_Security_Concern  

Broader source: Energy.gov (indexed) [DOE]

1 1 Incidents of Security Concern This chapter covers the DOE HQ implementation of DOE Order 470.4B, Safeguards and Security Program, Attachment 5, Incidents of Security Concern. HS-91 manages the HQ Security Incidents Program. Incidents of Security Concern (henceforth referred to as Incidents) are actions, inactions, or events that are believed to: * Pose threats to national security interests and/or DOE assets * Create potentially serious or dangerous security situations * Significantly affect the safeguards and security program's capability to protect DOE safeguards and security interests * Indicate failure to adhere to security procedures * Reveal that the system is not functioning properly, by identifying and/or mitigating potential threats (e.g., detecting suspicious activity, hostile acts, etc.).

347

Border Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Border Security Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL), which is an indoor/outdoor facility designed to support testing and evaluation of a wide range of intrusion detection, assessment, surveillance, and peripheral physical security equipment including sensors, cameras, power generation, access control, remote communication, unmanned aerial, and activated delay systems. At the heart of SSFL is a simulated border region of varied terrain including open grassy fields, hilly wooded areas, sand pits, and lakes and streams which approximate the actual challenges of border and facility applications. A critical facet of this facility is the ability to test systems year-round under the seasonal

348

ENERGY SECURITY  

Broader source: Energy.gov (indexed) [DOE]

national strategy for national strategy for ENERGY SECURITY recommendations to the nation on reducing u.s. oil dependence september 2008 a project of a project of a national strategy for energy security Recommendations to the Nation on Reducing U.S. Oil Dependence september 2008 Table of Contents 2 Energy Security Leadership Council 3 Statement of Purpose 4 Letter to the President, the Congress, and the American People 7 Outline of Main Body of Report 13 Introduction 21 Policy Recommendations: Summary 33 Part I · Diversify Energy Supplies for the Transportation Sector

349

Evaluation of a probabilistic model for bulk-power system security  

E-Print Network [OSTI]

-gower system. By use of this program with appropriate modifications the probabilistic model for any bulk-power system may be evaluated. Management and operator criteria may be derived so that the costs associated with the risk are now deterministic. 32..."UCE Nay 'f970 Major Subjeot: Statistics EVALUATION OF A PROBABILISZIC NGDEL FOR BULK-POWER SYSTEM'4 SE"URITY A Thesis by WILLIAM ALOYS SCMIDT Approved as to style and content by: Chairma of teej 7Head of Department) 7 Lember) Nay tc70 ABSTRACT...

Schmidt, William Aloys

1970-01-01T23:59:59.000Z

350

Security analysis of the interaction between the UK gas and electricity transmission systems  

E-Print Network [OSTI]

Natural gas has become the UKs foremost primary energy source, providing some 39% of our energy needs. The National Transmission System (NTS) has developed from its humble beginnings when natural gas was first discovered ...

Whiteford, James Raymond George

2012-06-25T23:59:59.000Z

351

Implementation and Security Analysis of the Infranet Anti-Censorship System  

E-Print Network [OSTI]

in popularity, so have efforts to control and monitor its use. Countries such as China [46] and Saudi Arabia [25 other anti-censorship system in that it surreptitiously embeds requests and responses for sensitive

352

Implementation and Security Analysis of the Infranet AntiCensorship System  

E-Print Network [OSTI]

has grown in popularity, so have e#orts to control and monitor its use. Countries such as China [46#ers from other anti­censorship system in that it surreptitiously embeds requests and responses

353

Analyzing risk and uncertainty for improving water distribution system security from malevolent water supply contamination events  

E-Print Network [OSTI]

pipe network, valve installation, and an emergency purging system. Findings show that reasonable uncertainties in model inputs produce high variability in exposure levels. It is also shown that exposure level distributions experience noticeable...

Torres, Jacob Manuel

2009-05-15T23:59:59.000Z

354

Transportation Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

355

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

2005-08-26T23:59:59.000Z

356

Security Rulemaking  

Broader source: Energy.gov (indexed) [DOE]

2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM 2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM Knoxville, TN - May 16, 2012 2 NRC Actions Since September 11, 2001 * Interim solution - enhance existing regulations through Security Orders * Objectives of the Orders are enhanced control of material to - Prevent unauthorized access - Prevent malevolent use of material - Mitigate consequences * Orders were issued to NRC licensees that transport: - Spent Nuclear Fuel - IAEA Code of Conduct Category 1 and 2 quantities of radioactive material Security Rulemakings 3 NRC Ongoing Activities * Orders are an interim measure * Long-term approach is to enhance transport security through public rulemaking * Rulemaking process in progress for - SNF Transportation Security - Physical Protection of Category 1 and 2 material (both fixed

357

Model checking grid security  

Science Journals Connector (OSTI)

Grid computing is one of the leading forms of high performance computing. Security in the grid environment is a challenging issue that can be characterized as a complex system involving many subtleties that may lead designers into error. This is similar to what happens with security protocols where automatic verification techniques (specially model checking) have been proved to be very useful at design time. This paper proposes a formal verification methodology based on model checking that can be applied to host security verification for grid systems. The proposed methodology must take into account that a grid system can be described as a parameterized model, and security requirements can be described as hyperproperties. Unfortunately, both parameterized model checking and hyperproperty verification are, in general, undecidable. However, it has been proved that this problem becomes decidable when jobs have some regularities in their organization. Therefore, this paper presents a verification methodology that reduces a given grid system model to a model to which it is possible to apply a cutoff theorem (i.e., a requirement is satisfied by a system with an arbitrary number of jobs if and only if it is satisfied by a system with a finite number of jobs up to a cutoff size). This methodology is supported by a set of theorems, whose proofs are presented in this paper. The methodology is explained by means of a case study: the Condor system.

F. Pagliarecci; L. Spalazzi; F. Spegni

2013-01-01T23:59:59.000Z

358

High fidelity nuclear energy system optimization towards an environmentally benign, sustainable, and secure energy source.  

SciTech Connect (OSTI)

The impact associated with energy generation and utilization is immeasurable due to the immense, widespread, and myriad effects it has on the world and its inhabitants. The polar extremes are demonstrated on the one hand, by the high quality of life enjoyed by individuals with access to abundant reliable energy sources, and on the other hand by the global-scale environmental degradation attributed to the affects of energy production and use. Thus, nations strive to increase their energy generation, but are faced with the challenge of doing so with a minimal impact on the environment and in a manner that is self-reliant. Consequently, a revival of interest in nuclear energy has followed, with much focus placed on technologies for transmuting nuclear spent fuel. The performed research investigates nuclear energy systems that optimize the destruction of nuclear waste. In the context of this effort, nuclear energy system is defined as a configuration of nuclear reactors and corresponding fuel cycle components. The proposed system has unique characteristics that set it apart from other systems. Most notably the dedicated High-Energy External Source Transmuter (HEST), which is envisioned as an advanced incinerator used in combination with thermal reactors. The system is configured for examining environmentally benign fuel cycle options by focusing on minimization or elimination of high level waste inventories. Detailed high-fidelity exact-geometry models were developed for representative reactor configurations. They were used in preliminary calculations with Monte Carlo N-Particle eXtented (MCNPX) and Standardized Computer Analysis for Licensing Evaluation (SCALE) code systems. The reactor models have been benchmarked against existing experimental data and design data. Simulink{reg_sign}, an extension of MATLAB{reg_sign}, is envisioned as the interface environment for constructing the nuclear energy system model by linking the individual reactor and fuel component sub-models for overall analysis of the system. It also provides control over key user input parameters and the ability to effectively consolidate vital output results for uncertainty/sensitivity analysis and optimization procedures. The preliminary analysis has shown promising advanced fuel cycle scenarios that include Pressure Water Reactors Pressurized Water Reactors (PWRs), Very High Temperature Reactors (VHTRs) and dedicated HEST waste incineration facilities. If deployed, these scenarios may substantially reduce nuclear waste inventories approaching environmentally benign nuclear energy system characteristics. Additionally, a spent fuel database of the isotopic compositions for multiple design and control parameters has been created for the VHTR-HEST input fuel streams. Computational approaches, analysis metrics, and benchmark strategies have been established for future detailed studies.

Tsvetkov, Pavel Valeryevich (Texas A& M University, College Station, TX); Rodriguez, Salvador B.; Ames, David E., II (Texas A& M University, College Station, TX); Rochau, Gary Eugene

2009-09-01T23:59:59.000Z

359

Solar heating system at Security State Bank, Starkville, Mississippi. Final report  

SciTech Connect (OSTI)

Information is provided on the Solar Energy Heating System (airtype) installed at the branch bank building, northwest corner of Highway 12 and Spring Street, Starkville, Mississippi. This installation was completed in June, 1979. The 312 square feet of Solaron flat plate air collectors provide for 788 square feet of space heating, an estimated 55 percent of the heating load. Solar heated air is distributed to the 96 cubic foot steel cylinder, which contains two inch diameter rocks. An air handler unit moves the air over the collector and into the steel cylinder. Four motorized dampers and two gravity dampers are also part of the system. A Solaron controller which has sensors located at the collectors, rock storage, and at the return air, automatically controls the system. Auxiliary heating energy is provided by electric resistance duct heaters. This project is part of the US Department of Energy's Solar Demonstration Program with the government sharing $14,201 of the $17,498 solar energy system installation cost. This system was acceptance tested February, 1980, and the demonstration period ends in 1985.

None

1980-08-01T23:59:59.000Z

360

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Secure and efficient high-performance PROOF-based cluster system for high-energy physics  

Science Journals Connector (OSTI)

The particle detectors at the LHC produced about 25 PB data in a year, and the total size of data recorded on tape media at the CERN data center reached almost 100 PB in 2013. In order to preserve such a large-scale data safely and process them fast ... Keywords: Cluster system, High-energy physics, Large hadron collider, PROOF

Sang Un Ahn, Il Yeon Yeo, Sang Oh Park

2014-10-01T23:59:59.000Z

362

Database Security Issues for RealTime Electronic Commerce Systems Sang H. Son  

E-Print Network [OSTI]

Science University of Virginia Charlottesville, VA 22903, USA son@virginia.edu Abstract Data management and transaction processing are essential in supporting advanced time­critical appli­ cations. In many for advanced data management functionalities in real­ time systems poses intellectual and engineering

Son, Sang H.

363

Safety and Security Enforcement Program  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Enforcement Enforcement Enforcement Home Worker Safety and Health Enforcement Office of Nuclear Safety Enforcement Security Enforcement Notices of Violation Consent Orders / Settlement Agreements Compliance Orders Special Report Orders Enforcement Letters Regulatory Assistance Reviews Enforcement Program and Process Guidance and Information Non-Compliance Tracking System (NTS) Non-Compliance Reporting Thresholds Regulations and Directives Enforcement Staff Enforcement Coordinator Contact Information 2013 DOE Safety and Security Enforcement Workshop Request for Investigation or Inspection of Safety or Security Violations Archived Documents HSS Logo Safety and Security Enforcement Program Office of Enforcement and Oversight What's New: » Worker Safety and Health Enforcement Preliminary Notice of Violation issued to Brookhaven Science Associates, LLC

364

CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control  

Broader source: Energy.gov (indexed) [DOE]

CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain GAO is making recommendations to the Department of Homeland Security (DHS) to develop a strategy for coordinating control systems security efforts and to enhance information sharing with relevant stakeholders. DHS officials did not agree or disagree with GAO's recommendations, but stated that they would take them under advisement. CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain More Documents & Publications GAO Challenges and Efforts to Secure Control Systems (March 2004)

365

Investigations of Possible Low-Level Temperature and Moisture Anomalies During the AMIE Field Campaign on Manus Island  

SciTech Connect (OSTI)

This document discusses results stemming from the investigation of near-surface temperature and moisture oddities that were brought to light as part of the Atmospheric Radiation Measurement (ARM) Madden-Julian Oscillation (MJO) Investigation Experiment (AMIE), Dynamics of the Madden-Julian Oscillation (DYNAMO), and Cooperative Indian Ocean experiment on intraseasonal variability in the Year 2011 (CINDY2011) campaigns.

Long, CN; Holdridge, DJ

2012-11-19T23:59:59.000Z

366

Tropical birds have a slow pace of life Popko Wiersma, Agust Muoz-Garcia, Amy Walker, and Joseph B. Williams  

E-Print Network [OSTI]

Tropical birds have a slow pace of life Popko Wiersma, Agustí Muñoz-Garcia, Amy Walker, and Joseph.pnas.org/misc/reprints.shtml To order reprints, see: Notes: #12;Tropical birds have a slow pace of life Popko Wiersma, Agusti´ Mun~ oz

Williams, Jos. B.

367

Effect of Transport Time, Temperature, and Concentration on the Survival of Group B Streptococci in Amies Transport Medium  

Science Journals Connector (OSTI)

...sterile Dacron swabs (Fisher Scientific, Pittsburgh, Pa.) and placed in separate Amies transport tubes (MML Diagnostics, Troutdale, Oreg.) Four swabs of each inoculum of GBS were stored at 3, 24, and 30C for up to 8 days. At days 2, 4, 6, and 8...

K. A. Stoner; L. K. Rabe; S. L. Hillier

2004-11-01T23:59:59.000Z

368

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

2009-01-08T23:59:59.000Z

369

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

2009-01-08T23:59:59.000Z

370

Secure Military Social Networking and Rapid Sensemaking in Domain Specific Concept Systems: Research Issues and Future Solutions  

E-Print Network [OSTI]

This paper identifies the need for a secure military social networking site and the underlying research issues linked to the successful development of such sites. The paper further proposes a solution to the most basic ...

Garside, Debbie

371

Tag: security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

security security Tag: security Displaying 1 - 5 of 5... Category: Security Security Y-12 places the highest priority on maintaining and improving its security posture. More... Category: News Johnson shares perspective on security Rod Johnson, B&W Y-12 deputy general manager of Security, recently discussed the security atmosphere since his arrival last August and what he sees as Y-12's security future. More... Category: News Y-12 to Install New Fence to Reduce Trespassing The National Nuclear Security Administration today announced plans to extend the boundary fence at the Y-12 National Security Complex along Scarboro Road. The new fence is expected to be in place by April 4. More... Category: News New institute promotes nuclear security Y-12 is partnering with the University of Tennessee and others to provide

372

Energy Security Council  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Security Council Energy Security Council Reliable, secure, sustainable carbon energy solutions for the nation. Contact Albert Migliori (505) 663-5627 Email David Watkins...

373

System for training and evaluation of security personnel in use of firearms  

DOE Patents [OSTI]

An interactive video display system comprising a laser disc player with a remote large-screen projector to view life-size video scenarios and a control computer. A video disc has at least one basic scenario and one or more branches of the basic scenario with one or more subbranches from any one or more of the branches and further subbranches, if desired, to any level of programming desired. The control computer is programmed for interactive control of the branching, and control of other effects that enhance the scenario, in response to detection of when the trainee has (1) drawn an infrared laser handgun from his holster, (2) fired his laser handgun, (3) taken cover, (4) advanced or retreated from the adversary on the screen, and (5) when the adversary has fired his gun at the trainee.

Hall, Howard F. (Albuquerque, NM)

1990-01-01T23:59:59.000Z

374

Transportation Security  

Broader source: Energy.gov (indexed) [DOE]

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8/2/06, Product #16, stated: "Develop an annotated bibliography of publicly-available documents related to security of radioactive material transportation." * Earlier this year, a preliminary draft annotated bibliography on this topic was developed by T-REX , UNM, to initially address this STG Work Plan Task. Preliminary Draft - For Review Only 3 Considerations in Determining Release of Information * Some "Publicly-available" documents could potentially contain inappropriate information according to standards set by DOE information security policy and DOE Guides. - Such documents would not be freely

375

Message Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Message Message Security Services Overview ECS Audio/Video Conferencing Fasterdata IPv6 Network Network Performance Tools (perfSONAR) ESnet OID Registry PGP Key Service Virtual Circuits (OSCARS) OSCARS Case Study Documentation User Manual FAQ Design Specifications Functional Specifications Notifications Publications Authorization Policy Default Attributes Message Security Clients For Developers Interfaces Links Hardware Requirements DOE Grids Service Transition Contact Us Technical Assistance: 1 800-33-ESnet (Inside the US) 1 800-333-7638 (Inside the US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net Message Security Overview The OSCARS Web pages and Web Services are run within a Tomcat container which uses SSL connections to encrypt all messages. The OSCARS Web Service

376

226 Int. J. Security and Networks, Vol. 6, No. 4, 2011 Friendship-based location privacy in Mobile Social  

E-Print Network [OSTI]

(802.11, vehicular, RFID), cloud computing security, and security for mobile health (mHealth) systems

Wu, Jie

377

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

2007-06-29T23:59:59.000Z

378

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

2005-08-26T23:59:59.000Z

379

Technology Evaluation for the Big Spring Water Treatment System at the Y-12 National Security Complex, Oak Ridge, Tennessee  

SciTech Connect (OSTI)

The Y-12 National Security Complex (Y-12 Complex) is an active manufacturing and developmental engineering facility that is located on the U.S. Department of Energy (DOE) Oak Ridge Reservation. Building 9201-2 was one of the first process buildings constructed at the Y-12 Complex. Construction involved relocating and straightening of the Upper East Fork Poplar Creek (UEFPC) channel, adding large quantities of fill material to level areas along the creek, and pumping of concrete into sinkholes and solution cavities present within the limestone bedrock. Flow from a large natural spring designated as ''Big Spring'' on the original 1943 Stone & Webster Building 9201-2 Field Sketch FS6003 was captured and directed to UEFPC through a drainpipe designated Outfall 51. The building was used from 1953 to 1955 for pilot plant operations for an industrial process that involved the use of large quantities of elemental mercury. Past operations at the Y-12 Complex led to the release of mercury to the environment. Significant environmental media at the site were contaminated by accidental releases of mercury from the building process facilities piping and sumps associated with Y-12 Complex mercury handling facilities. Releases to the soil surrounding the buildings have resulted in significant levels of mercury in these areas of contamination, which is ultimately transported to UEFPC, its streambed, and off-site. Bechtel Jacobs Company LLC (BJC) is the DOE-Oak Ridge Operations prime contractor responsible for conducting environmental restoration activities at the Y-12 Complex. In order to mitigate the mercury being released to UEFPC, the Big Spring Water Treatment System will be designed and constructed as a Comprehensive Environmental Response, Compensation, and Liability Act action. This facility will treat the combined flow from Big Spring feeding Outfall 51 and the inflow now being processed at the East End Mercury Treatment System (EEMTS). Both discharge to UEFPC adjacent to Bldg. 9201-2. The EEMTS treats mercury-contaminated groundwater that collects in sumps in the basement of Bldg. 9201-2. A pre-design study was performed to investigate the applicability of various treatment technologies for reducing mercury discharges at Outfall 51 in support of the design of the Big Spring Water Treatment System. This document evaluates the results of the pre-design study for selection of the mercury removal technology for the treatment system.

Becthel Jacobs Company LLC

2002-11-01T23:59:59.000Z

380

1. Final Title SECURITY of MOBILE COMMUNICATIONS  

E-Print Network [OSTI]

limitations; c) the user requirements; d) the contents of provided services; and e) the evolution of hacking of security attacks and hacking techniques; 3) discussing security policies and security practices to help for hacking systems via mobile communications. Threats and risk analysis are discussed in this part, along

Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Department of Energy Cyber Security Management Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The purpose of the Department of Energy (DOE) Cyber Security Management Program (hereafter called the Program) is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE N 205.1

2003-03-21T23:59:59.000Z

382

Department of Energy Cyber Security Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The purpose of the DOE Cyber Security Management Program is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE O 205.1. Canceled by DOE O 205.1B.

2006-12-04T23:59:59.000Z

383

Utility Power Network Systems This research addresses the issues of security, system behavior, and socio-economic  

E-Print Network [OSTI]

scenarios, are considered involving 500kV transmission lines being disabled between Washington State to the LADWP power system through two 500kV AC transmission lines and one 500kV DC transmission line. From Fig, the disabled transmission line at the border of Washington State and Oregon State is directly connected

Shinozuka, Masanobu

384

SECURITY HANDBOOK 2 UH IT SECURITY HANDBOOK  

E-Print Network [OSTI]

Administration · 2-Factor Authentication Administration for PCI compliance · Web Site Security Scanning, please contact security@uh.edu. · Web Site Security Scanning · 2-Factor Authentication Administration

Azevedo, Ricardo

385

Tag: Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Search Tags Tag: Security Tag: Security Displaying 1 - 6 of 6... Category: Security Sheltering in Place If you are advised to shelter-in-place by local news or our website,...

386

Energy Security Initiatives Update  

Broader source: Energy.gov (indexed) [DOE]

Make Energy A Consideration in All We DoTM Make Energy A Consideration in All We DoTM ENERGY SECURITY INITIATIVES UPDATE Ms Karen White AFFEC On behalf of Mr Mike Aimone 1 Make Energy A Consideration in All We DoTM 2 Energy Security Initiatives AFCESA ETL 09-10 -- Aurora Electrical System Vulnerability Assessment and Mitigation Actions FUPWG-EEI CA Net Zero Energy Initiative (Vandenberg AFB, CA) Energy Security Tiger Team Visit (Ft Bliss, TX) National Renewable Energy Lab (NREL) Net Zero Pilot at Marine Corps Air Station Miramar and Naval Base Ventura County (San Nicolas Island) Smart Grid Initiatives: Maxwell AFB AL, Army BAAs (3 each); Naval Base Ventura County (San Nicholas Island) National Defense University sponsored Electric Grid War Game (Jul) Task Force on Grid Vulnerability (Gaps/Seams in S&T ) initiative (Joint

387

Well Logging Security Initiatives | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

by this browser. Download video Captions: On Watch as GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the...

388

Security rethink  

Science Journals Connector (OSTI)

......breaches or heightening the risks. One of my clients...business to the socio-political situation of particular...based on the return on investment in keeping a high standard...times that security risks are at their highest...lay-offs. The return on investment must consider the positive......

Michael Chua

2002-09-01T23:59:59.000Z

389

Security Conditions  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

2000-09-18T23:59:59.000Z

390

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

391

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

NMMSS Information, Reports & Forms Security Forms Security Forms U.S. Department of Energy U.S. Nuclear Regulatory Commission Nuclear Materials Management & Safeguards...

392

Nonproliferation and National Security Program - Nuclear Engineering  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Major Programs > Nonproliferation and Major Programs > Nonproliferation and National Security Program Nonproliferation & National Security (NPNS) Overview Technical Nonproliferation Policy Support Strategic Trade Control Review of export license applications Multilateral Export Control Arrangements Interdiction Engagement & Training INECP INSEP GIPP Safeguards Concepts and Approaches Human Capital Development Additional Protocol Technical Assistance National Security Systems & Assessments National Security Information Systems Vulnerability Assessment Team (VAT) Radiation Detection & Response (RDR) Contact NPNS Other Major Programs Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE Division on Flickr Nonproliferation and National Security Program (NPNS)

393

Headquarters Personnel Security Operations | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Headquarters Personnel Security Operations Headquarters Personnel Security Operations Headquarters Personnel Security Operations Mission and Functions Mission Provide a comprehensive Personnel Security Program for the DOE Headquarters complex. Ensure that DOE classified information, materials, buildings and information systems are safeguarded from compromise by only granting security clearances and building access to trustworthy individuals. This is accomplished through conscientious, just, and thoughtful application of Federal rules and statutes with the goal of ensuring that only individuals whose character, associations, and loyalty do not endanger the common defense are granted access to DOE classified information, materials, buildings and information systems. Functions The primary function of the Office of Headquarters Personnel

394

security | OpenEI Community  

Open Energy Info (EERE)

the grid? black out brown out bulk power system electricity grid future grid grid history security Smart Grid transmission We all rely on it but what do you really know about our...

395

Cloud Service Security Requirements Questionnaire ...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Contingency Plan? If so, please provide evidence 8. Do you have a current System Security Plan (NIST 800-53 or FEDRAMP)? If so, please provide evidence. 9. If you will be...

396

Framework for SCADA Security Policy (October 2005) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Framework for SCADA Security Policy (October 2005) Framework for SCADA Security Policy (October 2005) Framework for SCADA Security Policy (October 2005) Modern automation systems used in infrastruc-ture (including Supervisory Control and Data Acquisition, or SCADA) have myriad security vulnerabilities. Many of these relate directly to inadequate security administration, which precludes truly effective and sustainable security. Adequate security management mandates a clear administrative struc-ture and enforcement hierarchy. The security policy is the root document, with sections covering purpose, scope, posi-tions, responsibilities, references, revision history, enforce-ment, and exceptions for various subjects relevant for system security. It covers topics including the overall security risk management program, data security, platforms,

397

Molecular cloning of alpha-amylase genes fromDrosophila melanogaster. III. An inversion at theAmy locus in an amylase-null strain  

Science Journals Connector (OSTI)

Overlapping clones of the structural gene region for alpha-amylase,Amy..., were isolated from a lambda EMBL4 library containing genomic DNA fragments from an amylase-null strain ofDrosophila melanogaster. Souther...

Phillip E. Schwartz; Winifred W. Doane

1989-02-01T23:59:59.000Z

398

Security seal  

DOE Patents [OSTI]

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, Garth W. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

399

Nonproliferation & International Security | National Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

400

Nonproliferation & International Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Audit Report National Nuclear Security Administration Nuclear...  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration Nuclear Weapons Systems Configuration Management DOEIG-0902 March 2014 U.S. Department of Energy Office of Inspector General Office of...

402

Enterprise Information Security Management Framework [EISMF  

E-Print Network [OSTI]

There are several technological solutions available in the market to help organizations with information security breach detection and prevention such as intrusion detection and prevention systems, antivirus software, ...

Sharma, Dhirendra, S.M. Massachusetts Institute of Technology

2011-01-01T23:59:59.000Z

403

Sandia National Laboratories: National Security Missions: Internationa...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

biological and explosives Create tools to support emergency management training Conduct large-scale operations research and systems analysis for border security Conduct...

404

2014 Headquarters Facilities Master Security Plan- Chapter 14, Cyber Security  

Broader source: Energy.gov [DOE]

2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security Describes the DOE Headquarters Cyber Security Program.

405

A Two-Constraint Approach to Risky CyberSecurity  

E-Print Network [OSTI]

A Two-Constraint Approach to Risky CyberSecurity Experiment Management John Wroclawski, Jelena Mirkovic, Ted Faber, Stephen Schwab #12;Risky CyberSecurity Research CyberSecurity systems becoming more;Domains of interest Traditional risky experiment Virus dissection Modern risky CyberSecurity

Faber, Ted

406

Implementing an Improved Security for XYZ's Database and Telecommuters  

E-Print Network [OSTI]

& Integrity of XYZs Database............17 Developing a Database Security Plan ...............................18 Implementing the Improved Security... can occur. Developing a Database Security Plan XYZ has installed several audit trail devices into their working database system. Some of these devices are Top Secret and CA-Unicenter or other Windows security tools. These tools are able...

Ali, Mohamed M.

2011-05-20T23:59:59.000Z

407

AP1000 Design for Security  

SciTech Connect (OSTI)

Nuclear power plants are protected from potential security threats through a combination of robust structures around the primary system and other vital equipment, security systems and equipment, and defensive strategy. The overall objective for nuclear power plant security is to protect public health and safety by ensuring that attacks or sabotage do not challenge the ability to safely shutdown the plant or protect from radiological releases. In addition, plants have systems, features and operational strategies to cope with external conditions, such as loss of offsite power, which could be created as part of an attack. Westinghouse considered potential security threats during design of the AP1000 PWR. The differences in plant configuration, safety system design, and safe shutdown equipment between existing plants and AP1000 affect potential vulnerabilities. This paper provides an evaluation of AP1000 with respect to vulnerabilities to security threats. The AP1000 design differs from the design of operating PWRs in the US in the configuration and the functional requirements for safety systems. These differences are intentional departures from conventional PWR designs which simplify plant design and enhance overall safety. The differences between the AP1000 PWR and conventional PWRs can impact vulnerabilities to security threats. The NRC addressed security concerns as part of their reviews for AP1000 Design Certification, and did not identify any security issues of concern. However, much of the detailed security design information for the AP1000 was deferred to the combined Construction and Operating License (COL) phase as many of the security issues are site-specific. Therefore, NRC review of security issues related to the AP1000 is not necessarily complete. Further, since the AP1000 plant design differs from existing PWRs, it is not obvious that the analyses and assessments prepared for existing plants also apply to the AP1000. We conclude that, overall, the AP1000 is less vulnerable to security threats such as malevolent use of vehicles (land, water or air), than are conventional PWRs. Further, the AP1000 is less vulnerable to external events (e.g., loss of transmission) than conventional PWRs. For some of the threats evaluated the AP1000 is comparable to conventional PWRs, while for other threats the AP1000 is inherently less vulnerable. (authors)

Long, L.B. [Southern Nuclear Operating Company, 40 Inverness Center Parkway, Birmingham, AL 35242 (United States); Cummins, W.E.; Winters, J.W. [Westinghouse Electric Company, 4350 Northern Pike, Monroeville, PA 15146 (United States)

2006-07-01T23:59:59.000Z

408

Transportation Security | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Transportation Security Transportation Security Transportation Security More Documents & Publications Overview for Newcomers West Valley Demonstration Project Low-Level Waste...

409

Safeguards and security concept for the Secure Automated Fabrication (SAF) and Liquid Metal Reactor (LMR) fuel cycle, SAF line technical support  

SciTech Connect (OSTI)

This report is a safeguards and security concept system review for the secure automated fabrication (SAF) and national liquid metal reactor (LMR) fuel programs.

Schaubert, V.J.; Remley, M.E.; Grantham, L.F.

1986-02-21T23:59:59.000Z

410

Using Agents to Secure the Internet Marketplace Reactive Security and Social Control  

E-Print Network [OSTI]

Using Agents to Secure the Internet Marketplace Reactive Security and Social Control Lars Rasmusson present the idea to let agents handle security issues in Internet markets. The motivation for this is the difficulties in having external or centralized control over a system as open as the Internet. The agents use

411

Nuclear Forensics | National Security | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Initiatives Initiatives Cyber Security Nuclear Forensics Bioinformatics National Security Home | Science & Discovery | National Security | Initiatives | Nuclear Forensics SHARE Nuclear Forensics image Tools, techniques, and expertise in nuclear fuel cycle research gained over seven decades help ORNL scientists control and track nuclear bomb-grade materials to be sure they don't fall into the wrong hands. Among the leading-edge technologies used by researchers are high-resolution techniques that allow analysis of radiation detector data in stunning detail. Researchers are also developing aerosol sampling systems to collect airborne particulates and instantly send an alert if radiation is detected. For more information, please contact: nuclearforensicsinitiative

412

International | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

International | National Nuclear Security Administration International | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog International Home > About Us > Our Programs > Nuclear Security > Nuclear Materials Management & Safeguards System > International International U.S. Department of Energy / U.S. Nuclear Regulatory Commission

413

Border Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

414

Information Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information Security | National Nuclear Security Administration Information Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Information Security Home > About Us > Our Programs > Nuclear Security > Information Security Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by

415

Security for grids  

SciTech Connect (OSTI)

Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

2005-08-14T23:59:59.000Z

416

Integrated Safeguards and Security Management (ISSM) Policy  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The purpose of this Policy is to formalize an Integrated Safeguards and Security Management (ISSM) framework. Safeguards and security management systems provide a formal, organized process for planning, performing, assessing, and improving the secure conduct of work in accordance with risk-based protection strategies. These systems are institutionalized through Department of Energy (DOE) directives and contracts. Does not cancel other directives. Canceled by DOE P 470.1A.

2001-05-08T23:59:59.000Z

417

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

2009-01-08T23:59:59.000Z

418

Cyber Security Audit and Attack Detection Toolkit: Bandolier and  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security Audit and Attack Detection Toolkit: Bandolier and Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems. By building configuration audit and attack detection capabilities into tools already used by the energy sector, Bandolier and Portaledge offer energy asset owners low-cost and easily integrable control systems security solutions. Energy system operators can optimize the security of their control system configuration using Bandolier Security Audit Files, which assess the current configuration against an optimal security configuration.

419

Protocol, Security Assistance - January 2007 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Protocol, Security Assistance - January 2007 Protocol, Security Assistance - January 2007 Protocol, Security Assistance - January 2007 January 2007 Provide timely technical assistance and system support to Field and HQ Elements to enhance site safeguards and security. The Assistance Program is comprised of technologists and subject matter experts from all the S&S disciplines and technical areas including Program Planning Management and Support, Advanced Security Technologies, Protective Force, Physical Security, Information Protection, Safeguards and Security Construction Projects, Vulnerability Assessments, and Nuclear Materials Control and Accountability. Our commitment is to continue to build an assistance program dedicated to serving the interests of the Department and our customers' S&S programs. Our emphasis remains

420

National Nuclear Security Administration  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration National Nuclear Security Administration Ofice of Secure Transportation mKlK= Box RQMM= ^luquerqueI= kj= UTNUR= ;JAN 03 213 MEMORANDUM FOR GREGORY eK= WOODS GENERAL COUNSEL DEPARTMENT OF ENERGY FROM: SUBJECT: JEFFREY P. HARREL ASSIST ANT DEPU FOR SECURE 2013 ANNUAL PLANNING SUMMARY In response to your memorandum of December TI= 2012, the following information is provided for the National Nuclear Security Administration Ofice of Secure

Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Hallmark Project Commercialization of the Secure SCADA Communications  

Broader source: Energy.gov (indexed) [DOE]

Project Commercialization of the Secure SCADA Project Commercialization of the Secure SCADA Communications Protocol, a cryptographic security solution for device-to-device communication Hallmark Project Commercialization of the Secure SCADA Communications Protocol, a cryptographic security solution for device-to-device communication Increased connectivity and automation in the control systems that manage the nation's energy infrastructure have improved system functionality, but left systems more vulnerable to cyber attack. Intruders could severely disrupt control system operation by sending fabricated information or commands to control system devices. To ensure message integrity, supervisory control and data acquisition (SCADA) systems require a method to validate device-to-device communication and verify that information has

422

Personnel Security Activities  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

2003-03-25T23:59:59.000Z

423

Security | Department of Energy  

Energy Savers [EERE]

Security Security Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top...

424

Security & Privacy | EMSL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security & Privacy Security & Privacy Privacy Notice We collect no personal information about you without your knowledge when you visit this site, although you may choose to...

425

Security, Safety and Health  

Broader source: Energy.gov (indexed) [DOE]

8, Fourth Quarter, 2012 8, Fourth Quarter, 2012 www.fossil.energy.gov/news/energytoday.html HigHligHts inside 2 Security and Sustainability A Column from the FE Director of Health, Security, Safety and Health 4 Training Goes 3-D NETL's AVESTAR Center Deploys New Virtual Training System 5 Secretary Achievement Awards Two FE Teams Earn Secretary of Energy Recognition 7 Vast Energy Resource Identified FE Study Says Billions of Barrels of Oil in Residual Oil Zones 8 Presidential Award NETL-RUA Engineer Earns Highest Government Honor in Science & Engineering This September marked a major mile- stone for one of the Office of Fossil Energy's largest carbon capture, utili- zation and storage projects: the opening

426

Safeguards & Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

427

Technical Services | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Technical Technical Services Technical Services Technical services spans Y-12 disciplines that support manufacturing at Y-12. Information Systems (National Security Systems Development) Provide solutions for information security, including the protection of national security, proprietary and any other class of highly sensitive information. Develop highly integrated, enterprise level software applications for use within the federal space and adaptable to commercial application. Leverage the transformative information technology capabilities of the NNSA to a broad spectrum of federal applications for rapidly deployed, cost effective and reproducible technical solutions. Develop virtual collaborative networks for cluster manufacturing. Develop, test, and implement operational cyber security strategies

428

Cyber Security Guidelines, Information Technology Division, ITD  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

BNL Cyber Security Guidelines BNL Cyber Security Guidelines Appropriate Use Unauthorized and Malicious Access and Actions Blatant Disregard for Laboratory Computer Security Privacy of Electronic Files, and E-MAIL Publishing & Accessing Information on Electronic Networks The Laboratory's main concerns are protecting data and systems critical to operations in pursuit of its mission. The Laboratory's Computer Security Plan covers Laboratory systems, whether on-site and connected directly to the Laboratory network, or on- or off-site and connected to the Laboratory network by the telephone system or other means. The procedures and rules described here cover these systems no matter who is the owner or the method of connection to the network. Laboratory employees and registered users are responsible for their own actions under the computer security policy, as well as for the actions of any person who they permit to access a Laboratory system.

429

IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS--PART C: APPLICATIONS AND REVIEWS, VOL. 33, NO. 3, AUGUST 2003 413 A Secure PLAN  

E-Print Network [OSTI]

. 3, AUGUST 2003 413 A Secure PLAN Michael Hicks, Angelos D. Keromytis, and Jonathan M. Smith Abstract

Yang, Junfeng

430

Office of Security Policy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Office of Security Policy Office of Security Policy Mission and Functions The Office of Security Policy develops and promulgates safeguards and security policy governing the protection of National Security and other critical assets entrusted to the Department. Director's Perspective Welcome to the Office of Security Policy Jack Cowden, Director The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the Department. This includes the protection of DOE nuclear facilities, nuclear weapons components, special nuclear materials and classified information. Our broad topical areas are organized as: Program Planning and Management, Protection Program Operations (which includes both physical security and protective forces), Information Security and Material Control and Accountability.

431

Barriers to creating a secure MPI  

SciTech Connect (OSTI)

This paper explores some of the many issues in developing security enhanced MPI for embedded real-time systems supporting the Department of Defense`s Multi-level Security policy (DoD MLS) are presented along with the preliminary design for such an MPI variant. In addition some of the many issues that need to be addressed in creating security enhanced versions of MPI for other domains are discussed. 19 refs.

Brightwell, R.; Greenberg, D.S.; Matt, B.J. [Sandia National Labs., Albuquerque, NM (United States); Davida, G.I. [Univ. of Wisconsin, Milwaukee, WI (United States). Dept. of Computer Sciences

1997-08-01T23:59:59.000Z

432

Cyber Security Audit and Attack Detection Toolkit  

SciTech Connect (OSTI)

This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

Peterson, Dale

2012-05-31T23:59:59.000Z

433

Chapter 5 - Security Models for SCADA, ICS, and Smart Grid  

Science Journals Connector (OSTI)

Abstract This chapter describes security models for different Smart Grid protocols, including SCADA and ICS protocols. Many protocols are explained, along with their security models, interoperability, and methods and models of organizing them within an integrated system. Security methodologies are compared in order to create a working model for Smart Grid systems.

Eric D. Knapp; Raj Samani

2013-01-01T23:59:59.000Z

434

Nuclear Security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

435

Nuclear Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

436

Nuclear Security Enterprise | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Enterprise | National Nuclear Security Administration Enterprise | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Enterprise Home > About Us > Our Programs > Defense Programs > Nuclear Security Enterprise Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective nuclear deterrent through the

437

Wide Area Security Region Final Report  

SciTech Connect (OSTI)

This report develops innovative and efficient methodologies and practical procedures to determine the wide-area security region of a power system, which take into consideration all types of system constraints including thermal, voltage, voltage stability, transient and potentially oscillatory stability limits in the system. The approach expands the idea of transmission system nomograms to a multidimensional case, involving multiple system limits and parameters such as transmission path constraints, zonal generation or load, etc., considered concurrently. The security region boundary is represented using its piecewise approximation with the help of linear inequalities (so called hyperplanes) in a multi-dimensional space, consisting of system parameters that are critical for security analyses. The goal of this approximation is to find a minimum set of hyperplanes that describe the boundary with a given accuracy. Methodologies are also developed to use the security hyperplanes, pre-calculated offline, to determine system security margins in real-time system operations, to identify weak elements in the system, and to calculate key contributing factors and sensitivities to determine the best system controls in real time and to assist in developing remedial actions and transmission system enhancements offline . A prototype program that automates the simulation procedures used to build the set of security hyperplanes has also been developed. The program makes it convenient to update the set of security hyperplanes necessitated by changes in system configurations. A prototype operational tool that uses the security hyperplanes to assess security margins and to calculate optimal control directions in real time has been built to demonstrate the project success. Numerical simulations have been conducted using the full-size Western Electricity Coordinating Council (WECC) system model, and they clearly demonstrated the feasibility and the effectiveness of the developed technology. Recommendations for the future work have also been formulated.

Makarov, Yuri V.; Lu, Shuai; Guo, Xinxin; Gronquist, James; Du, Pengwei; Nguyen, Tony B.; Burns, J. W.

2010-03-31T23:59:59.000Z

438

Better Security Through Discussion | Department of Energy  

Office of Environmental Management (EM)

Better Security Through Discussion Better Security Through Discussion Better Security Through Discussion More Documents & Publications Indiana Department of Homeland Security -...

439

Climate VISION: Security and Privacy Notices  

Office of Scientific and Technical Information (OSTI)

SECURITY AND PRIVACY NOTICES SECURITY AND PRIVACY NOTICES Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation is prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of

440

Privacy & Security Notice | Argonne National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Privacy & Security Notice Privacy & Security Notice Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The U.S. Department of Energy (DOE) monitors this web site for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation is prohibited. Evidence of such acts may be disclosed to law enforcement authorities and

Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Personnel Security Program Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

2000-11-16T23:59:59.000Z

442

Personnel Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

1998-05-22T23:59:59.000Z

443

Office of Security Assistance  

Broader source: Energy.gov [DOE]

The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

444

Security, trust, and QoS in next-generation control and communication for large power systems  

Science Journals Connector (OSTI)

The present communication architecture supporting control of the electric power grid makes it difficult to use the wealth of data collected at high rates in substations, retarding their use in new applications for controlling the grid. A flexible, real-time data network would make it possible to use these data for many more control and protection applications, potentially increasing the grid's reliability and increasing its operating efficiency. Applications that could use these data include: decentralised load frequency control; closed-loop voltage control; transient and small-signal stabilisation; and special protection schemes using data gathered over a wide area. Such applications and the flexibility of the underlying communication network imply greater data sharing between utilities, leading to new performance, availability and reliability requirements. This paper examines the security, trust and Quality of Service (QoS) requirements imposed by these applications and shows how they are met by mechanisms included in the GridStat middleware framework that we are developing.

Carl H. Hauser; David E. Bakken; Ioanna Dionysiou; K. Harald Gjermundrod; Venkata S. Irava; Joel Helkey; Anjan Bose

2008-01-01T23:59:59.000Z

445

Improving web site security with data flow management  

E-Print Network [OSTI]

This dissertation describes two systems, RESIN and BFLow, whose goal is to help Web developers build more secure Web sites. RESIN and BFLOW use data flow management to help reduce the security risks of using buggy or ...

Yip, Alexander Siumann, 1979-

2009-01-01T23:59:59.000Z

446

A Grid Security Infrastructure Based on Behaviors and Trusts  

Science Journals Connector (OSTI)

Computational Grids need support the distributed high performance computing with security and reliability. While the fact is when ... destroy the whole system. For solving these security problems in Grids, a Grid

Xiaolin Gui; Bing Xie; Yinan Li; Depei Qian

2004-01-01T23:59:59.000Z

447

An Advanced Security Infrastructure for Heterogeneous Relational Grid Data Sources  

Science Journals Connector (OSTI)

In this paper we deal with the problem of secure access to metadata information in Grid computing environments. The heterogeneity of the eventual ... database management systems) and the enforcement of security p...

Javier Jan Martnez; JosH. Cans

2004-01-01T23:59:59.000Z

448

Hardware Security for Device Authentication in the Smart Grid  

Science Journals Connector (OSTI)

Secure communication between devices is a key aspect of smart grid security. In the future smart home...environment, various smart devices, appliances and energy management systems will communicate with each othe...

Andrew J. Paverd; Andrew P. Martin

2013-01-01T23:59:59.000Z

449

Welcome to the Kansas City Field Office | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

(816) 488-3341 Manager, Office of Business & Security Operations (816) 488-5321 Contracting Officer (816) 488-3249 Team Lead, Security & Information Systems (816) 488-5109...

450

Security is Not an Option | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

is Not an Option Security is Not an Option A 10-year roadmap for achieving control system cyber security in the energy industry has been hailed as a model for other industries....

451

Building fast and secure Web services with OKWS  

E-Print Network [OSTI]

OKWS is a Web server specialized for secure and fast delivery of dynamic content. It provides Web developers with a small set of tools powerful enough to build complex Web-based systems. Despite its emphasis on security, ...

Krohn, Maxwell (Maxwell N.)

2005-01-01T23:59:59.000Z

452

Your Security Policy is What?? Matt Bishop  

E-Print Network [OSTI]

of California at San Diego peisert@cs.ucsd.edu Abstract Systems and infrastructure rarely enforce a site's security policy precisely. Conversely, determining the policy (or policy components) that the systems

Peisert, Sean

453

Safety, security and safeguard  

Science Journals Connector (OSTI)

Abstract A physical protection system (PPS) integrates people, procedures, and equipment for the protection of assets or facilities against theft, sabotage and terrorist attacks. Therefore, this paper proposes the use of a systematic and measurable approach to the design of PPS and its emphases on the concept of detection, delay and response. The proposed performance based PPS has the capability of defeating adversaries thereby achieving its targets. Therefore, timely detection of intrusion based on the use of sensors, signal lines and alarm systems is a major principle in the proposed system. Also the need for deterrence such as barriers in form of guards, access control, close circuit television (CCTV), strong policy and procedures, then the security culture amongst the facility workers was appropriately discussed. Since nuclear power is considered the only source that can provide large scale electricity with comparatively minimal impact on the environment, the paper also considered base guidelines for the application of PPS in any nuclear and radioactive facilities, followed with the necessity to incorporate inherent safety, security and safeguard (3S) synergy innovation in the physical protection system design and other characteristics that will enhance to reduce the vulnerability of nuclear facilities and materials to theft sabotage and terrorist attacks.

Nasiru Imam Zakariya; M.T.E. Kahn

2015-01-01T23:59:59.000Z

454

Cyber security best practices for the nuclear industry  

SciTech Connect (OSTI)

When deploying software based systems, such as, digital instrumentation and controls for the nuclear industry, it is vital to include cyber security assessment as part of architecture and development process. When integrating and delivering software-intensive systems for the nuclear industry, engineering teams should make use of a secure, requirements driven, software development life cycle, ensuring security compliance and optimum return on investment. Reliability protections, data loss prevention, and privacy enforcement provide a strong case for installing strict cyber security policies. (authors)

Badr, I. [Rational IBM Software Group, IBM Corporation, Evanston, IL 60201 (United States)

2012-07-01T23:59:59.000Z

455

Numerical Simulation of Inter-basin Groundwater Flow into Northern Yucca Flat, Nevada National Security Site, Using the Death Valley Regional Flow System Model  

SciTech Connect (OSTI)

Models of groundwater flow for the Yucca Flat area of the Nevada National Security Site (NNSS) are under development by the U.S. Department of Energy (DOE) for corrective action investigations of the Yucca Flat-Climax Mine Corrective Action Unit (CAU). One important aspect of these models is the quantity of inter-basin groundwater flow from regional systems to the north. This component of flow, together with its uncertainty, must be properly accounted for in the CAU flow models to provide a defensible regional framework for calculations of radionuclide transport that will support determinations of the Yucca Flat-Climax Mine contaminant boundary. Because characterizing flow boundary conditions in northern Yucca Flat requires evaluation to a higher level of detail than the scale of the Yucca Flat-Climax Mine CAU model can efficiently provide, a study more focused on this aspect of the model was required.

Pohlmann Karl,Ye Ming

2012-03-01T23:59:59.000Z

456

External > Programs > National Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Security The National Security mission in Oak Ridge is carried out at the National Nuclear Security Administration's (NNSA) Y-12 National Security Complex, formerly known as the Oak Ridge Y-12 Plant. Programs at Y-12 include manufacturing and reworking nuclear weapon components, dismantling nuclear weapon components returned from the national arsenal, serving as the nation's safe, secure storehouse of special nuclear materials, reducing the global threat from terrorism and weapons of mass destruction, and providing the U.S. Navy with safe, militarily effective nuclear propulsion systems. Y-12 is operated by B&W Y-12 LLC. ORO provides a variety of services to the NNSA's Y-12 Site Office as part of a service agreement between the two organizations.

457

Cyber Assessment Methods for SCADA Security  

Broader source: Energy.gov (indexed) [DOE]

5 by ISA - The Instrumentation, Systems and Automation Society. 5 by ISA - The Instrumentation, Systems and Automation Society. Presented at 15th Annual Joint ISA POWID/EPRI Controls and Instrumentation Conference http://www.isa.org Cyber Assessment Methods for SCADA Security May Robin Permann Kenneth Rohde Staff Computer Security Researcher Information & Communications Systems Cyber Security Technologies Idaho National Laboratory Idaho National Laboratory Idaho Falls, ID 83415 Idaho Falls, ID 83415 KEYWORDS Supervisory Control and Data Acquisition, SCADA, Cyber Security, Testing, Assessment ABSTRACT The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical

458

T-560: Cisco Security Advisory: Management Center for Cisco Security...  

Broader source: Energy.gov (indexed) [DOE]

Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code...

459

Transmission and Distribution World March 2007: DOE Focuses on Cyber Security  

Broader source: Energy.gov [DOE]

Energy sector owners, operators and system vendors team up to boost control system security with national SCADA test bed.

460

Security Engineering for Ambient Intelligence: A Manifesto  

E-Print Network [OSTI]

: +34952131397 amg@lcc.uma.es Carsten Rudolph Fraunhofer Institute for Secure Information Technology (SIT), Rheinstrasse 75, D-64295 Darmstadt, Germany Tel: +496151869344 Fax: +496151869224 Carsten.Rudolph@sit.fraunhofer challenges for the design and engineering of secure and dependable systems. This chapter describes SERENITY

Spanoudakis, George

Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Check Point NGX R65 Security Administration  

Science Journals Connector (OSTI)

Check Point NGX R65 is the next major release of Check Point's flagship firewall software product, which has over 750,000 registered users. Check Point's NGX is the underlying security software platform for all of the company's enterprise firewall, VPN ... Keywords: Operating Systems, Security

Ralph Bonnell

2008-03-01T23:59:59.000Z

462

Erera, Spring School 2004 Transportation Security  

E-Print Network [OSTI]

and Systems Engineering Georgia Institute of Technology #12;Erera, Spring School 2004 Outline ! UnderstandingErera, Spring School 2004 Transportation Security Alan Erera and Chelsea C. White III Industrial ! Transportation security research: future #12;Erera, Spring School 2004 Outline ! Understanding transportation

Erera, Alan

463

COMMON VULNERABILITIES IN CRITICAL INFRASTRUCTURE CONTROL SYSTEMS  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

enforcement and auditing. Page 114 SECURITY POLICY Figure 1. PCS administration. A security plan documents the overall security architecture for a system or subsystem. Typical...

464

The Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

0 0 October 2010 www.y12.doe.gov/news/times.php P.O. Box 2009 Oak Ridge, TN 37831-8245 W H A T ' S I N S I D E Page 2 Air Force visits Y-12's 'White Castle' Page 3 Family ties Pages 4 and 5 Safeguards, Security and Emergency Services Sentinel Page 6 Readiness workshop celebrates a decade of sharing lessons learned Page 8 Extra! Extra! Read about the past B&W Technical Services Y-12, LLC, a partnership between Babcock & Wilcox Technical Services Group Inc. and Bechtel National Inc., operates the Y-12 National Security Complex. A newsletter for employees and friends of the Y-12 National Security Complex Managing Editors Amy Alley: alleyab@y12.doe.gov Heidi Spurling: spurlinghw@y12.doe.gov Layout Lisa Harris Contributors Ellen Boatner Susan Butefi sh Amanda Byrge Mary Bryant Ryn Etter

465

Ideas for Security Assurance in Security Critical Software using Modelica  

E-Print Network [OSTI]

critical software. Modelica is a modern, strongly typed, de- clarative, and object-oriented language of models, model libraries, and simulation specifications. #12;The Modelica language and its associated for modeling and simulation of complex systems. In this paper we sketch two ideas for improving security

Zhao, Yuxiao

466

Y-12 Times, A newsletter for employees and friends of the Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

9 9 September 2010 www.y12.doe.gov/news/times.php P.O. Box 2009 Oak Ridge, TN 37831-8245 W H A T ' S I N S I D E Page 2 Career planning: advice from the president Page 4 They've got the power Page 5 Y-12's waterworks Page 6 Meet the LIFE force Page 6 Former plant manager makes the schoolhouse rock B&W Technical Services Y-12, LLC, a partnership between Babcock & Wilcox Technical Services Group Inc. and Bechtel National Inc., operates the Y-12 National Security Complex. A newsletter for employees and friends of the Y-12 National Security Complex Managing Editors Amy Alley: alleyab@y12.doe.gov Heidi Spurling: spurlinghw@y12.doe.gov Layout Lisa Harris Contributors Ellen Boatner Mary Bryant Ashley Craig-Watkins Beth Eckerman Ryn Etter Kathy Fahey John Holbrook Dave Keim Kathryn King

467

Security & Defense Licenses Available | Tech Transfer | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Available Technologies Available Technologies Analytical Instrumentation Chemicals Detectors and Sensors Energy and Utilities Healthcare and Biology Information Technology and Communications Manufacturing Materials Security and Defense Transportation Partnerships Home | Connect with ORNL | For Industry | Partnerships | Technology Licensing | Available Technologies | Security and Defense SHARE Security and Defense 200401423 Synthesis Method for Stable Colloids of "Naked" Metal Nanocrystals 200501549 Enhanced Detection of Toxic Agents 200501614 Robust Low-Frequency Spread-Spectrum Navigation System (Related ID # 200601627) 200501640 Secure Identification of Textiles and Other Consumer Products 200701980 Cyberspace Security Econometrics System 200701995 An Intrusion Detection System Using Quantum-mechanical

468

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

i. i. Message from the Administrator President Obama has reshaped our national security priorities making enterprise infrastructure modernization with integrated Information Technology (IT) capabilities a key strategic initiative. Our IT infrastructure must ensure that our workforce can access appropriate information in a secure, reliable, and cost-effective manner. Effective information sharing throughout the government enhances the national security of the United States (US). For the National Nuclear Security Administration (NNSA), effective information sharing helps strengthen our nuclear security mission; builds collaborative networks within NNSA as well as with the Department of Energy (DOE), Department of Defense (DoD), and other national security

469

Security Policy, Guidance & Reports  

Broader source: Energy.gov [DOE]

Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top priority of the Department of Energys corporate security programs. All Secretarial objectives are supported by a tailored level of security requirements for a wide range of Departmental scientific, research, and national security objectives based on the security significance of their national assets. DOE ensures that Departmental personnel security programs (including the National Nuclear Security Administration [NNSA]) are consistent and effectively implemented.

470

Cyber Security Requirements for Risk Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Notice ensures that system owners consistently assess the threats to and vulnerabilities of systems in order to implement adequate security controls. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

2004-02-19T23:59:59.000Z

471

Security-by-design handbook.  

SciTech Connect (OSTI)

This document is a draft SecuritybyDesign (SeBD) handbook produced to support the Work Plan of the Nuclear Security Summit to share best practices for nuclear security in new facility design. The Work Plan calls on States to %E2%80%9Cencourage nuclear operators and architect/engineering firms to take into account and incorporate, where appropriate, effective measures of physical protection and security culture into the planning, construction, and operation of civilian nuclear facilities and provide technical assistance, upon request, to other States in doing so.%E2%80%9D The materials for this document were generated primarily as part of a bilateral project to produce a SeBD handbook as a collaboration between the Japan Atomic Energy Agency (JAEA) Nuclear Nonproliferation Science and Technology Center and Sandia National Laboratories (SNL), which represented the US Department Energy (DOE) National Nuclear Security Administration (NNSA) under a Project Action Sheet PASPP04. Input was also derived based on tours of the Savannah River Site (SRS) and Japan Nuclear Fuel Limited (JNFL) Rokkasho Mixed Oxide Fuel fabrication facilities and associated project lessonslearned. For the purposes of the handbook, SeBD will be described as the systemlevel incorporation of the physical protection system (PPS) into a new nuclear power plant or nuclear facility resulting in a PPS design that minimizes the risk of malicious acts leading to nuclear material theft; nuclear material sabotage; and facility sabotage as much as possible through features inherent in (or intrinsic to) the design of the facility. A fourelement strategy is presented to achieve a robust, durable, and responsive security system.

Snell, Mark Kamerer; Jaeger, Calvin Dell; Scharmer, Carol; Jordan, Sabina Erteza; Tanuma, Koji [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Ochiai, Kazuya [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Iida, Toru [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan

2013-01-01T23:59:59.000Z

472

Security & Sustainability College of Charleston  

E-Print Network [OSTI]

Security & Sustainability POLI 399 College of Charleston Fall 2013 Day/Time: T/H; 10@cofc.edu Office: 284 King Street, #206 (Office of Sustainability) Office Hours: by appt or virtual apt Instructor is that if sustained well-being and prosperity of human and ecological systems is the goal of sustainability

Young, Paul Thomas

473

Information Security Policy Policy Title Information Security Policy  

E-Print Network [OSTI]

Information Security Policy Policy Title Information Security Policy Responsible Executive Vice President of Information Technology and CIO Jay Dominick Responsible Office Office of Information Technology, Operations and Planning Endorsed by Information Security Policy Committee Contact Chief Information Security

Rowley, Clarence W.

474

Improved wireless security for GMSK-based devices using RF fingerprinting  

Science Journals Connector (OSTI)

Gaussian minimum shift keying (GMSK) is employed in current global system for mobile (GSM) networks and remains a viable option for future wireless systems. Physical layer (PHY) security is demonstrated using RF fingerprints from ... Keywords: GMSK, GSM networks, Gaussian minimum shift keying, MDA, PHY security, RF fingerprinting, SEI, authentication, electronic security, multiple discriminant analysis, physical layer, specific emitter identification, wireless networks, wireless security

Donald R. Reising; Michael A. Temple; Michael J. Mendenhall

2010-03-01T23:59:59.000Z

475

Nonproliferation and National Security Multimedia - Argonne National  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Nonproliferation and National Security Nonproliferation and National Security > Multimedia Multimedia Nuclear Systems Analysis Engineering Analysis Nonproliferation and National Security Detection & Diagnostic Systems Engineering Development & Applications Argonne's Nuclear Science & Technology Legacy Other Multimedia Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE on Flickr Bookmark and Share Nonproliferation and National Security: Multimedia Related Resources Nonproliferation and National Security Vulnerability Assessment Team (VAT) Click on the "Date" header to sort the videos/podcasts in chronological order (ascending or descending). You may also search for a specific keyword; click on the reset button refresh to remove the keyword filter and show again all the Videos/Podcasts.

476

Power system security enhancement through effective allocation, control and integration of demand response program and FACTS devices.  

E-Print Network [OSTI]

??This thesis is devoted to the development of a new approach for using the FACTS devices and demand response programs to improve the power system (more)

Yousefi, Ashkan

2013-01-01T23:59:59.000Z

477

Formulating Cyber-Security as Convex Optimization Problems  

E-Print Network [OSTI]

Formulating Cyber-Security as Convex Optimization Problems Kyriakos G. Vamvoudakis, Jo~ao P. Mission-centric cyber-security analysts require a complete overview and understanding of the state. Keywords: Cyber-Security, Convex Optimization, System Identifica- tion, iCTF 1 Introduction Guaranteeing

Hespanha, João Pedro

478

Formulating Cyber-Security as Convex Optimization Problems  

E-Print Network [OSTI]

Formulating Cyber-Security as Convex Optimization Problems? Kyriakos G. Vamvoudakis1 , Jo~ao P,vigna}@cs.ucsb.edu Abstract. Mission-centric cyber-security analysts require a complete overview and understanding The Flag (iCTF) hacking competition. Keywords: Cyber-Security, Convex Optimization, System Identifica- tion

Vigna, Giovanni

479

Special Issue Call for Papers Security and Communication Networks  

E-Print Network [OSTI]

system Smart grid security Trust management and privacy protection in Next Generation Cyberspace #12Special Issue Call for Papers Security and Communication Networks ISSN: 1939-0122, John Wiley and Hamid R. Sharif Special Issue on "Challenges and Opportunities in Next Generation Cyberspace Security

Vouyioukas, Demosthenes

480

Alternative Schemes for Dynamic Secure VPN Deployment in UMTS  

Science Journals Connector (OSTI)

Three alternative schemes for secure Virtual Private Network (VPN) deployment over the Universal Mobile Telecommunication System (UMTS) are proposed and analyzed. The proposed schemes enable a mobile node to voluntarily establish an IPsec-based secure ... Keywords: IKE, IPsec, NAT, UMTS, VPN, mobile Internet, privacy, security

Christos Xenakis; Lazaros Merakos

2006-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "ami system security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

The Security Plan: Effectively Teaching How To Write One  

E-Print Network [OSTI]

1 The Security Plan: Effectively Teaching How To Write One Paul C. Clark Naval Postgraduate School government requires all federal systems to have a customized security plan. In addition, the National this standard to produce students capable of developing a security plan. The Naval Postgraduate School (NPS

482

Personal Security Assistance for Secure Internet Commerce  

E-Print Network [OSTI]

Jansson Swedish Institute of Computer Science Box 1263, S-164 28 Kista, Sweden ara@sics.se, sverker visiting your computer. Current agent security approaches are often based on trust in an ex- ternal assigned correct access-restrictions. We argue that a more rewarding security policy is to grant

Janson, Sverker

483

Best Practices in Photovoltaics Amy Galland, PhD, Research Director As You Sow, has written numerous publications analyzing industry performance on key issues  

E-Print Network [OSTI]

Best Practices in Photovoltaics #12;Author Amy Galland, PhD, Research Director As You Sow, has and benchmarking best practices in supply chain monitoring, recycling, sustainability, purchasing, and product on greenhouse gas reduction/renewable energy, sustainability, and environmental health resulting in increased

484

Cyber Security Evaluations - Reports  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO), May 2011

485

Office of Security Policy  

Broader source: Energy.gov [DOE]

The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

486

Office of Information Security  

Broader source: Energy.gov [DOE]

The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

487

Data Security ROCKVILLE, MD  

E-Print Network [OSTI]

by respondent identification. Thus, data security plans must be tailored to the unique needs and concerns of each data set: a "one-security-plan-fits-all" approach is neither feasible nor desirable. Nevertheless

Rau, Don C.

488

SeWDReSS: on the design of an application independent, secure, wide-area disaster recovery storage system  

Science Journals Connector (OSTI)

Distributed wide-area storage systems must tolerate both physical failure and logic errors. In particular, these functions are needed to enable the storage system to support remote disaster recovery. There are several solutions for distributed wide-area ... Keywords: Disaster recovery, Erasure-coding, Multimedia data, Replication, Storage

Lingfang Zeng; Bharadwaj Veeravalli; Qingsong Wei; Dan Feng

2012-06-01T23:59:59.000Z

489

Office of Headquarters Personnel Security Operations: Mission and Functions  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Office of Executive Protection Office of Executive Protection Home Sub Offices › HQ Security Officers (HSO) Program › Office of Security Operations › Office of Information Security › Office of Headquarters Personnel › Office of Physical Protection › Office of Security Operations Mission & Functions › Security Operations › HQ Security Operations › HQ Personnel Security Op. › Special Operations HSO Program - 2010 Spotlights - 2009 Spotlights - Spotlights Archives (2008-2007) HSO Contacts Contact Us Headquarters Facilities Master Security Plan Security Reference Book HSS Logo Office of Headquarters Personnel Security Operations Reports to the Office of Security Operations Mission and Functions Mission Provide a comprehensive Personnel Security Program for the DOE Headquarters complex. Ensure that DOE classified information, materials, buildings and information systems are safeguarded from compromise by only granting security clearances and building access to trustworthy individuals. This is accomplished through conscientious, just, and thoughtful application of Federal rules and statutes with the goal of ensuring that only individuals whose character, associations, and loyalty do not endanger the common defense are granted access to DOE classified information, materials, buildings and information systems.

490

Privacy and Security Notice This Air Force ROTC Detachment 825 Website is provided as a public service by The  

E-Print Network [OSTI]

specifications, and identifying system performance or problem areas. For site security purposes and to ensure

Texas at Austin, University of

491

Privacy and Security Notice "This Air Force ROTC Detachment 205 Website is provided as a public service by the  

E-Print Network [OSTI]

specifications, and identifying system performance or problem areas. For site security purposes and to ensure

Nickrent, Daniel L.

492

Nuclear Security 101 | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

493

Nuclear Security 101 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

494

Security Scheme in Wireless Grid  

Science Journals Connector (OSTI)

In this paper, we considered the two security services of authorization and data security in wireless Grid. The security issues is related to authorization and security, specific to Grid, the characteristics of t...

Yue Hong Zhang; Li Hao; Zhong Shan Yang

2011-01-01T23:59:59.000Z

495

Personnel Security Program Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

2001-07-12T23:59:59.000Z

496

Information Security Guide  

E-Print Network [OSTI]

Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

497

The Department's Unclassified Cyber Security Program 2002, IG-0567  

Broader source: Energy.gov (indexed) [DOE]

DEPARTMENT'S UNCLASSIFIED DEPARTMENT'S UNCLASSIFIED CYBER SECURITY PROGRAM 2002 SEPTEMBER 2002 Department of Energy Washington, DC 20585 September 9, 2002 MEMORANDUM FOR FROM: Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Department's Unclassified Cyber Security Program 2002" As agencies strive to meet the President's goal of significantly increasing electronic government, the potential for disruption or damage to critical systems by malicious users continues to increase. In response to increasing threats to the Government's computer networks and systems, Congress enacted the Government hformation Security Reform Act (GISRA) in October 2000. GISRA focuses on program management, implementation, and evaluation of the security of unclassified and national security

498

National Security & Safety Reports | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Equipment used by Protective Forces January 8, 2009 Inspection Report: IG-0809 Pantex Laser Perimeter Awareness System December 11, 2008 Inspection Report: INS-O-09-01 Security...

499

Threat Model for Grid Security Services  

Science Journals Connector (OSTI)

The grid computing paradigm involves both the availability of ... systems heavily rely upon the provision of adequate security. It is imperative that techniques be developed ... trustworthy, and is an established...

Syed Naqvi; Michel Riguidel

2005-01-01T23:59:59.000Z

500

Innovations for Grid Security from Trusted Computing  

Science Journals Connector (OSTI)

A central problem for Grid (or web) services is how to ... or system) will behave as expected. In Grid security practice at present, issues of confidentiality and ... insufficient for a large class of problems in...

Wenbo Mao; Andrew Martin; Hai Jin; Huanguo Zhang

2009-01-01T23:59:59.000Z