Powered by Deep Web Technologies
Note: This page contains sample records for the topic "analysis securities corporation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Corporate Security and Conflict Outcomes  

E-Print Network [OSTI]

..................................................................................................... 75 Competition in Security Contracting and Conflict Outcomes .................................. 80 Research Design ....................................................................................................... 88 Dependent Variable... ................................... 16 Table 2 Contracted Service Total by Corporate Structure ............................................... 42 Table 3 The Effects of Public and Individual Firms Operating in Iraq (Part A) .............. 54 Table 4 The Effects of Public...

Tkach, Benjamin K

2013-10-21T23:59:59.000Z

2

Corporate Analysis of DOE Safety Performance  

Broader source: Energy.gov [DOE]

The Office of Environment, Health, Safety and Security (EHSS), Office of Analysis develops analysis tools and performance dashboards, and conducts analysis of DOE safety performance corporately and on a variety of specific environment, safety and health topics.

3

First Analysis Securities Corporation | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublicIDAPowerPlantSitingConstruction.pdfNotify98.pdf Jump to:Siting.pdf JumpFirelands Electric Coop, IncFirst

4

Corporate decision analysis : an engineering approach  

E-Print Network [OSTI]

We explore corporate decisions and their solutions under uncertainty using engineering methods. Corporate decisions tend to be complex; they are interdisciplinary and defy programmable solutions. To address these challenges, ...

Tang, Victor, Ph.D. Massachusetts Institute of Technology

2006-01-01T23:59:59.000Z

5

Visual analysis of code security  

SciTech Connect (OSTI)

To help increase the confidence that software is secure, researchers and vendors have developed different kinds of automated software security analysis tools. These tools analyze software for weaknesses and vulnerabilities, but the individual tools catch different vulnerabilities and produce voluminous data with many false positives. This paper describes a system that brings together the results of disparate software analysis tools into a visual environment to support the triage and exploration of code vulnerabilities. Our system allows software developers to explore vulnerability results to uncover hidden trends, triage the most important code weaknesses, and show who is responsible for introducing software vulnerabilities. By correlating and normalizing multiple software analysis tools' data, the overall vulnerability detection coverage of software is increased. A visual overview and powerful interaction allows the user to focus attention on the most pressing vulnerabilities within huge volumes of data, and streamlines the secure software development workflow through integration with development tools.

Goodall, John R [ORNL] [ORNL; Radwan, Hassan [Applied Visions, Inc.] [Applied Visions, Inc.; Halseth, Lenny [Applied Visions, Inc.] [Applied Visions, Inc.

2010-01-01T23:59:59.000Z

6

Copyright 1997 by Rational Software Corporation Analysis and Design  

E-Print Network [OSTI]

Page 1 Copyright © 1997 by Rational Software Corporation Analysis and Design with UML Page 2 Copyright © 1997 by Rational Software Corporation Agenda n Benefits of Visual Modeling n History of the UML n Visual Modeling with UML n The Rational Iterative Development Process #12;Page 3 Copyright © 1997

Mylopoulos, John

7

Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)  

SciTech Connect (OSTI)

Battelles National Security & Defense objective is, applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratorys (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

Hadley, Mark D.; Clements, Samuel L.

2009-01-01T23:59:59.000Z

8

IS THE TAIL WAGGING THE DOG? AN EMPIRICAL ANALYSIS OF CORPORATE CARBON FOOTPRINTS AND FINANCIAL PERFORMANCE  

E-Print Network [OSTI]

The importance of carbon footprint estimation boundaries.ANALYSIS OF CORPORATE CARBON FOOTPRINTS AND FINANCIALANALYSIS OF CORPORATE CARBON FOOTPRINTS AND FINANCIAL

Delmas, Magali A; Nairn-Birch, Nicholas S.

2011-01-01T23:59:59.000Z

9

Statistical analysis of correlated fossil fuel securities  

E-Print Network [OSTI]

Forecasting the future prices or returns of a security is extraordinarily difficult if not impossible. However, statistical analysis of a basket of highly correlated securities offering a cross-sectional representation of ...

Li, Derek Z

2011-01-01T23:59:59.000Z

10

A Forrester Consulting Thought Leadership Paper Commissioned By Microsoft And RSA, The Security Division Of EMC The Value Of Corporate Secrets  

E-Print Network [OSTI]

Division Of EMC The Value Of Corporate Secrets How Compliance And Collaboration Affect Enterprise, the security division of EMC, commissioned Forrester Consulting to assess the data security practices of North

Narasayya, Vivek

11

Security Analysis and Project Management Systems | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Analysis and Project Management Systems SHARE Security Analysis and Project Management Systems ORNL brings together the subject matter experts with programmers to design,...

12

Corporate Law's Current-Owner Bias  

E-Print Network [OSTI]

Owner Bias in Corporate Governance Jesse Fried * Boalt Hallmy conclusion that corporate governance arrangements choseninterventions in corporate governance through the securities

Fried, Jesse M.

2005-01-01T23:59:59.000Z

13

Corporate Law's Current-Owner Bias  

E-Print Network [OSTI]

Owner Bias in Corporate Governance Jesse Fried * Boalt Hallmy conclusion that corporate governance arrangements choseninterventions in corporate governance through the securities

Fried, Jesse M.

2006-01-01T23:59:59.000Z

14

Sandia Corporation  

Office of Environmental Management (EM)

Corporation Sandia National Laboratories P.O. Box 5800, MS 0101 Albuquerque, New Mexico 87185-0101 WEL-2012-01 Dear Dr. Hommert: The Office of Health, Safety and Security's...

15

2011 Corporate Headquarters: An Analysis of Immediate Communities  

E-Print Network [OSTI]

While the Bay Areas history has shaped todays culture, there is little written about how corporations affect their immediate communities. This thesis focuses on the largest corporations in the Bay Area to determine if these corporations have any...

Conti, Serena Nicole

2013-04-25T23:59:59.000Z

16

Office of Corporate Security Strategy, Analysis and Special Operations |  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen OwnedofDepartment ofJaredOakscience-based,OHAGas and OilDepartment of361

17

Principles of Secure Information Flow Analysis Geoffrey Smith  

E-Print Network [OSTI]

Principles of Secure Information Flow Analysis Geoffrey Smith School of Computing and Information to explain the #12;2 Geoffrey Smith principles underlying secure information flow analysis and to discuss

Smith, Geoffrey

18

SAFEGUARDS AND SECURITY INTEGRATION WITH SAFETY ANALYSIS  

SciTech Connect (OSTI)

The objective of this paper is to share the Savannah River Site lessons learned on Safeguards and Security (S&S) program integration with K-Area Complex (KAC) safety basis. The KAC Documented Safety Analysis (DSA), is managed by the Washington Savannah River Company (WSRC), and the S&S program, managed by Wackenhut Services, Incorporated--Savannah River Site (WSI-SRS). WSRC and WSI-SRS developed a contractual arrangement to recognize WSI-SRS requirements in the KAC safety analysis. Design Basis Threat 2003 (DBT03) security upgrades required physical modifications and operational changes which included the availability of weapons which could potentially impact the facility safety analysis. The KAC DSA did not previously require explicit linkage to the S&S program to satisfy the safety analysis. WSI-SRS have contractual requirements with the Department of Energy (DOE) which are separate from WSRC contract requirements. The lessons learned will include a discussion on planning, analysis, approval of the controls and implementation issues.

Hearn, J; James Lightner, J

2007-04-13T23:59:59.000Z

19

SECURITY ANALYSIS OF PROPOSEDTRAVELTO SENSITIVE COUNTRIES | Department...  

Broader source: Energy.gov (indexed) [DOE]

COUNTRIES More Documents & Publications 2014 Headquarters Facilities Master Security Plan - Chapter 6, Foreign Interaction PSH-12-0117 - In the matter of Personnel Security...

20

Leveraging Trusted Network Connect for Secure Connection of Mobile Devices to Corporate Networks  

E-Print Network [OSTI]

for Secure Information Technology, Rheinstrasse 75, 64295 Darmstadt, Germany, hervais and systems pose specific requirements and because of the diversity of network access technologies of user identities and rights are not compatible. Especially for SMEs identity management and access

Paris-Sud XI, Université de

Note: This page contains sample records for the topic "analysis securities corporation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Essays on the structural estimation and analysis of corporate and industrial markets  

E-Print Network [OSTI]

The three chapters which comprise my thesis are a collection of essays on the analysis of the corporate governance and airline markets and of the federal appellate structure. In Chapter 1, I use a discrete choice framework ...

Cohen, Moshe Aharon

2009-01-01T23:59:59.000Z

22

NNSA Corporate CPEP Process NNSA LOS ALAMOS NATIONAL SECURITY, LLC PER  

National Nuclear Security Administration (NNSA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartmentNational Nuclear SecurityNationalApplyMaintaining ForNProgram | National NNSA LOS

23

NNSA Corporate CPEP Process NNSA Lawrence Livermore National Security, LLC PER  

National Nuclear Security Administration (NNSA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartmentNational Nuclear SecurityNationalApplyMaintaining ForNProgram | National NNSA

24

Security  

Broader source: Energy.gov [DOE]

Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

25

Software Analysis for Security Spiros Mancoridis  

E-Print Network [OSTI]

of the processes, practices, and technolo- gies that can help software maintenance engineers improve the security of software systems. A particular emphasis is placed on validating security architectures, verifying- erating system mechanisms that impose rules on untrusted programs (e.g., role-based access control), anti

Mancoridis, Spiros

26

Corporate Analysis of DOE Safety Performance | Department of Energy  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of Energy Power Systems EngineeringDepartmentSmart GridThird Quarter OverallDepartmentSpaceDebateCorporate

27

SAAS: Simulation Analysis of Aviation Security Year One Report  

E-Print Network [OSTI]

Under FEMA Grant EMW-2004-GR-0112 November 2005 Center for Risk and Economic Analysis of Terrorism to implement an integrated simulation-based decision support tool framework to enable emergency personnel by the United States Department of Homeland Security through the Center for Risk and Economic Analysis

Wang, Hai

28

Office of Environmental Protection, Sustainability Support, and Corporate Safety Analysis  

Broader source: Energy.gov [DOE]

The Office of Environmental Protection, Sustainability Support and Analysis establishes environmental protection requirements and expectations for the Department to ensure protection of workers and the public and protection of the environment from the hazards associated with all Department operations.

29

Design and analysis of an ATM network traffic security device  

E-Print Network [OSTI]

and retransmit the network traffic from one ATM network switch output port. The Receivers queue the incoming data from the ATM network switch and present the data to the Analysis Modules in manageable pieces. The Analysis Modules capture the data from... at an exponential rate. With the continuation of this growth, the requirements of providing uniform security management will become more and more difficult to manage without occupying a significant portion of the network traffic capability available to the end...

Teodor, Dan Cristian

1997-01-01T23:59:59.000Z

30

Information Security Analysis Using Game Theory and Simulation  

SciTech Connect (OSTI)

Information security analysis can be performed using game theory implemented in dynamic simulations of Agent Based Models (ABMs). Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. Our approach addresses imperfect information and scalability that allows us to also address previous limitations of current stochastic game models. Such models only consider perfect information assuming that the defender is always able to detect attacks; assuming that the state transition probabilities are fixed before the game assuming that the players actions are always synchronous; and that most models are not scalable with the size and complexity of systems under consideration. Our use of ABMs yields results of selected experiments that demonstrate our proposed approach and provides a quantitative measure for realistic information systems and their related security scenarios.

Schlicher, Bob G [ORNL] [ORNL; Abercrombie, Robert K [ORNL] [ORNL

2012-01-01T23:59:59.000Z

31

Climate change and energy security: an analysis of policy research  

SciTech Connect (OSTI)

The literature on climate change's impacts on energy security is scattered across disparate fields of research and schools of thought. Much of this literature has been produced outside of the academy by scholars and practitioners working in "think tanks," government agencies, and international/multilateral institutions. Here we reviewed a selected set of 58 articles and reports primarily from such sources and performed textual analysis of the arguments. Our review of this literature identifies three potential mechanisms for linking climate change and energy security: Climate change may 1) create second-order effects that may exacerbate social instability and disrupt energy systems; 2) directly impact energy supply and/or systems or 3) influence energy security through the effects of climate-related policies. We identify emerging risks to energy security driven by climate mitigation tech-nology choices but find less evidence of climate change's direct physical impacts. We used both empirical and qualitative selection factors for choosing the grey literature sample. The sources we selected were published in the last 5 years, available through electronic media and were written in language accessible to general policy or academic readers. The organi-zations that published the literature had performed previous research in the general fields of energy and/or climate change with some analytical content and identified themselves as non-partisan. This literature is particularly valuable to scholars because identifies understudied relationships that can be rigorously assessed through academic tools and methodologies and informs a translational research agenda that will allow scholars to engage with practitioners to address challenges that lie at the nexus of climate change and energy security.

King, Marcus Dubois [George Washington University] [George Washington University; Gulledge, Jay [ORNL] [ORNL

2013-01-01T23:59:59.000Z

32

Corporate bankruptcy : assessment, analysis and prediction of financial distress, insolvency, and failure  

E-Print Network [OSTI]

This paper is divided into three sections that address the various elements of understanding, predicting and analyzing corporate failure and bankruptcy. Part I covers the definitions of corporate failure, explains the ...

Danilov, Konstantin A

2014-01-01T23:59:59.000Z

33

A quantitative man-machine model for cyber security efficiency analysis  

E-Print Network [OSTI]

The analysis of security defense processes is of utmost importance in the management of various cyber-security attacks, which are increasing in scope and rapidity. Organizations need to optimize their resources based on a sound understanding...

Jung, Sung-Oh

2007-04-25T23:59:59.000Z

34

On the Exact Solution to a Smart Grid Cyber-Security Analysis Problem  

E-Print Network [OSTI]

1 On the Exact Solution to a Smart Grid Cyber-Security Analysis Problem Kin Cheong Sou, Henrik Sandberg and Karl Henrik Johansson Abstract--This paper considers a smart grid cyber-security problem

Johansson, Karl Henrik

35

IEEE TRANSACTIONS ON POWER SYSTEMS 1 Web-based Security Cost Analysis in Electricity  

E-Print Network [OSTI]

IEEE TRANSACTIONS ON POWER SYSTEMS 1 Web-based Security Cost Analysis in Electricity Markets Hong of transmission security constraints, transactions de- termined by market forces are feasible only when they are within the system's security limits. Thus, transactions in electricity markets need to be evaluated

Cañizares, Claudio A.

36

TABLE OF CONTENTS Risk Analysis Methods Adapted to Computer Security (Revised Paper)  

E-Print Network [OSTI]

Security e Espionage e Terrorism e Nuclear Theft Environmental Risk Computer Reliability Health & Safety#12;TABLE OF CONTENTS Title Page Risk Analysis Methods Adapted to Computer Security (Revised Security Lattice Management c. T. Fe~guson & c. B. Murphy . . . · · . . . 15 Gould Computer Systems

37

Energy Independence and Security Act of 2007 Select News and Analysis  

E-Print Network [OSTI]

Energy Independence and Security Act of 2007 Select News and Analysis WSU Extension Energy Library and Security Act of 2007 Select News and Analysis WSU Extension Energy Library http://www.energy/01/15/Analysis-Biofuels-law- attracts-opposition/UPI-42461200409947/ New Energy Law to Phase Out Today's Common

Collins, Gary S.

38

Security Requirements Engineering: A Framework for Representation and Analysis  

E-Print Network [OSTI]

of their security planning. The resulting loss has not been disclosed, but is in excess of several million dollars

Nuseibeh, Bashar

39

Recommended Practice for Securing Control System Modems  

SciTech Connect (OSTI)

This paper addresses an often overlooked backdoor into critical infrastructure control systems created by modem connections. A modems connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods.

James R. Davidson; Jason L. Wright

2008-01-01T23:59:59.000Z

40

Some Physics And System Issues In The Security Analysis Of Quantum Key Distribution Protocols  

E-Print Network [OSTI]

In this paper we review a number of issues on the security of quantum key distribution (QKD) protocols that bear directly on the relevant physics or mathematical representation of the QKD cryptosystem. It is shown that the cryptosystem representation itself may miss out many possible attacks which are not accounted for in the security analysis and proofs. Hence the final security claims drawn from such analysis are not reliable, apart from foundational issues about the security criteria that are discussed elsewhere. The cases of continuous-variable QKD and multi-photon sources are elaborated upon.

Horace P. Yuen

2014-05-07T23:59:59.000Z

Note: This page contains sample records for the topic "analysis securities corporation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

An analysis of the impact of mergers between community development corporations  

E-Print Network [OSTI]

This thesis explores the occurrence of mergers between community development corporations (CDC's) in the United States in the past five years. The research examines how mergers between CDC's affect their capacity to achieve ...

Haque, Shoma S

2005-01-01T23:59:59.000Z

42

Corporate social responsibility in Brazil : a comparative analysis of two paper companies  

E-Print Network [OSTI]

If being socially responsible can result in short or long-term economic benefits, then why do not all companies adopt corporate social responsibility (CSR) practices? This thesis draws on general assumptions from illustrative ...

Nascimento, Ana Paula M. do, 1966-

2004-01-01T23:59:59.000Z

43

An analysis of structure and process of corporate alliance development using system architecture frameworks  

E-Print Network [OSTI]

A strategic alliance has been one of the core methods for expanding the business of many corporations in terms of geographic presence, business domain, and technological scope. The strategic alliance includes many different ...

Kim, Gwang Gyu

2007-01-01T23:59:59.000Z

44

Commercial Aircraft Corporation of China (Comac) attempts to break the Airbus-Boeing duopoly, will it succeed? : an industry analysis framework applied  

E-Print Network [OSTI]

Using an industry analysis framework, this thesis analyzes whether the recently established Commercial Aircraft Corporation of China (Comac) is likely to break the Boeing-Airbus duopoly in the industry of large commercial ...

Fuentes, Jose L., S.M. Massachusetts Institute of Technology

2011-01-01T23:59:59.000Z

45

Integration of the EM Corporate QA Performance Metrics With Performanc...  

Office of Environmental Management (EM)

Integration of the EM Corporate QA Performance Metrics With Performance Analysis Process Integration of the EM Corporate QA Performance Metrics With Performance Analysis Process...

46

VEA-bility Security Metric: A Network Security Analysis Tool Melanie Tupper  

E-Print Network [OSTI]

network configurations. An administrator can then use the VEA-bility scores of different configurations the given options. These tools are important to network administrators as they strive to provide secure, yet by computer networks. For this reason, a primary objective for a network/system administrator is to maintain

Zincir-Heywood, Nur

47

Security Analysis and Project Management Systems | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 %Security andSecurity

48

Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration  

E-Print Network [OSTI]

, for the United States Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL

Siefert, Chris

49

Concise and Tight Security Analysis of the Bennett-Brassard 1984 Protocol with Finite Key Lengths  

E-Print Network [OSTI]

We present a tight security analysis of the Bennett-Brassard 1984 protocol taking into account the finite size effect of key distillation, and achieving unconditional security. We begin by presenting a concise analysis utilizing the normal approximation of the hypergeometric function. Then next we show that a similarly tight bound can also be obtained by a rigorous argument without relying on any approximation. In particular, for the convenience of experimentalists who wish to evaluate the security of their QKD systems, we also give explicit procedures of our key distillation, and also show how to calculate the secret key rate and the security parameter from a given set of experimental parameters. Besides the exact values of key rates and security parameters, we also present how to obtain their rough estimates using the normal approximation.

Masahito Hayashi; Toyohiro Tsurumaru

2012-05-17T23:59:59.000Z

50

Proceedings of Student-Faculty Research Day, CSIS, Pace University, May 8th Forensics Tools for Social Network Security Solutions  

E-Print Network [OSTI]

, test results, and future goals. The Social Network Site security issues are: [4] Corporate Espionage

Tappert, Charles

51

Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration  

E-Print Network [OSTI]

, for the United States Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL ­ Supply chains and logistics ­ Systems of systems (e.g., the nuclear fuel cycle, fleet management) #12

Langerhans, Brian

52

SSTARS - Safeguards and Security Tracking, Analysis and Reporting -  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared0 ResourceAwards SAGE AwardsNA-00197-1USERS'Minutes |Shell

53

Corporate Governance and Taxation  

E-Print Network [OSTI]

Accounting and Corporate Governance, Journal of Accounting1997) A Survey of Corporate Governance Journal of FinanceCorporate Governance and Taxation Mihir A. Desai* Harvard

Dyck, Alexander

2004-01-01T23:59:59.000Z

54

Deepwater, Deep Ties, Deep Trouble: A State-Corporate Environmental Crime Analysis of the 2010 Gulf of Mexico Oil Spill.  

E-Print Network [OSTI]

?? The 2010 Gulf of Mexico oil spill was one of the worst environmental disasters of all time. Using the concept of state-corporate environmental crime, (more)

Bradshaw, Elizabeth A.

2012-01-01T23:59:59.000Z

55

Neighborhood Watch: Security and Privacy Analysis of Automatic Meter Reading Systems  

E-Print Network [OSTI]

Neighborhood Watch: Security and Privacy Analysis of Automatic Meter Reading Systems Ishtiaq Rouf gruteser@winlab.rutgers.edu ABSTRACT Research on smart meters has shown that fine-grained en- ergy usage data poses privacy risks since it allows inferences about activities inside the home. While smart meter

Xu, Wenyuan

56

Security Analysis of Selected AMI Failure Scenarios Using Agent Based Game Theoretic Simulation  

SciTech Connect (OSTI)

Information security analysis can be performed using game theory implemented in dynamic Agent Based Game Theoretic (ABGT) simulations. Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. We concentrated our analysis on the Advanced Metering Infrastructure (AMI) functional domain which the National Electric Sector Cyber security Organization Resource (NESCOR) working group has currently documented 29 failure scenarios. The strategy for the game was developed by analyzing five electric sector representative failure scenarios contained in the AMI functional domain. From these five selected scenarios, we characterize them into three specific threat categories affecting confidentiality, integrity and availability (CIA). The analysis using our ABGT simulation demonstrates how to model the AMI functional domain using a set of rationalized game theoretic rules decomposed from the failure scenarios in terms of how those scenarios might impact the AMI network with respect to CIA.

Abercrombie, Robert K [ORNL] [ORNL; Schlicher, Bob G [ORNL] [ORNL; Sheldon, Frederick T [ORNL] [ORNL

2014-01-01T23:59:59.000Z

57

Towards secure virtual directories : a risk analysis framework.  

SciTech Connect (OSTI)

Directory services are used by almost every enterprise computing environment to provide data concerning users, computers, contacts, and other objects. Virtual directories are components that provide directory services in a highly customized manner. Unfortunately, though the use of virtual directory services are widespread, an analysis of risks posed by their unique position and architecture has not been completed. We present a detailed analysis of six attacks to virtual directory services, including steps for detection and prevention. We also describe various categories of attack risks, and discuss what is necessary to launch an attack on virtual directories. Finally, we present a framework to use in analyzing risks to individual enterprise computing virtual directory instances. We show how to apply this framework to an example implementation, and discuss the benefits of doing so.

Claycomb, William R.

2010-07-01T23:59:59.000Z

58

Corporate Profitability and Corporate Longevity  

E-Print Network [OSTI]

49 2 4 6 2.9 Energy Program E 20 32.6 8 1.7 4 8 4 (2.3) F 5 8.1 4 2.4 6 12 (2) (36) G 10 16.3 8 49 6 12 2 (1.1) H 10 16.3 4 0.9 2 4 2 (1.1) With Malar Energy Program E F G H 20 5 10 10 20.0 5.0 10.0 10.0 8 4 8 4 8.0 4...CORPORATE PROFITABILITY AND CORPORATE LONGEVITY Joel S. Gilbert, P.E. Mechanical Technology Incorporated Latham, New York ABSTRACT Many firms have discovered in the last few represents 9 to 12% of the cost of their goods 10 years...

Gilbert, J. S.

1983-01-01T23:59:59.000Z

59

Law and Corporate Governance  

E-Print Network [OSTI]

1997. A survey of corporate governance. J. Finan. 52(2):737-1999. Employees and Corporate Governance. Washington, DC:structural change in corporate governance. J. Law Soc. 27(

Fligstein, Neil; Choo, Jennifer

2005-01-01T23:59:59.000Z

60

Transportation Secure Data Center: Real-World Data for Environmental and Air Quality Analysis (Fact Sheet)  

SciTech Connect (OSTI)

The National Renewable Energy Laboratory (NREL) and the U.S. Department of Transportation (DOT) have launched the free, web-based Transportation Secure Data Center (TSDC). The TSDC (www.nrel.gov/tsdc) preserves respondent anonymity while making vital transportation data available to a broad group of users through secure, online access. The TSDC database provides free-of-charge web-based access to valuable transportation data that can be used for: Emissions and air pollution modeling, Vehicle energy and power analysis, Climate change impact studies, Alternative fuel station planning, and Validating transportation data from other sources. The TSDC's two levels of access make composite data available with simple online registration, and allow researchers to use detailed spatial data after completing a straight forward application process.

Not Available

2013-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "analysis securities corporation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

DOE and Industry Showcase New Control Systems Security Technologies...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

to design a secure, networked control systems architecture. The project is led by Siemens Corporate Research in partnership with Rutgers University, Siemens Energy, and the...

62

Los Alamos National Security LLC Selected to Manage Los Alamos...  

Energy Savers [EERE]

be the management and operations contractor for Los Alamos National Laboratory in New Mexico. Los Alamos National Security LLC is a limited liability corporation made up of...

63

Do More Transparent Corporate Actions Following a Restatement Influence the SEC's Decision to Issue an Enforcement Action?  

E-Print Network [OSTI]

This study examines whether corporate transparency about a restatement influences the Securities and Exchange Commission's (SEC) decision to issue an enforcement action. I consider corporate transparency to be higher when firms initiate...

Files, Rebecca Lynn

2010-10-12T23:59:59.000Z

64

Business-driven security White paper  

E-Print Network [OSTI]

March 2008 Business-driven security White paper Take a holistic approach to business-driven security. #12;Take a holistic approach to business-driven security. 2 Overview Today's corporate leaders face multiple challenges, including the need to innovate in extremely competitive business climates

65

Security Science & Technology | Nuclear Science | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Nuclear Security Science & Technology Border Security Comprehensive Vulnerability and Threat Analysis Consequence Management, Safeguards, and Non-Proliferation Tools Export...

66

THE CONTENT OF CORPORATE FEDERALISM  

E-Print Network [OSTI]

Federalism in Corporate Governance: Protecting ShareholderCollaborative Corporate Governance: Listing Standards, Stateof Care Stadanrd in Corporate Governance 75 Iowa L. Rev. 1,

Bratton, William W.

2004-01-01T23:59:59.000Z

67

Analysis to determine the maximum dimensions of flexible apertures in sensored security netting products.  

SciTech Connect (OSTI)

Although technological advances provide new capabilities to increase the robustness of security systems, they also potentially introduce new vulnerabilities. New capability sometimes requires new performance requirements. This paper outlines an approach to establishing a key performance requirement for an emerging intrusion detection sensor: the sensored net. Throughout the security industry, the commonly adopted standard for maximum opening size through barriers is a requirement based on square inches-typically 96 square inches. Unlike standard rigid opening, the dimensions of a flexible aperture are not fixed, but variable and conformable. It is demonstrably simple for a human intruder to move through a 96-square-inch opening that is conformable to the human body. The longstanding 96-square-inch requirement itself, though firmly embedded in policy and best practice, lacks a documented empirical basis. This analysis concluded that the traditional 96-square-inch standard for openings is insufficient for flexible openings that are conformable to the human body. Instead, a circumference standard is recommended for these newer types of sensored barriers. The recommended maximum circumference for a flexible opening should be no more than 26 inches, as measured on the inside of the netting material.

Murton, Mark; Bouchier, Francis A.; vanDongen, Dale T.; Mack, Thomas Kimball; Cutler, Robert Paul; Ross, Michael P.

2013-08-01T23:59:59.000Z

68

Transportation Secure Data Center: Real-World Data for Planning, Modeling, and Analysis (Fact Sheet)  

SciTech Connect (OSTI)

This fact sheet describes the Transportation Secure Data Center (TSDC) - an NREL-operated resource that provides secure access to detailed GPS travel data for valuable research purposes in a way that protects original participant privacy.

Not Available

2014-01-01T23:59:59.000Z

69

Corporate Culture | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to User GroupInformationE-GovNatural Gas Usage Form

70

Corporate sustainability assessment methodology  

E-Print Network [OSTI]

Sustainability is a vague concept specifically in the context of a corporate world. There are numerous definitions for corporate sustainability and just as many ways of evaluating it. This work attempts to define, structure ...

Pinchuk, Natallia

2011-01-01T23:59:59.000Z

71

Yubing Wang EMC Corporation  

E-Print Network [OSTI]

Yubing Wang EMC Corporation Hopkinton, MA 01748, USA wang_yubing@emc.com Mark Claypool Computer@cs.wpi.edu Zheng Zuo EMC Corporation Hopkinton, MA 01748, USA zuo_zheng@emc.com Abstract--The tremendous increase

Claypool, Mark

72

Our Corporate Residents...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

the quality and variety of the Corporate Residents who call ETTP home. From young start-ups to Fortune 500 corporations, Heritage Center's resources and assets are being fully...

73

Office of Security Policy  

Broader source: Energy.gov [DOE]

The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

74

Experimental Security Analysis of a Modern Automobile Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, and Tadayoshi Kohno  

E-Print Network [OSTI]

Experimental Security Analysis of a Modern Automobile Karl Koscher, Alexei Czeskis, Franziska: {s,dlmccoy,brian,d8anders,hovav,savage}@cs.ucsd.edu Abstract--Modern automobiles are no longer mere evaluate these issues on a modern automobile and demonstrate the fragility of the underlying system

Hu, Fei

75

Dartmouth Computer Science Technical Report TR2011-689 802.15.4/ZigBee Analysis and Security  

E-Print Network [OSTI]

of devices for executing physical attacks against the onboard hardware. Attacks against the PHY and MACDartmouth Computer Science Technical Report TR2011-689 802.15.4/ZigBee Analysis and Security: Tools #12;Ricky A. Melgares Thesis Report 1 Introduction For the last decade or so, we have seen

76

Corporate/Foundation Relations CORPORATE AND FOUNDATION RELATIONS The Offices of Corporate and  

E-Print Network [OSTI]

Corporate/Foundation Relations - 1 - CORPORATE AND FOUNDATION RELATIONS The Offices of Corporate and Foundation Relations (CR, FR) are responsible for coordinating with OSP on applications to key University development and institutional advancement prospects. Applying to Foundations or Corporations. Faculty

Mather, Patrick T.

77

Limited Liability Companies and Corporate Business Structures  

E-Print Network [OSTI]

This publication describes limited liability companies and corporate forms of business organization, including S-Corporations and C-Corporations....

Thompson, Bill; Polk, Wade; Hayenga, Wayne

2009-01-07T23:59:59.000Z

78

Transportation Secure Data Center: Real-world Data for Planning, Modeling, and Analysis (Fact Sheet)  

SciTech Connect (OSTI)

The Transportation Secure Data Center (TSDC) at www.nrel.gov/tsdc provides free, web-based access to detailed transportation data from a variety of travel surveys conducted across the nation. While preserving the privacy of survey participants, this online repository makes vital transportation data broadly available to users from the comfort of their own desks via a secure online connection.

Not Available

2015-01-01T23:59:59.000Z

79

Gone Rogue: An Analysis of Rogue Security Software Campaigns (Invited Paper)  

E-Print Network [OSTI]

victims. A troubling, recent example of this trend is cyber- criminals distributing rogue security or no protection. While the technical and economical aspects of rogue security software (e.g., its distribution programs are distributed by cyber- criminals to generate a financial profit. In fact, after the initial

Yang, Junfeng

80

MIRAGE: A Management Tool for the Analysis and Deployment of Network Security Policies  

E-Print Network [OSTI]

of configuration policies over network security components, such as firewalls, intrusion detection systems, and VPN the advances in the field of network security technologies, such as filtering of traffic, use of encrypted be exploited by unauthorized parties. The use of firewalls, NIDSs (network intrusion detection systems

Garcia-Alfaro, Joaquin

Note: This page contains sample records for the topic "analysis securities corporation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

A Multiple Network Approach to Corporate Governance  

E-Print Network [OSTI]

In this work, we consider Corporate Governance ties among companies from a multiple network perspective. Such a structurenaturally arises from the close interrelation between the Shareholding Network and the Board of Directors network. Inorder to capture the simultaneous effects on both networks on Corporate Governance, we propose to model the Corporate Governance multiple network structure via tensor analysis. In particular, we consider the TOPHITS model, based on the PARAFAC tensor decomposition, to show that tensor techniques can be successfully applied in this context. After providing some empirical results from the Italian financial market in the univariate case, we will show that a tensor-based multiple network approach can reveal important information.

Bonacina, Fausto; Moretto, Enrico; Stefani, Silvana; Torriero, Anna

2014-01-01T23:59:59.000Z

82

Security Policy  

Broader source: Energy.gov [DOE]

The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

83

Strategic philanthropy for cyber security : an extended cost-benefit analysis framework to study cybersecurity  

E-Print Network [OSTI]

The international climate of cyber security is dramatically changing and thus unpredictable. As such, agile yet sustainable solutions are needed, along with an effective and a pragmatic evaluation framework to assess and ...

Cho, Yiseul

2012-01-01T23:59:59.000Z

84

A Security Framework for the Analysis and Design of Software Attestation  

E-Print Network [OSTI]

need for enabling technologies that can validate and verify the integrity of a system's software state cryptographic primitives and protocols useless, a fact that demands for keyless security solutions. Therefore

85

Corporate Headquarters 317 Route 104  

E-Print Network [OSTI]

Sustainable Energy Developments, Inc. is a New York Corporation Founded April 2002 Visualization Phone: (978) 422 7744 Sustainable Energy Developments, Inc. is a New York Corporation Founded Energy Developments, Inc. is a New York Corporation Founded April 2002

Firestone, Jeremy

86

Corporate Information & Computing Services  

E-Print Network [OSTI]

Corporate Information & Computing Services High Performance Computing Report March 2008 Author The University of Sheffield's High Performance Computing (HPC) facility is provided by CiCS. It consists of both Graduate Students and Staff. #12;Corporate Information & Computing Services High Performance Computing

Martin, Stephen John

87

Corporate and Business Plan  

E-Print Network [OSTI]

Corporate and Business Plan 2010-2011 #12;Main addresses Forest Research Alice Holt Lodge Farnham Research's Business Plan 2010-2011 ..........................12 Table Contents Table 1 - Income This Corporate and Business Plan sets out FR's aims and strategic objectives. It describes the Key Performance

88

Smith & Franklin Academic Publishing Corporation  

E-Print Network [OSTI]

Smith & Franklin Academic Publishing Corporation www.smithandfranklin.com Science, Religion | Pages 23 Smith & Franklin Academic Publishing Corporation www.smithandfranklin.com ic origin, meant

Tong, Liang

89

Using Violation and Vulnerability Analysis to Understand the Root-Causes of Complex Security Incidents  

E-Print Network [OSTI]

Incidents C.W. Johnson Dept. of Computing Science, University of Glasgow, Glasgow, Scotland. http Department of Energy has also established the Information Security Resource Center to coordinate the `root is appropriate because it included failures in the underlying audit and control mechanisms. It also stemmed from

Johnson, Chris

90

On Cyber Security for Networked Control Systems  

E-Print Network [OSTI]

cyber-security analysis of the SCADA system of the Gignac water distributioncyber security of SCADA systems managing other infrastructures (e.g. , oil and natural gas distribution

Amin, Saurabh

2011-01-01T23:59:59.000Z

91

Rutgers Business School Corporate Finance  

E-Print Network [OSTI]

Rutgers Business School Corporate Finance Fall 2014 Instructor: Vikram Nanda Office: 5186 to the basic and current research questions and methods ­ theoretical and empirical ­ in corporate finance areas in corporate finance. Among these: · Tirole, Corporate Finance · Finance Handbooks such as: Jarrow

Lin, Xiaodong

92

National Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Mobile Applications StreamingReal-time Data Data System Architectures for National Security Sensor Networks Visual Analytics Risk Analysis Systems Modeling Engineering Analysis...

93

Corporate Operating Experience Program  

Broader source: Energy.gov [DOE]

The DOE Corporate Operating Experience Program helps to prevent the recurrence of significant adverse events/trends by sharing performance information, lessons learned and good practices across the DOE complex.

94

Corporate Energy Management Process  

E-Print Network [OSTI]

. May 21-24, 2013 Corporate Energy Management Process 2 ?Brief introduction to BASF ? BASF Corporate Energy Management ? Management Support ? Goals ? Continuous Improvement ? Best Practices ? Recognition ?Summary ESL-IE-13-05-25 Proceedings...-value products ? Intelligent, sustainable system solutions ? 2012 Sales: ?72.1 Billion ? Employees: 110,000 Company overview BASF ? The Chemical Company ESL-IE-13-05-25 Proceedings of the Thrity-Fifth Industrial Energy Technology Conference New Orleans, LA...

Geiger, T.

2013-01-01T23:59:59.000Z

95

Transportation Secure Data Center: Real-World Data for Planning, Modeling and Analysis (Fact Sheet)  

SciTech Connect (OSTI)

The National Renewable Energy Laboratory (NREL) and the U.S. Department of Transportation (DOT) have launched the free, web-based Transportation Secure Data Center (TSDC). The TSDC (www.nrel.gov/tsdc) preserves respondent anonymity while making vital transportation data available to a broad group of users through secure, online access. The TSDC database gives, metropolitan planning organizations, universities, national laboratories, air quality management districts, disaster planning agencies and auto manufacturers free-of-charge web-based access to valuable transportation data. The TSDC's two levels of access make composite data available with simple online registration, and allow researchers to use detailed spatial data after completing a straight forward application process.

Not Available

2013-01-01T23:59:59.000Z

96

Security analysis of RSA cryptosystem algorithm and its properties  

SciTech Connect (OSTI)

The information technology rapidly development and dramatically changed the life style people, in addition to shortening the distance of communication, but also promote the smooth exchange of information flows. However, derivatives to facilitate the relative safety of these issues, since into the digital information age, the majority of the practitioners of engineering and technical personnel and technical workers in terms of technology, information security is increasingly becoming an important issue. The RSA algorithm was published in 1978. It is a kind of very popular and widely application modem cryptosystem in the world. Even though there are lots of articles to discuss about how to break the RSA, but it is still secure today. In this paper, the authors would like to introduce a variant attack to RSA.

Liu, Chenglian [School of Mathematics and Computer Science, Long Yan university, Lonyan 364012 (China); Guo, Yongning, E-mail: guoyn@163.com, E-mail: linjuanliucaihong@qq.com; Lin, Juan, E-mail: guoyn@163.com, E-mail: linjuanliucaihong@qq.com [Department of Mathematics and Computer Science, Fuqing Branch of Fujian Normal University, Fuqing 350300 (China)

2014-10-06T23:59:59.000Z

97

Quality Assurance Corporate Board | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Assurance Corporate Board Quality Assurance Corporate Board The Office of Environmental Management (EM) Quality Assurance Corporate Board is an executive board that includes both...

98

Corporate Governance, the Environment, and the Internet  

E-Print Network [OSTI]

contemporary society: Corporate governance at a crossroads.R. (1997). A survey of corporate governance. The Journal ofCorporate Governance, the Environment, and the Internet Jane

Andrew, Jane

2003-01-01T23:59:59.000Z

99

Lesson from Fiascos in Russian Corporate Governance  

E-Print Network [OSTI]

Cause Corporate Governance Failures . . . . . . . . . 1.understanding of how corporate governance works. See Heller,Shareholders in Corporate Governance (1999) (mimeo on file

Fox, Merritt; Heller, Michael

2000-01-01T23:59:59.000Z

100

Lesson from Fiascos in Russian Corporate Governance  

E-Print Network [OSTI]

Cause Corporate Governance Failures . . . . . . . . . 1.understanding of how corporate governance works. See Heller,Shareholders in Corporate Governance (1999) (mimeo on file

Fox, Merritt B.; Heller, Michael A.

1999-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "analysis securities corporation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Capital Structure Implications for Corporate Governance  

E-Print Network [OSTI]

A. Roell, 2002, Corporate governance and control, ECGI-Enjoying the quiet life? Corporate governance and managerialGrinstein, 2007, Corporate governance and firm value: The

Rajan, Nishanth

2012-01-01T23:59:59.000Z

102

Corporate Law, Social Norms and Belief Systems  

E-Print Network [OSTI]

fiduciary duties, corporate governance, and takeovers (Partinvestors in corporate governance. Often, the operation ofthe ALIs Principles of Corporate Governance provides that a

Eisenberg, Melvin

1999-01-01T23:59:59.000Z

103

Do corporate political strategies differ from one country to The case of France and Britain  

E-Print Network [OSTI]

Do corporate political strategies differ from one country to the next ? The case of France in particular to determine if corporate political actions differ from one country to the next. To answer. Then, variance analysis is used to modelize corporate political strategies in both countries. Keywords

Boyer, Edmond

104

ASRC AREOSPACE CORPORATION  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

security complex and the Pantex plant, with an option to include the Savannah River Tritium operations. Next, we're going to consider noncompetitively extending the contract for...

105

Power Analysis of Atmel CryptoMemory Recovering Keys from Secure EEPROMs  

E-Print Network [OSTI]

, [...] including physical attacks". We de- veloped a successful power analysis attack on the authentication step knowledge, this is the first power analysis attack on Atmel CryptoMemory products reported in the literature

Verdult, Roel

106

Economics definitions, methods, models, and analysis procedures for Homeland Security applications.  

SciTech Connect (OSTI)

This report gives an overview of the types of economic methodologies and models used by Sandia economists in their consequence analysis work for the National Infrastructure Simulation&Analysis Center and other DHS programs. It describes the three primary resolutions at which analysis is conducted (microeconomic, mesoeconomic, and macroeconomic), the tools used at these three levels (from data analysis to internally developed and publicly available tools), and how they are used individually and in concert with each other and other infrastructure tools.

Ehlen, Mark Andrew; Loose, Verne William; Vargas, Vanessa N.; Smith, Braeton J.; Warren, Drake E.; Downes, Paula Sue; Eidson, Eric D.; Mackey, Greg Edward

2010-01-01T23:59:59.000Z

107

Corporate governance and insider trading  

E-Print Network [OSTI]

I investigate the relation between corporate governance and insider trading by corporate executives. Despite the general view that trade on non-public information adversely affects capital market participants, the impact ...

Rozanov, Konstantin A

2008-01-01T23:59:59.000Z

108

Corporate governance and banking regulation  

E-Print Network [OSTI]

The globalisation of banking markets has raised important issues regarding corporate governance regulation for banking institutions. This research paper addresses some of the major issues of corporate governance as it relates to banking regulation...

Alexander, Kern

109

North American Electric Reliability Corporation Interconnections...  

Office of Environmental Management (EM)

North American Electric Reliability Corporation Interconnections North American Electric Reliability Corporation Interconnections Map of the North American Electric Reliability...

110

Experimental quantum key distribution with finite-key security analysis for noisy channels  

E-Print Network [OSTI]

In quantum key distribution implementations, each session is typically chosen long enough so that the secret key rate approaches its asymptotic limit. However, this choice may be constrained by the physical scenario, as in the perspective use with satellites, where the passage of one terminal over the other is restricted to a few minutes. Here we demonstrate experimentally the extraction of secure keys leveraging an optimal design of the prepare-and-measure scheme, according to recent finite-key theoretical tight-bounds. The experiment is performed in different channel conditions, and assuming two distinct attack models: individual attacks, or general quantum attacks. The request on the number of exchanged qubits is then obtained as a function of the key size and of the ambient quantum bit error rate. The results indicate that viable conditions for effective symmetric, and even one-time-pad, cryptography are achievable.

Davide Bacco; Matteo Canale; Nicola Laurenti; Giuseppe Vallone; Paolo Villoresi

2014-06-17T23:59:59.000Z

111

Forestry Commission England Corporate Plan  

E-Print Network [OSTI]

Forestry Commission England Corporate Plan 2011-15 This is the Corporate Plan for the Forestry Commission in England. It is one of a suite of plans including those for Forestry Commission (GB) and Forest Research. Page 1Forestry Commission England Corporate Plan 2011-15 #12;Page 2Forestry Commission England

112

Press Release Corporate Communications  

E-Print Network [OSTI]

Page: 1/2 Press Release Corporate Communications Karolinenplatz 5 D-64289 Darmstadt Germany Your.ch@pvw.tu- darmstadt.de Internet: http://www.tu- darmstadt.de/presse e-mail: presse@tu-darmstadt.de On Cloud Nine TU). She intends to use the funding for basic research into the programming of software that will be fit

Haller-Dintelmann, Robert

113

CORPORATIONS APAC Tennessee Incorporated  

E-Print Network [OSTI]

Services Deal Cooper Holton PLLC Design Details A.C.A.P. - The Care Foundation Devault Interactive Deweese of Jacksonville Inc. FedEx Corporation First South Financial Credit Union First Tennessee Bank First Tennessee and Music Publishing LLC Macmillan Subscription Services Magnolia Processing Inc Mr. Chris Marable Marsh

Dasgupta, Dipankar

114

Corporate and personal responsibility  

SciTech Connect (OSTI)

Socioeconomic aspects of global climate change are discussed in this paper. Behavioral dimensions are discussed, with a focus on individual and collective value systems. It is suggested that traditional values are not adequate for addressing the climate change issue. Social aspects of the corporate role in climatic change are also briefly discussed.

Jemieson, D. [Univ. of Colorado, Boulder, CO (United States)

1992-12-31T23:59:59.000Z

115

Security Issues in Data Warehousing and Data Mining: Panel Discussion  

E-Print Network [OSTI]

and mining. Position by Linda Schlipper For most enterprises there is no shortage of data. Operational dataSecurity Issues in Data Warehousing and Data Mining: Panel Discussion Bhavani Thuraisingham Corporation Abstract This paper describes the panel discussion on data warehousing, data mining and security

Lin, Tsau Young

116

2014 Annual Workforce Analysis and Staffing Plan Report- Office of Environment, Health, Safety and Security  

Broader source: Energy.gov [DOE]

Managers perform an annual workforce analysis of their organization and develop staffing plans that identify technical capabilities and positions they need to ensure safe operation of defense nuclear facilities.

117

2012 Annual Workforce Analysis and Staffing Plan Report- Office of Health, Safety and Security  

Broader source: Energy.gov [DOE]

Managers perform an annual workforce analysis of their organization and develop staffing plans that identify technical capabilities and positions they need to ensure safe operation of defense nuclear facilities.

118

2011 Annual Workforce Analysis and Staffing Plan Report- Office of Health, Safety and Security  

Broader source: Energy.gov [DOE]

Managers perform an annual workforce analysis of their organization and develop staffing plans that identify technical capabilities and positions they need to ensure safe operation of defense nuclear facilities.

119

Japanese Corporate Governance: The Hidden Problems of the Corporate Law and Their Solutions  

E-Print Network [OSTI]

norm. Japanese Corporate Governance: The Hidden Problems ofsame time. Arguments on corporate governance can be dividedinto two types: corporate governance in the narrow sense and

Shishido, Zenichi

1999-01-01T23:59:59.000Z

120

Industrial Analytics Corporation  

SciTech Connect (OSTI)

The lost foam casting process is sensitive to the properties of the EPS patterns used for the casting operation. In this project Industrial Analytics Corporation (IAC) has developed a new low voltage x-ray instrument for x-ray radiography of very low mass EPS patterns. IAC has also developed a transmitted visible light method for characterizing the properties of EPS patterns. The systems developed are also applicable to other low density materials including graphite foams.

Industrial Analytics Corporation

2004-01-30T23:59:59.000Z

Note: This page contains sample records for the topic "analysis securities corporation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Benchmarking Corporate Energy Management  

E-Print Network [OSTI]

BENCHMARKING CORPORATE ENERGY MANAGEMENT Dr. Douglas L. Norland Director of Research and Industrial Programs Alliance to Save Energy Washington, DC ABSTRACT There is growing interest among energy managers in finding out how their company...'s energy management procedures and perfonnance compare to that of other companies. Energy management involves everything from setting goals and targets to implementing best maintenance practices. This paper, however, discusses benchmarking energy...

Norland, D. L.

122

Climate-derived tensions in Arctic security.  

SciTech Connect (OSTI)

Globally, there is no lack of security threats. Many of them demand priority engagement and there can never be adequate resources to address all threats. In this context, climate is just another aspect of global security and the Arctic just another region. In light of physical and budgetary constraints, new security needs must be integrated and prioritized with existing ones. This discussion approaches the security impacts of climate from that perspective, starting with the broad security picture and establishing how climate may affect it. This method provides a different view from one that starts with climate and projects it, in isolation, as the source of a hypothetical security burden. That said, the Arctic does appear to present high-priority security challenges. Uncertainty in the timing of an ice-free Arctic affects how quickly it will become a security priority. Uncertainty in the emergent extreme and variable weather conditions will determine the difficulty (cost) of maintaining adequate security (order) in the area. The resolution of sovereignty boundaries affects the ability to enforce security measures, and the U.S. will most probably need a military presence to back-up negotiated sovereignty agreements. Without additional global warming, technology already allows the Arctic to become a strategic link in the global supply chain, possibly with northern Russia as its main hub. Additionally, the multinational corporations reaping the economic bounty may affect security tensions more than nation-states themselves. Countries will depend ever more heavily on the global supply chains. China has particular needs to protect its trade flows. In matters of security, nation-state and multinational-corporate interests will become heavily intertwined.

Backus, George A.; Strickland, James Hassler

2008-09-01T23:59:59.000Z

123

Security analysis of boolean algebra based on Zhang-Wang digital signature scheme  

SciTech Connect (OSTI)

In 2005, Zhang and Wang proposed an improvement signature scheme without using one-way hash function and message redundancy. In this paper, we show that this scheme exits potential safety concerns through the analysis of boolean algebra, such as bitwise exclusive-or, and point out that mapping is not one to one between assembly instructions and machine code actually by means of the analysis of the result of the assembly program segment, and which possibly causes safety problems unknown to the software.

Zheng, Jinbin, E-mail: jbzheng518@163.com [School of Mathematics and Computer Science, Long Yan University, Longyan 364012 (China)

2014-10-06T23:59:59.000Z

124

Scalable, Secure Analysis of Social Sciences Data on the Azure Platform  

E-Print Network [OSTI]

behavior on power consumption, and the possibility of influencing the usage profile [3]. Data collection scale social network graphs in a timely and reliable manner? #12;Specifically, our work is motivated by consumer behavior analysis problems in the Smart Power Grids domain where customer energy consumption

Prasanna, Viktor K.

125

Scalable, Secure Energy Information Management for Demand-Response Analysis Yogesh Simmhan1,2  

E-Print Network [OSTI]

, pricing, and demand among utility providers and consumers. While the smart meter infrastructure the events streaming from smart meters through the smart grid, to meaningful analysis and feedback for these decisions comes from diverse sources: smart meters that report near real-time power usage and quality

Prasanna, Viktor K.

126

Decision Support for Choice of Security  

E-Print Network [OSTI]

Decision Support for Choice of Security Solution The Aspect-Oriented Risk Driven Development (AORDD decisions. (4) RDD annotation rules for security risk and security solution variable estimation. (5) The AORDD security solution trade-o analysis and trade-o tool BBN topology. (6) Rule set for how

Langseth, Helge

127

Corporate Board Meeting Minutes  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of Energy Power Systems EngineeringDepartmentSmart GridThird Quarter OverallDepartmentSpaceDebateCorporate

128

Security Walls, LLC, January 14-18, 2013  

Broader source: Energy.gov (indexed) [DOE]

their contributions to health and safety at Security Walls. Security Walls uses the Job Hazard Analysis process to address protective force hazards and develop controls. Subject...

129

Transportation Security  

Broader source: Energy.gov (indexed) [DOE]

Preliminary Draft - For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work...

130

Security Specialist  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve as a Security Specialist with responsibility as the performance monitor for protective force operations conducts line management oversight of the...

131

Global security  

ScienceCinema (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-15T23:59:59.000Z

132

Global security  

SciTech Connect (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-14T23:59:59.000Z

133

Cyber Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyber Security Previous cybersecurity evaluations and designs were often dependent upon personal experience and limited empirical evidence. An LDRD project focused on cybersecurity...

134

Corporate and Foundation Proposal Checklist  

E-Print Network [OSTI]

Corporate and Foundation Proposal Checklist For additional information or assistance, please contact the MSU Foundation Office of Corporate and Foundation Relations at 994-2522 MSU Mission Statement MSU Foundation Mission Statement Needs Statement States the need using hard-core statistics

Dyer, Bill

135

The Farm and Ranch Corporation.  

E-Print Network [OSTI]

rooc - ~ TA245.7 1873 0.1302 The Texas A&M University System Texas Agricultural Extension Service 8-1302 Director Daniel C. Pfannstiel College Station, Texas 77843 The Farm and Ranch Corporation Farm and Ranch Busin 0 nization... in Texas CONTENTS Alternative Forms of Business Organization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 3 Closely Held Farm Corporations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 4...

Brints, Norman; Sartin, Marvin

1980-01-01T23:59:59.000Z

136

Siemens Pittsburgh, PA Novelis Corporation Atlanta, GA  

E-Print Network [OSTI]

Industrial Design ­ Shanghai, China Eaton Corporation ­ Pittsburgh, PA CMU, CTTEC ­ PittsburghSiemens ­ Pittsburgh, PA Novelis Corporation ­ Atlanta, GA Expense

McGaughey, Alan

137

IBM Internet Security Systems Threat Insight Monthly  

E-Print Network [OSTI]

the Report 01 Keylogging, by the numbers 02 Securing the Secure Shell ­ Advanced user authentication and key Page 1 #12;Keylogging, by the numbers Introduction During the course of malware analysis, especially

138

Security Conditions  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

2004-07-08T23:59:59.000Z

139

Security In Information Systems  

E-Print Network [OSTI]

rights, and they are proposing security policies, security planning, personal data protection laws, etc

Candan, Selçuk

140

NNSA Corporate CPEP Process NNSA LOS ALAMOS NATIONAL SECURITY...  

National Nuclear Security Administration (NNSA)

were taken that delivered savings, including a very favorable overhaul of the employee health care plan, but more comprehensive cost control efforts are needed. The Laboratory...

Note: This page contains sample records for the topic "analysis securities corporation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

FY 2006 Sandia Corporation PER Summary | National Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsing ZirconiaPolicy andExsolutionFES6 Performance and Accountability Report FY

142

FY 2007 Sandia Corporation PER Summary | National Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsing ZirconiaPolicy andExsolutionFES6 Performance and7 Meetings,

143

FY 2008 Sandia Corporation PER Summary | National Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsing ZirconiaPolicy andExsolutionFES6 Performance and7AnnualFiscal

144

FY 2009 Sandia Corporation PER Summary | National Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsing ZirconiaPolicy andExsolutionFES6 PerformanceBudget » FYEnvironmental

145

FY 2010 Sandia Corporation PER Summary | National Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsing ZirconiaPolicy andExsolutionFES6 PerformanceBudget

146

FY 2011 Sandia Corporation PER Summary | National Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsing ZirconiaPolicy andExsolutionFES6FY 2011 OIG Recovery Act Plan

147

FY 2012 Sandia Corporation PER Summary | National Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsing ZirconiaPolicy andExsolutionFES6FY 2011 OIG(SC) 2 SC Laboratory

148

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

2005-08-26T23:59:59.000Z

149

Transportation Secure Data Center: Real-World Data for Transportation Planning and Land Use Analysis (Fact Sheet)  

SciTech Connect (OSTI)

The National Renewable Energy Laboratory (NREL) and the U.S. Department of Transportation (DOT) have launched the free, web-based Transportation Secure Data Center (TSDC). The TSDC (www.nrel.gov/tsdc) preserves respondent anonymity while making vital transportation data available to a broad group of users through secure, online access. The TSDC database provides free-of-charge web-based access to valuable transportation data that can be used for: Transit planning, Travel demand modeling, Homeland Security evacuation planning, Alternative fuel station planning, and Validating transportation data from other sources. The TSDC's two levels of access make composite data available with simple online registration, and allow researchers to use detailed spatial data after completing a straight forward application process.

Not Available

2013-01-01T23:59:59.000Z

150

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

2011-06-20T23:59:59.000Z

151

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

152

Sandia Corporate Ombuds Office  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared0 ResourceAwardsSafeguards andSan Juan Montana

153

Sandia Corporate Ombuds Office  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared0 ResourceAwardsSafeguards andSan Juan MontanaCONTRACTORS &

154

Sandia Corporate Ombuds Office  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared0 ResourceAwardsSafeguards andSan Juan MontanaCONTRACTORS &WHAT

155

Hindawi Publishing Corporation PPAR Research  

E-Print Network [OSTI]

Hindawi Publishing Corporation PPAR Research Volume 2006, Article ID 27489, Pages 1­9 DOI 10 these two phenotypes and makes them inseparable [2, 3]. According to the shared precursor hypoth- esis

Abraham, Nader G.

156

Corporate Jobs Tax Credit (Louisiana)  

Broader source: Energy.gov [DOE]

Corporate Jobs Tax Credit is a one-time tax credit ranging from up to $225 for each net new permanent job created as the result of a new business start-up or the expansion of an existing one. ...

157

Sustainable Building Tax Credit (Corporate)  

Broader source: Energy.gov [DOE]

SB 463, enacted in April 2007, established a personal tax credit and a corporate tax credit for sustainable buildings in New Mexico. The tax credits apply to both commercial and residential...

158

Power Reliability at BASF Corporation  

E-Print Network [OSTI]

Power Reliability at BASF Corporation Thomas R. Theising Energy Systems Manager BASF Corporation ABSTRACT: Quality is defined not as what the supplier puts into the product but what the customer gets out and is willing to pay for. Power... of overcoming these problems. The approach of addressing the reliability of its utility systems is common within BASF. This paper will address one of BASF?s approaches to addressing Power Reliability. PROBLEM RECOGNITION: The first issue to address...

Theising, T. R.

2011-01-01T23:59:59.000Z

159

Power Reliability at BASF Corporation  

E-Print Network [OSTI]

Power Reliability at BASF Corporation Thomas R. Theising Energy Systems Manager BASF Corporation ABSTRACT: Quality is defined not as what the supplier puts into the product but what the customer gets out and is willing to pay for. Power... of overcoming these problems. The approach of addressing the reliability of its utility systems is common within BASF. This paper will address one of BASF?s approaches to addressing Power Reliability. PROBLEM RECOGNITION: The first issue to address...

Theising, T. R.

2012-01-01T23:59:59.000Z

160

Tax aspects of collapsible corporations  

E-Print Network [OSTI]

TAX ASPECTS OF COLLAPSIBLE CORPORATIONS A Thesis By HERMAN AUGUST LEHMANN Submitted to the Graduate School of the Agricultural and 14 echanical College of Texas in partial fulfillment of the requirements for the degree of MASTER OF BUSINESS... his sincere appreciation for the guidance and assistance rendered by Professor Thomas Vi'. Leland in the preparation of this thesis. TABLE OF CONTENTS Chapter Page I. INTRODUCTION II. PROBLEMS RELATING TO COLLAPSIBLE CORPORATIONS Definition...

Lehmann, Herman August

2012-06-07T23:59:59.000Z

Note: This page contains sample records for the topic "analysis securities corporation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Transportation Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

162

abolishes corporate income: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

5, 2014 12;Corporate Affiliates Chairman: Mark Ambrose San Diego Site Executive, Raytheon 12;Corporate Affiliates Program Welcome New CAP Members 12;Corporate Affiliates...

163

abolishing corporate income: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

5, 2014 12;Corporate Affiliates Chairman: Mark Ambrose San Diego Site Executive, Raytheon 12;Corporate Affiliates Program Welcome New CAP Members 12;Corporate Affiliates...

164

Culture, Law, and Finance: Cultural Dimensions of Corporate Governance Laws  

E-Print Network [OSTI]

Protection and Corporate Governance, 58 J. Fin. Econ.the legal approach to corporate governance by presenting newlegal rules of corporate governance. 5 The need to take

Licht, Amir N.; Goldschmidt, Chanan; Schwartz, Shalom H.

2001-01-01T23:59:59.000Z

165

Corporate Governance, State-Contingent Control Rights, and Financial Distress  

E-Print Network [OSTI]

20-6:00 pm, Boalt 13 Corporate Governance, State-ContingentRobert K. Rasmussen Corporate Governance, State-ContingentTraditional accounts of corporate governance focus on how

Rasmussen, Robert K.

2004-01-01T23:59:59.000Z

166

U.S. Style Corporate Governance in Korea's Largest Companies  

E-Print Network [OSTI]

E.g. , D. Gordon Smith, Corporate Governance and ManagerialPrinciples of Corporate Governance, http://www.oecd.orgdaf/Bank/OECD Global Corporate Governance Forum, Washington

Ehrlich, Craig; Kang, Dae-Seob

2000-01-01T23:59:59.000Z

167

Corporate Social Responsibility as a Conflict Between Owners  

E-Print Network [OSTI]

Metrick, 2003, Corporate governance and equity prices,to link CSR with corporate governance. Arguably this linkexpenditure and good corporate governance mechanisms are to

Rubin, Amir

2005-01-01T23:59:59.000Z

168

How Big a Problem is U.S. Corporate Governance?  

E-Print Network [OSTI]

suggests that poor corporate governance or managerial powertheories argue that corporate governance deteriorated in thestealing CEOs or poor corporate governance cannot possibly

Kaplan, Steve

2007-01-01T23:59:59.000Z

169

Choice as Regulatory Reform: The Case of Japanese Corporate Governance  

E-Print Network [OSTI]

Globalization of Corporate Governance: Convergence of Formthe idea that U.S. corporate governance was a model for AsiaWoochan Kim, Does Corporate Governance Predict Firms Market

Milhaupt, Curtis

2004-01-01T23:59:59.000Z

170

Nuclear Safety Enforcement Letter issued to Sandia Corporation...  

Broader source: Energy.gov (indexed) [DOE]

Enforcement Letter issued to Sandia Corporation Nuclear Safety Enforcement Letter issued to Sandia Corporation 9222014 Enforcement Letter, Sandia Corporation, September 22, 2014...

171

Karnataka Power Corporation Limited and National Thermal Power...  

Open Energy Info (EERE)

Limited and National Thermal Power Corporation JV Jump to: navigation, search Name: Karnataka Power Corporation Limited and National Thermal Power Corporation JV Place: India...

172

Steffes Corporation Smart Grid RFI: Addressing Policy and Logistical...  

Broader source: Energy.gov (indexed) [DOE]

Steffes Corporation Smart Grid RFI: Addressing Policy and Logistical Challenges Steffes Corporation Smart Grid RFI: Addressing Policy and Logistical Challenges Steffes Corporation...

173

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6.

2011-06-20T23:59:59.000Z

174

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

2005-08-26T23:59:59.000Z

175

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

2007-06-29T23:59:59.000Z

176

Security analysis of the decoy method with the Bennett-Brassard 1984 protocol for finite key lengths  

E-Print Network [OSTI]

This paper provides a formula for the sacrifice bit-length for privacy amplification with the Bennett-Brassard 1984 protocol for finite key lengths when we employ the decoy method. Using the formula, we can guarantee the security parameter for realizable quantum key distribution system. The key generation rates with finite key lengths are numerically evaluated. The proposed method improves the existing key generation rate even in the asymptotic setting.

Masahito Hayashi; Ryota Nakayama

2013-11-19T23:59:59.000Z

177

Security Conditions  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

2000-09-18T23:59:59.000Z

178

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

179

SECURITY HANDBOOK 2 UH IT SECURITY HANDBOOK  

E-Print Network [OSTI]

Administration · 2-Factor Authentication Administration for PCI compliance · Web Site Security Scanning, please contact security@uh.edu. · Web Site Security Scanning · 2-Factor Authentication Administration

Azevedo, Ricardo

180

Matching Gift Companies LEHIGH UNIVERSITY 1 3M Corporation  

E-Print Network [OSTI]

Corporation Foundation The Eaton Charitable Fund Electroline Corporation Eli Lilly and Company FoundationMatching Gift Companies LEHIGH UNIVERSITY 1 3M Corporation Abbott Laboratories Accenture Foundation Technologies, Inc. Air Products Air Products Foundation Albemarle Corporation Alcoa Foundation Alliance Capital

Gilchrist, James F.

Note: This page contains sample records for the topic "analysis securities corporation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

FROM: SUBJECT: USIUK Memorandum of Understanding between National Nuclear Security Administration's (NNSA) Associate Administrator for Defense Nuclear Security (AADNS)...

182

Special Analysis of the Area 3 Radioactive Waste Management Site at the Nevada National Security Site, Nye County, Nevada  

SciTech Connect (OSTI)

This report describes the methods and results of a special analysis (SA) of the Area 3 Radioactive Waste Management Site (RWMS) on the Nevada National Security Site (NNSS). The purpose of the SA is to determine if the approved performance assessment (PA) and composite analysis (CA) (Shott et al., 2001) remain valid. The Area 3 RWMS PA and CA were prepared as a single document and received conditional approval on October 6, 1999. A conditional Disposal Authorization Statement (DAS) for the Area 3 RWMS was issued on October 20, 1999. Since preparation of the approved PA and CA, new information and additional environmental monitoring data have been used to update the PA and CA. At the same time, continual advancements in computer processors and software have allowed improvement to the PA and CA models. Annual reviews of the PA and CA required by U.S. Department of Energy (DOE) Order DOE O 435.1 have documented multiple changes occurring since preparation of the PA and CA. Potentially important changes include: Development of a new and improved baseline PA and CA model implemented in the probabilistic GoldSim simulation platform. A significant increase in the waste inventory disposed at the site. Revision and updating of model parameters based on additional years of site monitoring data and new research and development results. Although changes have occurred, many important PA/CA issues remain unchanged, including the site conceptual model, important features, events, and processes, and the points of compliance. The SA is performed to document the current status of the PA/CA model and to quantitatively assess the impact of cumulative changes on the PA and CA results. The results of the SA are used to assess the validity of the approved PA/CA and make a determination if revision of the PA or CA is necessary. The SA was performed using the Area 3 RWMS, version 2.102, GoldSim model, the current baseline PA/CA model. Comparison of the maximum SA results with the PA performance objectives indicates that there continues to be a reasonable expectation of compliance. The resident exposure scenario was evaluated for compliance with the air pathway and all-pathways annual total effective dose (TED) performance objectives. The maximum mean air pathway TED, 7E-6 millisievert (mSv) at 1,000 years (y) has decreased relative to the approved PA and is significantly less than the 0.1 mSv limit. The maximum mean all-pathways annual TED, 7E-5 mSv at 1,000 y has increased but remains a small fraction of the 0.25 mSv limit. The SA maximum mean radon-222 (222Rn) flux density, 0.03 becquerel per square meter per second (Bq m-2 s-1), has increased relative to the PA results but is significantly less than the 0.74 Bq m-2 s-1 limit. The SA results continue to support a conclusion that the disposed waste inventory is protective of intruders and groundwater resources. The maximum mean intruder TED, 0.01 mSv for an acute construction scenario at the U-3ah/at disposal unit, was less than the 5 mSv performance measure. Site monitoring data and research results continue to support a conclusion that a groundwater pathway will not exist within the 1,000 y compliance period. Projected releases to the environment are a small fraction of the performance objectives. Cost-effective options for reducing releases further are unlikely to exist. Therefore, releases from the Area 3 RWMS are judged to be as low as reasonably achievable. Comparison of the maximum CA result with the 0.3 mSv CA dose constraint indicates that no action is required to reduce the dose from the Area 3 RWMS and all interacting sources of residual radioactive contamination. The SA maximum mean CA annual TED, 0.02 mSv at 1,000 y, has increased from the approved CA result but remains less than 10% of the dose constraint. The CA TED continues to be due predominantly to inhalation of plutonium-239 resuspended from soils contaminated by nuclear weapons tests conducted near the Area 3 RWMS. The SA results estimated with the Area 3 RWMS version 2.102 model indicate that changes to the PA and CA do not

National Security Technologies, LLC, Environmental Management

2012-09-30T23:59:59.000Z

183

Development of the SEA Corporation Powergrid{trademark} photovoltaic concentrator  

SciTech Connect (OSTI)

This report covers the three phase effort to bring the SEA Corporation`s Powergrid{trademark} from the concept stage to pilot production. The three phases of this contract covered component development, prototype module development, and pilot line production. The Powergrid is a photovoltaic concentrator that generates direct current electricity directly from sunlight using a linear Fresnel lens. Analysis has shown that the Powergrid has the potential to be very low cost in volume production. Before the start of the project, only proof of concept demonstrations of the components had been completed. During the project, SEA Corporation developed a low cost extruded Fresnel lens, a low cost receiver assembly using one sun type cells, a low cost plastic module housing, a single axis tracking system and frame structure, and pilot production equipment and techniques. In addition, an 800 kW/yr pilot production rate was demonstrated and two 40 kW systems were manufactured and installed.

Kaminar, N.; Curchod, D.; Daroczi, S.; Walpert, M.; Sahagian, J.; Pepper, J. [Photovoltaics International, LLC, Sunnyvale, CA (United States)

1998-03-01T23:59:59.000Z

184

The Market for Borrowing Corporate Bonds  

E-Print Network [OSTI]

This paper describes the market for borrowing corporate bonds using a comprehensive data set from a major lender. The cost of borrowing corporate bonds is comparable to the cost of borrowing stock, between 10 and 20 basis ...

Asquith, Paul

185

Corporate governance : the case for Asian REITs  

E-Print Network [OSTI]

At the entity level, the design of sound corporate governance mechanisms is critical for REITs that are preparing to go public. At the industry level, issues of transparency and corporate governance are consequential to ...

Tan, Denise, S.M. Massachusetts Institute of Technology

2009-01-01T23:59:59.000Z

186

Corporate Headquarters Tax Credit (West Virginia)  

Broader source: Energy.gov [DOE]

The Corporate Headquarters Tax Credit is available to companies who relocate their corporate headquarters to West Virginia and create 15 new jobs. The credit can offset up to 100% of the tax...

187

CORPORATE SUSTAINABILITY, STRATEGY AND ACCOUNTING CONTROLS: AN  

E-Print Network [OSTI]

PRACTICES Nathalie CRUTZEN, Dr, Assistant Professor, Accenture Chair in Sustainable Strategy, HEC support the implementation of a sustainability strategy in practice. With reference to Malmi and Brown 1 CORPORATE SUSTAINABILITY, STRATEGY AND ACCOUNTING CONTROLS: AN EXPLORATION OF CORPORATE

Boyer, Edmond

188

Analysis of ISO NE Balancing Requirements: Uncertainty-based Secure Ranges for ISO New England Dynamic Inerchange Adjustments  

SciTech Connect (OSTI)

The document describes detailed uncertainty quantification (UQ) methodology developed by PNNL to estimate secure ranges of potential dynamic intra-hour interchange adjustments in the ISO-NE system and provides description of the dynamic interchange adjustment (DINA) tool developed under the same contract. The overall system ramping up and down capability, spinning reserve requirements, interchange schedules, load variations and uncertainties from various sources that are relevant to the ISO-NE system are incorporated into the methodology and the tool. The DINA tool has been tested by PNNL and ISO-NE staff engineers using ISO-NE data.

Etingov, Pavel V.; Makarov, Yuri V.; Wu, Di; Hou, Zhangshuan; Sun, Yannan; Maslennikov, S.; Luo, X.; Zheng, T.; George, S.; Knowland, T.; Litvinov, E.; Weaver, S.; Sanchez, E.

2013-01-31T23:59:59.000Z

189

Corporate Productivity and I/S Investment  

E-Print Network [OSTI]

EG&G Inc. Enron Corp. Entergy Corporation Equitable LifeDuke Power Co. Enron Corp. Entergy Servies Florida Power &

Kraemer, Kenneth L.; Dunkle, Debbie

1997-01-01T23:59:59.000Z

190

Energy Conservation in China North Industries Corporation  

E-Print Network [OSTI]

ENERGY CONSERVATION IN CHINA NORTH INDUSTRIES CORPORATION Wang Tian You, Chen Hua De, Jing Xing Chu, Ling Rui Fu, China North Industries Corporation Beijing, People's Republic of China ABSTRACT This paper describes an overview of the energy... conservation in China North Industries Corporation. It shows how the corporation improves energy effi ciencies and how it changes constitution of fuel-- converting oil consumption to coal. Energy management organization, energy balance in plants...

You, W. T.; De, C. H.; Chu, J. X.; Fu, L. R.

191

Security seal  

DOE Patents [OSTI]

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, Garth W. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

192

Essays on the Market for Corporate Control  

E-Print Network [OSTI]

corporate governance play its role during this process? And why do managers often resist takeovers? The agency model this paper develops is compatible with existing theories on takeovers including neoclassical, inefficient stock market, and the free cash... .............................................................................................................. 72 IV CORPORATE GOVERNANCE DRIVEN TAKEOVERS ........................................... 82 1. The basic setting ................................................................................................. 82 2. Corporate...

Kim, Hyunjung

2011-02-22T23:59:59.000Z

193

IBM Research Zurich 2010 IBM Corporation  

E-Print Network [OSTI]

&D Budget>6 B $ #12;ETH PolyVortrag 2010 Jana Koehler5 IBM Research ­ Zurich © 2010 IBM Corporation IBM - Zurich #12;ETH PolyVortrag 2010 Jana Koehler8 IBM Research ­ Zurich © 2010 IBM Corporation Math;ETH PolyVortrag 2010 Jana Koehler9 IBM Research ­ Zurich © 2010 IBM Corporation Selected Projects #12

194

Corporate Partners with industry to  

E-Print Network [OSTI]

, and a place to search for solutions. Corporate Partner Induct SARL, a French company, sponsored several that meet your company's needs. UCR's College of Engineering ­ Center for Environmental Research'sorcenter'sAdvisoryCouncil · Namedgraduatefellowshipinareaofspecialinterest · Directconnectiontodepartment'sorcenter'sChairorDirector · Company

195

Hindawi Publishing Corporation Prostate Cancer  

E-Print Network [OSTI]

Hindawi Publishing Corporation Prostate Cancer Volume 2011, Article ID 176164, 7 pages doi:10.1155/2011/176164 Clinical Study Effect of Zoledronic Acid on Bone Mineral Density in Men with Prostate Cancer Receiving cancer is well recognized. We assessed the effects of quarterly infusion of zoledronic acid on bone

Ahn, Hongshik

196

Internship opportunity with URS Corporation  

E-Print Network [OSTI]

Internship opportunity with URS Corporation URS is the largest global engineering design firm of undergraduate studies to participate in an internship program with the School of Ocean & Earth Science & Technology (SOEST) at the University of Hawaii. The intent of the internship is two-fold: · To establish

197

The CORAS Tool for Security Risk Analysis Fredrik Vraalsen, Folker den Braber, Mass Soldal Lund, and Ketil Stlen  

E-Print Network [OSTI]

integrates aspects from partly complementary risk analysis techniques, like HazOp [1], FMEA [2], and FTA [3

Stlen, Ketil

198

Analysis of operations and cyber security policies for a system of cooperating Flexible Alternating Current Transmission System (FACTS) devices.  

SciTech Connect (OSTI)

Flexible Alternating Current Transmission Systems (FACTS) devices are installed on electric power transmission lines to stabilize and regulate power flow. Power lines protected by FACTS devices can increase power flow and better respond to contingencies. The University of Missouri Rolla (UMR) is currently working on a multi-year project to examine the potential use of multiple FACTS devices distributed over a large power system region in a cooperative arrangement in which the FACTS devices work together to optimize and stabilize the regional power system. The report describes operational and security challenges that need to be addressed to employ FACTS devices in this way and recommends references, processes, technologies, and policies to address these challenges.

Phillips, Laurence R.; Tejani, Bankim; Margulies, Jonathan; Hills, Jason L.; Richardson, Bryan T.; Baca, Micheal J.; Weiland, Laura

2005-12-01T23:59:59.000Z

199

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 cancels DOE O 472.2 Admin Chg 1.

2011-07-21T23:59:59.000Z

200

KNOWLEDGE: Building, Securing, Sharing & Applying  

E-Print Network [OSTI]

is to educate and provide powerful analytical tools for information sharing, collaboration & decision support against threats to cyber infrastructure and data Data management in emergency situations Risk analysis for challenging problems in data analysis that address present and emerging homeland security threats Our Mission

Note: This page contains sample records for the topic "analysis securities corporation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Bondholders and Securities Class Actions  

E-Print Network [OSTI]

et al. , Does Corporate Governance Matter to Bondholders? ,Private Lenders in Corporate Governance, 57 UCLA L. R EV .Vishny, A Survey of Corporate Governance, 52 J. F IN . 737,

Park, James

2015-01-01T23:59:59.000Z

202

Sandia Corporation (Albuquerque, NM)  

DOE Patents [OSTI]

A method of designing a primary geometry, such as for a forming die, to be used in a powder pressing application by using a combination of axisymmetric geometric shapes, transition radii, and transition spaces to simulate the geometry where the shapes can be selected from a predetermined list or menu of axisymmetric shapes and then developing a finite element mesh to represent the geometry. This mesh, along with material properties of the component to be designed and powder, is input to a standard deformation finite element code to evaluate the deformation characteristics of the component being designed. The user can develop the geometry interactively with a computer interface in minutes and execute a complete analysis of the deformation characteristics of the simulated component geometry.

Ewsuk, Kevin G. (Albuquerque, NM); Arguello, Jr., Jose G. (Albuquerque, NM)

2006-01-31T23:59:59.000Z

203

BASF Corporate Energy Management Process  

E-Print Network [OSTI]

Process 2 2 ? Brief introduction to BASF ? BASF Corporate Energy Management ? Management Support ? Goals ? Continuous Improvement ? Knowledge Sharing ? Recognition ESL-IE-14-05-30 Proceedings of the Thrity-Sixth Industrial Energy Technology Conference... 2013 Sales: 74 Billion Employees: 112,000 Company overview BASF The Chemical Company 3 ESL-IE-14-05-30 Proceedings of the Thrity-Sixth Industrial Energy Technology Conference New Orleans, LA. May 20-23, 2014 Structure of BASFs segments...

Geiger, T.

2014-01-01T23:59:59.000Z

204

Ampulse Corporation | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentrating SolarElectricEnergyCT Biomass Facility Jump to: navigation,Amherst,Ampulse Corporation

205

Ryokuseisha Corporation | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia:FAQ < RAPID Jump to: navigation, searchVirginiaRoosevelt GardensUK-basedRutherford isRyokuseisha Corporation

206

Itochu Corporation | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy Resources Jump to:46 - 429 Throttled (botOpen Energy2005) | OpenIssaquenaItochu Corporation Jump to:

207

Border Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

208

Singapore's Economic Balancing Act: How a Company's Collapse Challenged the Country's New Corporate Governance Regime  

E-Print Network [OSTI]

THE COUNTRY'S NEW CORPORATE GOVERNANCE REGIME Sam RosemeON SINGAPORE'S CORPORATE GOVERNANCE REGIME . A.CORPORATE GOVERNANCE .. B. CHINA'S

Roseme, Sam

2007-01-01T23:59:59.000Z

209

A brief history of Sandia's National security missions.  

SciTech Connect (OSTI)

To help members of the workforce understand what factors contribute to Sandia National Laboratories national security mission, the authors describe the evolution of Sandias core mission and its other mission components. The mission of Sandia first as a division of Los Alamos and later as Sandia Corporation underlies our core nuclear weapon mission of today. Sandias mission changed in 1963 and twice more in the 1970s. This report should help staff and management appreciate the need for mission evolution. A clear definition and communication of a consistent corporate mission statement is still needed.

Drewien, Celeste A.; O'Canna, Myra Lynn; Stikar, John Anthony.

2014-09-01T23:59:59.000Z

210

A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud  

E-Print Network [OSTI]

archetypal schemes. In addition, we provide a new methodology for the analysis of keyed POR schemes will be "encoded" using a code such as a Reed-Solomon code. The code provides redundancy, enabling erasures

211

Designing security into software  

E-Print Network [OSTI]

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

212

Security guide for subcontractors  

SciTech Connect (OSTI)

This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

Adams, R.C.

1991-01-01T23:59:59.000Z

213

Personnel Security Activities  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

2003-03-25T23:59:59.000Z

214

Global Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Global Nuclear Security Both DOE and the National Nuclear Security Administration are working to reduce the risk of nuclear proliferation and provide technologies to improve...

215

Of Enterprise Principles & Corporate Groups: Does Corporate Law Reach Human Rights?  

E-Print Network [OSTI]

conduct by remote affiliates and business partners of vast multinational corporate organizations. Corporate law, in contrast, governs the "internal affairs" of discrete legal entities within a given jurisdiction, each protected by a limited liability...

Harper Ho, Virginia E.

2013-03-01T23:59:59.000Z

216

Cyber Security  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Strategic Programs Division IM-52 George Dudley Director Associate CIO for IT Policy & Governance (IM-20) LeAnn Oliver Porfolio & Analysis Division (IM-21) Robin Crisp Director...

217

Cyber Security  

Energy Savers [EERE]

Programs Division IM-52 Al Gallo (Acting) Director Associate CIO for IT Policy & Governance (IM-20) LeAnn Oliver Porfolio & Analysis Division (IM-21) Robin Crisp Director...

218

Corporations LEHIGH UNIVERSITY 1 Aesculap, Inc.  

E-Print Network [OSTI]

Corporations LEHIGH UNIVERSITY 1 Aesculap, Inc. Air Products Air Products Foundation Arcelor Smarter Fuel, Inc. Sodexo Stryker Orthopaedics Stupp Bros., Inc. Sugarbush Products, Inc. TD Bank Thomson

Napier, Terrence

219

Comments of North American Electric Reliability Corporation ...  

Broader source: Energy.gov (indexed) [DOE]

North American Electric Reliability Corporation (NERC) to DOE Smart Grid RFI: Addressing Policy and Logistical Challenges Comments of North American Electric Reliability...

220

Resources, real options, and corporate strategy  

E-Print Network [OSTI]

211234 Resources, real options, and corporate strategy $D83; G30; G31 Keywords: Real options; Valuation; Corporateparticipants at the Real Options Conference at Northwestern

Bernardo, Antonio; Chowdhry, Bhagwan

1998-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "analysis securities corporation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Hindawi Publishing Corporation Advances in Bioinformatics  

E-Print Network [OSTI]

Hindawi Publishing Corporation Advances in Bioinformatics Volume 2012, Article ID 582765, 12 pages- esis generation--all of these tasks require processing and summarizing large amounts of individual

Gent, Universiteit

222

Duro Corporation: Proposed Penalty (2014-CE-23009)  

Broader source: Energy.gov [DOE]

DOE alleged in a Notice of Proposed Civil Penalty that Duro Corporation failed to certify cooking products as compliant with the applicable energy conservation standards.

223

Gibson Electric Membership Corporation- Energy Efficiency Rebates  

Broader source: Energy.gov [DOE]

Gibson Electric Membership Corporation, in collaboration with the Tennessee Valley Authority, promotes energy efficient building design through its [http://www.energyright.com/ ''energy right'']...

224

North American Electric Reliability Corporation (NERC): Reliability...  

Broader source: Energy.gov (indexed) [DOE]

and winter and summer forecasts; monitors the bulk power systems; and educates, trains, and certifies industry personnel. North American Electric Reliability Corporation...

225

Security guide for subcontractors  

SciTech Connect (OSTI)

This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

Adams, R.C.

1993-06-01T23:59:59.000Z

226

Corporate Plan Page 1Forestry Commission England Corporate Plan 2011-15  

E-Print Network [OSTI]

Corporate Plan 2011-15 Page 1Forestry Commission England Corporate Plan 2011-15 Welcome This is the Corporate Plan for the Forestry Commission in England. It is one of a suite of plans including those for Forestry Commission (GB) and Forest Research. This document has been optimised for on-screen reading

227

Information GRID in the Corporate World Information GRID in the Corporate World  

E-Print Network [OSTI]

Information GRID in the Corporate World Information GRID in the Corporate World .Bogonikolos Zeus Ontology Grid) project, an EU project funded under the Information Society Technologies programme and EAI Tools is discussed. The COG (Corporate Ontology Grid) project addresses the problem of accessing

Paris-Sud XI, Universit de

228

DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY  

SciTech Connect (OSTI)

Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

229

Earl Corporation | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address:011-DNA Jump37. It is classified asThis article is a stub. You can helpEarl Corporation

230

Vairex Corporation | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 South Place: Salt Lake City, Utah Zip:Scale Solar IncVairex Corporation Jump

231

Sipex Corporation | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revisionEnvReviewNonInvasiveExplorationUT-g Grant ofRichardtonManagement, 2009) | Open EnergySCRSipex Corporation

232

Hygrogenics Corporation | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:Year in3.pdfEnergy Health andof EnergyHydrogen-Powered BusesHygrogenics Corporation

233

EXAR Corporation | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision has beenFfe2fb55-352f-473b-a2dd-50ae8b27f0a6 No revision hasESE Alcohol Jump to:EXAR Corporation Jump to:

234

Amphenol Corporation | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300Algoil JumpAltergy SystemsAmericanAmphenol Corporation Jump to: navigation,

235

Tyntek Corporation | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia:FAQ < RAPID Jump to:Seadov Pty LtdSteen,LtdInformationTulsa,TuscarawasFallon | OpenTyntek Corporation Jump

236

Emcore Corporation | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address:011-DNA Jump37. It is classifiedProject) | OpenTexas:CountyElyria, Ohio:Emcore Corporation

237

Etrion Corporation | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address:011-DNA Jump37. It isInformationexplains a4 ClimateEtrion Corporation Jump to:

238

ISE Corporation | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision hasInformation Earth's Heat Jump to:PhotonHolyName HousingIIIDrive LtdINDEX JumpISE Corporation Jump

239

IXYS Corporation | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision hasInformation Earth's Heat Jump to:PhotonHolyName HousingIIIDrive LtdINDEX JumpISEIXYS Corporation

240

Kanematsu Corporation | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision hasInformation Earth's Heat JumpInc Place: EdenOverviewKanematsu Corporation Jump to: navigation,

Note: This page contains sample records for the topic "analysis securities corporation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Dominance of a corporate institutional elite: the extended power of energy  

SciTech Connect (OSTI)

The objective of this study was to outline the patterns whereby large corporations may exert extensive influence over various aspects of socio-political-economic life. By focusing on the largest sector of the economy, energy corporation - and one on which all other sectors are at least partially dependent - the structure through which this corporate influence can be exercised is examined. Results demonstrate the extreme dominance of the entire energy field by the 20 largest petroleum corporations and intrusion of the petroleum industry's vast number of tenacles into all other sectors of the economy. In addition, the excessive number of interconnections between the largest petroleum corporations provide an extensive communication network among so-called competitors. Two major conclusions reached from this analysis were: (1) that within the fragile technostructure of modern America, the energy industry has reached approximate parity with the banking industry concerning its importance to society; and (2) that America during the latter half of the twentieth century has undergone a transition from social rule by a wealthy, social elite class to that of a corporate elite class through their interconnected roles on behalf of the mammoth corporations.

Purdy, D.A.

1983-01-01T23:59:59.000Z

242

Law, Politics and Markets of Corporate Governance: Institutional Investors' Influence  

E-Print Network [OSTI]

S. , The State of Corporate Governance Research, 23 R.What Matters in Corporate Governance? , 22 R. Fin. StudiesLegitimacy and Corporate Governance, 32 Del. J. Corp. L.

Carniglia, Stephen Davis

2013-01-01T23:59:59.000Z

243

Measuring Efficiency in Corporate Law: The Role of Shareholder Primacy  

E-Print Network [OSTI]

17 Empirical studies of corporate governance reforms such asDirectors as a Corporate Governance Mechanism: Theories andMeans and Ends of Corporate Governance, 97 N W .U. L. R EV .

Fisch, Jill

2004-01-01T23:59:59.000Z

244

Preliminary Notice of Violation, Safety and Ecology Corporation...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Safety and Ecology Corporation - EA-2005-03 Preliminary Notice of Violation, Safety and Ecology Corporation - EA-2005-03 June 14, 2005 Issued to Safety and Ecology Corporation...

245

Personnel Security Program Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

2000-11-16T23:59:59.000Z

246

Personnel Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

1998-05-22T23:59:59.000Z

247

Office of Security Assistance  

Broader source: Energy.gov [DOE]

The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

248

NEC Corporation Volkswagen Group of America  

E-Print Network [OSTI]

Dentsu-Aegis Network Ltd. Digital Garage Hisense Co. Ltd. Jaguar Land Rover LG Electronics, Inc Alexander W. Dreyfoos, Jr. Informatix, Inc. The LEGO Group Dorothy Lemelson LG Electronics, Inc. Master. Panasonic Corporation RECRUIT Samsung Electronics Co., Ltd. SingTel TCL Multimedia Toshiba Corporation

249

Corporate Political Donations: Investment or Agency?  

E-Print Network [OSTI]

are negatively correlated with returns. A $10,000 increase in donations is associated with a reduction in annual excess returns of 7.4 basis points. Worse corporate governance is associated with larger donations. Even after controlling for corporate governance...

Aggarwal, Rajesh K.; Meschke, Felix; Wang, Tracy Yue

2012-04-01T23:59:59.000Z

250

Is Sustainability Attractive for Corporate Real Estate  

E-Print Network [OSTI]

Is Sustainability Attractive for Corporate Real Estate Decisions ? Research Center ESSEC Working Is Sustainability Attractive for Corporate Real Estate Decisions? Ingrid Nappi-Choulet Professor ESSEC BUSINESS SCHOOL Real Estate and Sustainable Development Chair nappi@essec.fr Aurélien Décamps Researcher ESSEC

Paris-Sud XI, Université de

251

QUESTIONING THE RELEVANCE OF CORPORATE SOCIAL PERFORMANCE  

E-Print Network [OSTI]

on the limits of the concept of Corporate Social Performance (CSP) and its instrumentation in the form on Corporate Social Performance (CSP) and its instrumentation in the form of models for measuring form, the BSC reduces its search for balance to three essential Stakeholders: employees, customers

Paris-Sud XI, Universit de

252

Corporate Training On-Site Online Global  

E-Print Network [OSTI]

MAKE THE RIGHT MOVE Corporate Training On-Site · Online · Global IMPROVE YOUR COMPETITIVE ADVANTAGE WITH WORLD-CLASS ON-SITE AND ONLINE SOLUTIONS TAILORED TO MEET YOUR BUSINESS AND EMPLOYEE TRAINING NEEDS a competitive advantage depends on how well your staff executes. UCIrvineExtension's Corporate Training helps

Barrett, Jeffrey A.

253

Cyber Security & Smart Grid  

E-Print Network [OSTI]

Cyber Security & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart... and communication protocols. ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Smart Grid Systems ?Current Cyber Security Issues ? Advanced Metering Infrastructure (AMI) Security ? The wireless devices are used in the smart meters located...

Shapiro, J.

2011-01-01T23:59:59.000Z

254

IT Capital Planning Corporate Management Improvement Program (CMIP)  

Broader source: Energy.gov [DOE]

The Corporate Management Improvement Program (CMIP) was initiated by the Department in recognition of the fact that corporate legacy systems that support administrative functions were nearing the...

255

Trony Solar Corporation formerly Shenzhen Trony Science Technology...  

Open Energy Info (EERE)

Trony Solar Corporation formerly Shenzhen Trony Science Technology Development Co Ltd Jump to: navigation, search Name: Trony Solar Corporation (formerly Shenzhen Trony Science &...

256

Sandia National Laboratories: ECIS-Automotive Fuel Cell Corporation...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

ClimateECAbout ECFacilitiesCRFECIS-Automotive Fuel Cell Corporation: Hydrocarbon Membrane Fuels the Success of Future Generation Vehicles ECIS-Automotive Fuel Cell Corporation:...

257

Comments of New England Electric Transmission Corporation on...  

Broader source: Energy.gov (indexed) [DOE]

out of time and comments of New England Electric Transmission Corporation, New England Hydro-Transmission Electric Company, Inc. and New England Hydro-Transmission Corporation and...

258

Shenyang Huachuang Wind Energy Corporation HCWE aka China Creative...  

Open Energy Info (EERE)

Shenyang Huachuang Wind Energy Corporation HCWE aka China Creative Wind Energy Co Ltd Jump to: navigation, search Name: Shenyang Huachuang Wind Energy Corporation (HCWE) (aka China...

259

E-Print Network 3.0 - applications international corporation...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

3 Matching Gift Companies LEHIGH UNIVERSITY 1 3M Corporation Summary: -Plough Foundation Science Applications International Corporation (SAIC) Scripps Howard Foundation...

260

Testimonials - Partnerships in R&D - Capstone Turbine Corporation...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

R&D - Capstone Turbine Corporation Testimonials - Partnerships in R&D - Capstone Turbine Corporation Addthis Text Version The words Office of Energy Efficiency and Renewable Energy...

Note: This page contains sample records for the topic "analysis securities corporation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Corporate Human Resources Information Services (CHIRS) PIA, Office...  

Broader source: Energy.gov (indexed) [DOE]

Corporate Human Resources Information Services (CHIRS) PIA, Office of Human Capitol Management Corporate Human Resources Information Services (CHIRS) PIA, Office of Human Capitol...

262

Temperature measurement in the Intel Efraim Rotem Mobile Platform Group, Intel corporation  

E-Print Network [OSTI]

, Intel corporation Jim Hermerding Mobile platform Group, Intel corporation Cohen Aviad - Microprocessor

Paris-Sud XI, Universit de

263

Integrating Security and Real-Time Requirements Using Covert  

E-Print Network [OSTI]

ÐConcurrency control, covert channel analysis, database systems, locking protocols, multilevel security, real secure database systems use an access control mechanism based on the Bell- LaPadula model [3]. This model. Multilevel security requirements introduce a new dimension to transaction processing in real-time database

Son, Sang H.

264

Towards OLAP Security Design Survey and Research Issues  

E-Print Network [OSTI]

as an open system. Especially exploratory OLAP analysis requires this open nature; security controls may hinder the analytical discovery process. Keywords Data warehouse, OLAP, security, access control, design on the technical issues laying an accent on authorization and access control. We explore these security issues

Song, Il-Yeol

265

Using Operational Security (OPSEC) to Support a Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security: Defense in Depth Strategies The Chief Information Officer (CIO) at the U 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program...

266

Information Security: Coordination of Federal Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue...

267

corporate | netl.doe.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon Capture and Storageconvert program | National

268

Analysis of the optical coupling of wavelength-shifting fibers to organic liquid scintillator filled fluoropolymer tubes for industrial and nuclear security applications  

E-Print Network [OSTI]

Industrial and nuclear security applications continue to push radiation detection development into new and exciting frontiers. In this work, an innovative detection module is developed and tested for use in a cosmic ray ...

Schools, Chad C

2014-01-01T23:59:59.000Z

269

Information Security Group IY5512 Computer Security  

E-Print Network [OSTI]

for process that controls interactions between users and resources. · Access control system implements Information Security Group Agenda · Access control basics · ACLs and capabilities · Information flow policies· Information flow policies · Bell-LaPadula Model · Role-Based Access Control · Resources 3 Information Security

Mitchell, Chris

270

INFRASTRUCTURE SECURITY & ENERGY  

E-Print Network [OSTI]

price monitoring #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERYINFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Real Time Monitoring of Energy Infrastructure Status Patrick Willging, PE Office of Electricity

Schrijver, Karel

271

Data Security ROCKVILLE, MD  

E-Print Network [OSTI]

by respondent identification. Thus, data security plans must be tailored to the unique needs and concerns of each data set: a "one-security-plan-fits-all" approach is neither feasible nor desirable. Nevertheless

Rau, Don C.

272

Special Analysis for the Disposal of the Neutron Products Incorporated Sealed Source Waste Stream at the Area 5 Radioactive Waste Management Site, Nevada National Security Site, Nye County, Nevada  

SciTech Connect (OSTI)

The purpose of this special analysis (SA) is to determine if the Neutron Products Incorporated (NPI) Sealed Sources waste stream (DRTK000000056, Revision 0) is suitable for disposal by shallow land burial (SLB) at the Area 5 Radioactive Waste Management Site (RWMS). The NPI Sealed Sources waste stream consists of 850 60Co sealed sources (Duratek [DRTK] 2013). The NPI Sealed Sources waste stream requires a special analysis (SA) because the waste stream 60Co activity concentration exceeds the Nevada National Security Site (NNSS) Waste Acceptance Criteria (WAC) Action Levels.

Shott, Gregory

2014-08-31T23:59:59.000Z

273

Personnel Security Program Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

2001-07-12T23:59:59.000Z

274

Security system signal supervision  

SciTech Connect (OSTI)

This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

1991-09-01T23:59:59.000Z

275

Sandia National Laboratories: Shimizu Corporation  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -theErikGroundbreaking Work onClimateSemiconductorShaheen-Portman Bill

276

Sandia National Laboratories: Ktech Corporation  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -theErik Spoerke SSLS ExhibitIowa State University SandiaJimOpenEnergyInfo WikiKtech

277

Solar Energy Systems Tax Credit (Corporate) (Iowa)  

Broader source: Energy.gov [DOE]

Iowa offers a 15% corporate tax credit for solar energy systems. The credit is based on the federal tax credits for solar; a taxpayer may claim 50% of the value of the [http://dsireusa.org...

278

CORPORATE GOVERNANCE AND MANAGEMENT EARNINGS FORECAST  

E-Print Network [OSTI]

1 CORPORATE GOVERNANCE AND MANAGEMENT EARNINGS FORECAST QUALITY: EVIDENCE FROM FRENCH IPOS Anis attributes, ownership retained, auditor quality, and underwriter reputation and management earnings forecast quality measured by management earnings forecast accuracy and bias. Using 117 French IPOs, we find

Paris-Sud XI, Université de

279

Managing preventative maintenance activities at Intel Corporation  

E-Print Network [OSTI]

The work for this thesis was completed at Intel Corporation in Colorado Springs, Colorado at Fab 23, a semiconductor fabrication facility making flash memory. The project focused on evaluating and managing preventative ...

Fearing, Rebecca Cassler

2006-01-01T23:59:59.000Z

280

Selecting Financing Strategies to Overcome Corporate Barriers  

E-Print Network [OSTI]

, or longer than the list of presentations at this year's Industrial Energy Conservation Conference. This paper will focus on two of the many potential answers. First, the corporate decision making process in industrial firms presents many obstacles to a final...

Michaelson, M. L.

1984-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "analysis securities corporation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Renewable Energy Production Tax Credit (Corporate)  

Broader source: Energy.gov [DOE]

Enacted in 2002, the New Mexico Renewable Energy Production Tax Credit provides a tax credit against the corporate income tax of one cent per kilowatt-hour for companies that generate electricity...

282

Bio-Heating Oil Tax Credit (Corporate)  

Broader source: Energy.gov [DOE]

Maryland allows individuals and corporations to take an income tax credit of $0.03/gallon for purchases of biodiesel used for space heating or water heating. The maximum credit is $500 per year. It...

283

3M's Corporate Approach to Energy Management  

E-Print Network [OSTI]

recognized as a corporate environmental management leader and continues to demonstrate such leadership via the company's participation in EPA's Climate Wise and its own internal programs such as Pollution Prevention Pays (3P). Pamela R. Bingham...

Schultz, S. C.; Bingham, P. R.

284

Law as Economy: Convention, Corporation, Currency  

E-Print Network [OSTI]

1015 Law as Economy: Convention, Corporation, Currency Ritu Birla* I. Law as Economy: Nomos. Law Inside/Outside Economy of an orthodox faith in economy as universal law, that is, in the free market as the law of the universe

Barrett, Jeffrey A.

285

CORPORATE AND STRATEGIC PLANNING Faculty planning workbook  

E-Print Network [OSTI]

.............................................................................33 Staffing & workforce planningCORPORATE AND STRATEGIC PLANNING Faculty planning workbook Humanities, Law & Social Studies Outcomes from 2008/09 Confirmation of progress during 2009/10 Faculty planning for 2010/11 ­ 2012/13 #12

286

Alternative Energy Development Incentive (Corporate) (Utah)  

Broader source: Energy.gov [DOE]

The Alternative Energy Development Incentive (AEDI) is a post-performance non-refundable tax credit for 75% of new state tax revenues (including, state, corporate, sales and withholding taxes) over...

287

Lemnos interoperable security project.  

SciTech Connect (OSTI)

With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

Halbgewachs, Ronald D.

2010-03-01T23:59:59.000Z

288

Service Oriented Architecture in Network Security - a novel Organisation in Security Systems  

E-Print Network [OSTI]

Current network security systems are a collection of various security components, which are directly installed in the operating system. These check the whole node for suspicious behaviour. Armouring intrusions e.g. have the ability to hide themselves from being checked. We present in this paper an alternative organisation of security systems. The node is completely virtualized with current virtualization systems so that the operating system with applications and the security system is distinguished. The security system then checks the node from outside and the right security components are provided through a service oriented architecture. Due to the running in a virtual machine, the infected nodes can be halted, duplicated, and moved to other nodes for further analysis and legal aspects. This organisation is in this article analysed and a preliminary implementation showing promising results are discussed.

Hilker, Michael

2008-01-01T23:59:59.000Z

289

An ethernet/IP security review with intrusion detection applications  

SciTech Connect (OSTI)

Supervisory Control and Data Acquisition (SCADA) and automation networks, used throughout utility and manufacturing applications, have their own specific set of operational and security requirements when compared to corporate networks. The modern climate of heightened national security and awareness of terrorist threats has made the security of these systems of prime concern. There is a need to understand the vulnerabilities of these systems and how to monitor and protect them. Ethernet/IP is a member of a family of protocols based on the Control and Information Protocol (CIP). Ethernet/IP allows automation systems to be utilized on and integrated with traditional TCP/IP networks, facilitating integration of these networks with corporate systems and even the Internet. A review of the CIP protocol and the additions Ethernet/IP makes to it has been done to reveal the kind of attacks made possible through the protocol. A set of rules for the SNORT Intrusion Detection software is developed based on the results of the security review. These can be used to monitor, and possibly actively protect, a SCADA or automation network that utilizes Ethernet/IP in its infrastructure. (authors)

Laughter, S. A.; Williams, R. D. [Dept. of Electrical and Computer Engineering, Univ. of Virginia, Box 400743, 351 McCormick Rd., Charlottesville, VA 22904-4743 (United States)

2006-07-01T23:59:59.000Z

290

Tag: Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR TableE9. TotalNumberSecurity Tag: Security

291

Tag: security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR TableE9.security Tag: security Displaying 1 -

292

Secure Storage | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 % bP.SecureSecure Storage

293

What is Security? A perspective on achieving security  

SciTech Connect (OSTI)

This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

Atencio, Julian J.

2014-05-05T23:59:59.000Z

294

Investor Sentiment and Antitrust Law as Determinants of Corporate Ownership Structure: The great Merger Wave of 1897 to 1903  

E-Print Network [OSTI]

for Corporate Control: Corporate Governance and EconomicCurrent Trends in Corporate Governance: Going From London toon international corporate governance. This paper retrieves

Cheffins, Brian R.

2002-01-01T23:59:59.000Z

295

Investor Sentiment and Antitrust Law as Determinants of Corporate Ownership Structure: The Great Merger Wave of 1897 to 1903  

E-Print Network [OSTI]

for Corporate Control: Corporate Governance and EconomicCurrent Trends in Corporate Governance: Going From London toon international corporate governance. This paper retrieves

Cheffins, Brian

2002-01-01T23:59:59.000Z

296

Page 1Forestry Commission England Corporate Plan 2012-13 Corporate Plan  

E-Print Network [OSTI]

Page 1Forestry Commission England Corporate Plan 2012-13 Corporate Plan 2012-13 #12;Page 2Forestry the environment and supporting a strong green economy, and the Forestry Commission is well placed to contribute toward this. The recent report from the Forestry Regulation Task Force highlighted the need to make

297

Securing Internet Routing Securing Internet Routing  

E-Print Network [OSTI]

Plane (Routing protocols): S h b d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc Set up paths between nodes [Kent Lynn Seo 00] Listen-Whisper, etc., Data Plane: Given d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc Set up paths

Goldberg, Sharon

298

Australian Efforts to Promote Corporate Social Responsibility: Can Disclosure Alone Suffice?  

E-Print Network [OSTI]

they comply with the ASX Corporate Governance Principles andAUSTRALIAN EFFORTS Corporate Governance Principles, isand Gary O'Donovan, Corporate Governance and Environmental

von Nessen, Paul

2009-01-01T23:59:59.000Z

299

Comparative Corporate Governance: Findings from a Workshop, March 14-15, 2008  

E-Print Network [OSTI]

of Chicago, Corporate Governance: History withoutComparative Corporate Governance Findings from a Workshopon Comparative Corporate Governance, March 14-15, 2008

Huberty, Mark; Newsome, Akasemi; Street, Alex; Ziegler, J. Nicholas

2008-01-01T23:59:59.000Z

300

The Maximands of Corporate Governance: A Theory of Values and Cognitive Style  

E-Print Network [OSTI]

roots of American corporate governance. See Mark J. Roe, Aover the maximands of corporate governance. 4 My goal ison the maximands of corporate governance, that identifies

Licht, Amir

2004-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "analysis securities corporation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Firm Value and Corporate Governance: How the Former Determines the Latter  

E-Print Network [OSTI]

The Econometrics of Corporate Governance Studies, Cambridge,Firm Value and Corporate Governance: How the FormerAbstract A model of corporate governance must explain (i)

Hermalin, Benjamin E.

2008-01-01T23:59:59.000Z

302

Changes in Japanese Corporate Law and Governance: Revisiting the Convergence Debate  

E-Print Network [OSTI]

of Path Dependence in Corporate Governance and Ownership.Convergence in Corporate Governance and Its Implicatins.2001). Globalizing Corporate Governance: Convergence of Form

Shishido, Zenichi

2004-01-01T23:59:59.000Z

303

Imitate or Differentiate? Evaluating the validity of corporate social responsibility ratings  

E-Print Network [OSTI]

and A. Metrick Corporate Governance and Equity Prices. investors on corporate governance and social http://it focuses directly on corporate governance and is much more

Chatterji, Aaron K; Levine, David I. I.

2008-01-01T23:59:59.000Z

304

Corporate Governance from a Comparative Perspective: Specific Applications of the Duty of Loyalty in Korea  

E-Print Network [OSTI]

transaction. Kon S. Kim, Corporate Governance in Korea, 8 J.ARTICLES CORPORATE GOVERNANCE FROM A COMPARATIVEof Care Standard in Corporate Governance, 75 IOWA L. REV. 1,

Kwon, Jae Yeol

2004-01-01T23:59:59.000Z

305

The Role of Boards of Directors in Corporate Governance: A Conceptual Framework & Survey  

E-Print Network [OSTI]

Era of Heightened Corporate Governance, New York UniversityThe Emergence of Corporate Governance from Wall St. to MainAnna, ed. , Corporate Governance and Firm Organization,

Adams, Renee; Hermalin, Benjamin E.; Weisbach, Michael S.

2008-01-01T23:59:59.000Z

306

EMERGENCY RESPONSE FOR HOMELAND SECURITY: LESSONS LEARNED AND THE  

E-Print Network [OSTI]

EMERGENCY RESPONSE FOR HOMELAND SECURITY: LESSONS LEARNED AND THE NEED FOR ANALYSIS Larson, R;Emergency Response for Homeland Security: Lessons Learned and the Need for Analysis By Richard C. Larson. In this section, we are particularly concerned with `lessons learned' and with recurring decisions that must

Wang, Hai

307

Energy Security Initiatives Update  

Broader source: Energy.gov (indexed) [DOE]

-- Aurora Electrical System Vulnerability Assessment and Mitigation Actions FUPWG-EEI CA Net Zero Energy Initiative (Vandenberg AFB, CA) Energy Security Tiger Team Visit (Ft...

308

Energy Security Initiatives Update  

Broader source: Energy.gov [DOE]

Presentationgiven at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meetinglists Federal government energy security initiatives.

309

Control Systems Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

systems within the nation's critical infrastructure. The CSSP assists control systems vendors and asset ownersoperators in identifying security vulnerabilities and developing...

310

Industrial Security Specialst  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve in a developmental capacity assisting senior specialists in carrying out a variety of industrial security and oversight functions.

311

Nevada National Security Site  

Broader source: Energy.gov [DOE]

HISTORYIn 1950, President Truman established what is now known as the Nevada National Security Site (NNSS) to perform nuclear weapons testing activities. In support of national defense initiatives...

312

Securing Cloud Storage Service.  

E-Print Network [OSTI]

?? Cloud computing brought flexibility, scalability, and capital cost savings to the IT industry. As more companies turn to cloud solutions, securing cloud based services (more)

Zapolskas, Vytautas

2012-01-01T23:59:59.000Z

313

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

the safety, security and effectiveness of the nuclear deterrent without underground nuclear testing, consistent with the principles of the Stockpile Management Program...

314

TEC Information Security  

Broader source: Energy.gov (indexed) [DOE]

External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

315

Cyber Security Architecture Guidelines  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

2001-03-08T23:59:59.000Z

316

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Project Reviews, etc., except those specifically reserved for the Administrator for the National Nuclear Security Administration and the Deputy Secretary. cc: Mike Hickman. NA-Stl...

317

NNSA orders security enhancements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

badge or valid driver's license) before proceeding, and will be asked to vouch for other vehicle occupants. LOS ALAMOS, N. M., Dec. 21, 2012-The National Nuclear Security...

318

Hazardous Material Security (Maryland)  

Broader source: Energy.gov [DOE]

All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

319

National Nuclear Security Administration  

Broader source: Energy.gov (indexed) [DOE]

and Related Structures within TA-3 at Los Alamos National Laboratory, Los Alamos, New Mexico U. S. Department of Energy National Nuclear Security Administration Los Alamos Area...

320

National Security Initiatives | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Our Primary Thrusts A science-based approach to cyber security Develop breakthrough nuclear forensic science Expand bioinformatics program to address critical biosurveillance gaps...

Note: This page contains sample records for the topic "analysis securities corporation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

PKI-based security for peer-to-peer information sharing  

SciTech Connect (OSTI)

The free flow of information is the feature that has made peer-to-peer information sharing applications popular. However, this very feature holds back the acceptance of these applications by the corporate and scientific communities. In these communities it is important to provide confidentiality and integrity of communication and to enforce access control to shared resources. We present a number of security mechanisms that can be used to satisfy these security requirements. Our solutions are based on established and proven security techniques and we utilize existing technologies when possible. As a proof of concept, we have developed an information sharing system, called scishare, which integrates a number of these security mechanisms to provide a secure environment for information sharing. This system will allow a broader set of user communities to benefit from peer-to-peer information sharing.

Berket, Karlo; Essiari, Abdelilah; Muratas, Artur

2004-05-02T23:59:59.000Z

322

Tax consequences of separating corporate businesses  

E-Print Network [OSTI]

Lips ARY g ~ggpgF ep &Ex' TAX CONSEQUENCES OP SEPARATING CORPORATE BUSINESSES A Thesis Gordon D. Zuber Submitted to the Graduate School of the Agricultural and lNechanical College of Texas in partial fulfillment of the requirements... for the Degree of MASTER OP BUSINESS ADl/iliVISTRAT ION August 1958 Ma)or Subject: Accounting TAX CONSEQUENCES OP SEPARATING CORPORATE BUSINESSES A Thesis Gordon D. Zuber Approved as to style and content by: Chairman of the Committee ead. o the Divas...

Zuber, Gordon Dewey

2012-06-07T23:59:59.000Z

323

Enhance your Cyber Security Knowledge  

E-Print Network [OSTI]

Enhance your Cyber Security Knowledge About NPS CS FUNDAMENTALS: Create a strong foundational by increasing the effectiveness of the armed forces of the United States and its allies. Cyber Security-4015 About CISR #12;Cyber Security Adversarial Techniques Cyber Security Defense Cyber Security Fundamentals

324

Operational Security (OPSEC) Reminder | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Operational Security (OPSEC) Reminder Operational Security (OPSEC) Reminder June 3, 2014 - 1:24pm Addthis Operational Security (OPSEC) Reminder Operational Security (OPSEC)...

325

Grid Information Security Functional Requirement - Fulfilling Information Security of a Smart Grid System  

E-Print Network [OSTI]

This paper describes the background of smart information infrastructure and the needs for smart grid information security. It introduces the conceptual analysis to the methodology with the application of hermeneutic circle and information security functional requirement identification. Information security for the grid market cover matters includes automation and communications industry that affects the operation of electric power systems and the functioning of the utilities that manage them and its awareness of this information infrastructure has become critical to the reliability of the power system. Community benefits from of cost savings, flexibility and deployment along with the establishment of wireless communications. However, concern revolves around the security protections for easily accessible devices such as the smart meter and the related communications hardware. On the other hand, the changing points between traditional versus smart grid networking trend and the information security importance on...

Ling, Amy Poh Ai; 10.5121/ijgca.2011.2201

2011-01-01T23:59:59.000Z

326

Corporations LEHIGH UNIVERSITY 1 The Accenture Foundation, Inc.  

E-Print Network [OSTI]

Corporations LEHIGH UNIVERSITY 1 The Accenture Foundation, Inc. Air Products Air Products Foundation ArcelorMittal Atofina Chemicals Foundation B. Braun Medical, Inc. (BD) Becton, Dickinson Foundation, Inc. IBM Corporation Insaco, Inc. Just Born, Inc. Lutron Electronics Company, Inc. Lutron

Gilchrist, James F.

327

Corporate Energy Management: A Survey of Large Manufacturing Companies  

E-Print Network [OSTI]

Corporate practices regarding energy management vary substantially from one company to another. Some companies pay close attention to energy use throughout the corporation while others pay scant attention. This paper first describes what we call...

Norland, D. L.; Lind, L.

328

Corporate Gray Military Officer Job Fair | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Corporate Gray Military Officer Job Fair Corporate Gray Military Officer Job Fair September 11, 2014 8:00AM to 1:30PM EDT Location: 6715 Commerce Street, Springfield, VA 22150 POC:...

329

Secure Manufacturing | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 % bP.Secure Manufacturing

330

analysis risk models: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

of the analysis Paris-Sud XI, Universit de 6 IT Security Risk Analysis based on Business Process Models enhanced with Security Requirements Computer Technologies and...

331

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

1997-03-27T23:59:59.000Z

332

December 2003 SECURITY CONSIDERATIONS  

E-Print Network [OSTI]

December 2003 SECURITY CONSIDERATIONS IN THE INFORMATION SYSTEM DEVELOPMENT LIFE CYCLE Shirley security early in the information system development life cycle (SDLC), you may be able to avoid higher and a generic system development life cycle for illustrative purposes, the basic con cepts can be applied

Perkins, Richard A.

333

DATABASE SECURITY APPLICATIONS  

E-Print Network [OSTI]

DATABASE SECURITY #12;APPLICATIONS #12;Polyinstantiation for Cover Stories Ravi S. Sandhu and Sushil Jajodia* Center for Secure Information Systems & Department of Information and Software Systems Engineering George Mason University Falffax, VA 22030, USA emaih {sandhu, jajodia}Qsitevax.gmu.edu Abstract

Sandhu, Ravi

334

Incidents of Security Concern  

SciTech Connect (OSTI)

This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

Atencio, Julian J.

2014-05-01T23:59:59.000Z

335

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

1992-10-19T23:59:59.000Z

336

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Cancels DOE P 470.1.

2010-12-29T23:59:59.000Z

337

SELECTING INFORMATION TECHNOLOGY SECURITY  

E-Print Network [OSTI]

be selected and used within the organization's overall program to man age the design, development, and maintenance of its IT security infra structure, and to protect the confiden tiality, integrity objectives and to protect information. Guide to Selecting Information Technology Security Products NIST

338

December 2007 SECURING EXTERNAL  

E-Print Network [OSTI]

devices such as desktop and laptop computers, personal digital assistants (PDAs), and cell phones. These teleworkers use devices such as desktop and laptop computers, personal digital assistants (PDAs), and cellDecember 2007 SECURING EXTERNAL COMPUTERS AND OTHER DEVICES USED BY TELEWORKERS SECURING EXTERNAL

339

Indirection and computer security.  

SciTech Connect (OSTI)

The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

Berg, Michael J.

2011-09-01T23:59:59.000Z

340

International Nuclear Security  

SciTech Connect (OSTI)

This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

Doyle, James E. [Los Alamos National Laboratory

2012-08-14T23:59:59.000Z

Note: This page contains sample records for the topic "analysis securities corporation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Office of Departmental Personnel Security  

Broader source: Energy.gov [DOE]

The Office of Departmental Personnel Security serves as the central leader and advocate vested with the authority to ensure consistent and effective implementation of personnel security programs Department-wide (including for the National Nuclear Security Administration (NNSA).

342

Departmental Cyber Security Management Policy  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

2001-05-08T23:59:59.000Z

343

Rutgers Business School Professor Simi Kedia Corporate Finance  

E-Print Network [OSTI]

Rutgers Business School Professor Simi Kedia Corporate Finance Office: WP - 1132 26:390:572 Phone Objectives: The objective of this course is to introduce doctoral students to research in corporate finance of capital, corporation finance and the theory of investment, American Economic Review. ***S. Myers and N

Lin, Xiaodong

344

Hindawi Publishing Corporation Comparative and Functional Genomics  

E-Print Network [OSTI]

Hindawi Publishing Corporation Comparative and Functional Genomics Volume 2007, Article ID 47304, 7 pages doi:10.1155/2007/47304 Meeting Report eGenomics: Cataloguing Our Complete Genome Collection III, Michigan State University, East Lansing, MI 48824, USA 3 The Institute for Genomic Research, 9712 Medical

Newcastle upon Tyne, University of

345

Hindawi Publishing Corporation Advances in Civil Engineering  

E-Print Network [OSTI]

Hindawi Publishing Corporation Advances in Civil Engineering Volume 2009, Article ID 353960, 10 and Josep Dolz3 1 Instituto de Ingenier´ia, UNAM, Ciudad Universitaria, Edificio 5, Cub. 403, 04510 M´exico, DF, Mexico 2 Facultad de Ingenier´ia, UNAM, Ciudad Universitaria, 04510 M´exico, DF, Mexico 3

Fernandez, Thomas

346

Senior projectS corporate Sponsored  

E-Print Network [OSTI]

--Professor, Computer Engineering | http://users.soe.ucsc. edu/~larrabee/Site/Professor_Tracy_Larrabee.html Charlie McSenior projectS program corporate Sponsored Partner's Day May 31, 2012 Baskin School of Engineering earning their engineering degree and fulfilling this capstone design sequence. Our students who have

Stuart, Josh

347

Hindawi Publishing Corporation International Journal of Hypertension  

E-Print Network [OSTI]

Hindawi Publishing Corporation International Journal of Hypertension Volume 2012, Article ID 405892 of Hypertension: The Experience of the Cardiovascular Health Program in Chilean Primary Health Care Centers. To assess the blood pressure control and cardiovascular risk factors (CVRFs) in a population of hypertensive

Gleeson, Joseph G.

348

Hindawi Publishing Corporation Journal of Nanotechnology  

E-Print Network [OSTI]

Hindawi Publishing Corporation Journal of Nanotechnology Volume 2010, Article ID 801789, 42 pages a general interest in both fundamental and practical nanotechnology. Over the past 20 years, research's -orbital axis vector (POAV) #12;2 Journal of Nanotechnology (0,0) (1,0) (2,0) (3,0) (4,0) (5,0) (1,1) (2

Wang, Yan Alexander

349

Researcher at Cerner Corporation Cerner Overview  

E-Print Network [OSTI]

Researcher at Cerner Corporation Cerner Overview Cerner is the leading U.S. supplier of healthcare Qualifications Minimum Qualifications: · Master's degree in biostatistics, epidemiology, MIS or related field. Preferred Qualifications: · Intermediate knowledge of both traditional statistical methods and modern

Jornsten, Rebecka

350

A generalized simulation model for corporate planning  

E-Print Network [OSTI]

, Head of the Department of Industrial Engineering, at Texas ASM University, a" quoted by Hilton (24): "It /corporate pianning7 should serve as the roadmap of tomorrow. We see it as an azzalysis of all the activities that influ- ence ozr business...

Viswanathan, Krishnan

2012-06-07T23:59:59.000Z

351

Hindawi Publishing Corporation International Journal of Ecology  

E-Print Network [OSTI]

Hindawi Publishing Corporation International Journal of Ecology Volume 2012, Article ID 939862, 17 pages doi:10.1155/2012/939862 Review Article Parallel Ecological Speciation in Plants? Katherine L speciation, known as parallel ecological speciation, is one of several forms of evidence for ecology's role

Rieseberg, Loren

352

URANIUM MILLING ACTIVITIES AT SEQUOYAH FUELS CORPORATION  

E-Print Network [OSTI]

Sequoyah Fuels Corporation (SFC) describes previous operations at its Gore, Oklahoma, uranium conversion facility as: (1) the recovery of uranium by concentration and purification processes; and (2) the conversion of concentrated and purified uranium ore into uranium hexafluoride (UF 6), or the reduction of depleted uranium tetrafluoride (UF 4) to UF 6. SFC contends that these

unknown authors

353

UNIVERSITY OF KENTUCKY AND AFFILIATED CORPORATIONS  

E-Print Network [OSTI]

UNIVERSITY OF KENTUCKY AND AFFILIATED CORPORATIONS ENDOWMENT INVESTMENT POLICY Amended January 30, 2014 University of Kentucky University of Kentucky Research Foundation The Fund for Advancement of Education and Research in the UK Medical Center University of Kentucky Mining Engineering Foundation, Inc

Hayes, Jane E.

354

Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop  

SciTech Connect (OSTI)

The workshop theme is Cyber Security: Beyond the Maginot Line Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglected or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyberspace including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more . . .

Sheldon, Frederick T [ORNL; Krings, Axel [ORNL; Yoo, Seong-Moo [ORNL; Mili, Ali [ORNL; Trien, Joseph P [ORNL

2006-01-01T23:59:59.000Z

355

Input from Key Stakeholders in the National Security Technology Incubator  

SciTech Connect (OSTI)

This report documents the input from key stakeholders of the National Security Technology Incubator (NSTI) in developing a new technology incubator and related programs for southern New Mexico. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes identification of key stakeholders as well as a description and analysis of their input for the development of an incubator.

None

2008-01-31T23:59:59.000Z

356

Headquarters Facilities Master Security Plan  

Energy Savers [EERE]

Security Briefing. Failure of any employee to complete the SF-312 results in the termination of hisher security clearance and denial of access to classified matter. The badge...

357

Energy Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Security SHARE Energy Security ORNL has supported the DOE Cybersecurity for Energy Delivery Systems (CEDS) program in making advances in cybersecurity capabilities for...

358

Smart-Grid Security Issues  

SciTech Connect (OSTI)

TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

2010-01-29T23:59:59.000Z

359

ANNUAL SECURITY FIRE SAFETY REPORT  

E-Print Network [OSTI]

ANNUAL SECURITY AND FIRE SAFETY REPORT OCTOBER 1, 2013 DARTMOUTH COLLEGE http................................................................................................................................................................... 7 ANNUAL SECURITY REPORT........................................................................................................................9 PREPARATION OF THE REPORT AND DISCLOSURE OF CRIME STATISTICS

360

National Security Science  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy LoginofNational SecuritySecurity

Note: This page contains sample records for the topic "analysis securities corporation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

The Effects of the Political-Legal Environment and Corporate Characteristics on Mergers and Acquisitions in India, 1991-2005  

E-Print Network [OSTI]

an analysis of the transition in public policy governing corporations between 1991 and 2005. The second part tests hypotheses derived from resource dependence theory relating to a firms decision to acquire. The analysis explores the factors that explain why...

Ranganathan, Shilpa

2012-07-16T23:59:59.000Z

362

whistleblower | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08Intermittent3,1996 http://www.eia.doe.govANALYSIS

363

March 24, 2008 Databases: Security 1 Database Security and Authorization  

E-Print Network [OSTI]

to control login process by the DBMS Inference control The countermeasures to statistical database security database #12;March 24, 2008 Databases: Security 3 Chapter Outline Introduction Access Control Methods Policy System-related Security levels and categories Security Threats Loss of integrity Loss

Adam, Salah

364

INSTITUTE FOR CYBER SECURITY Application-Centric Security  

E-Print Network [OSTI]

INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

Sandhu, Ravi

365

Global Biofuel Production and Food Security: Implications for Asia Pacific  

E-Print Network [OSTI]

Global Biofuel Production and Food Security: Implications for Asia Pacific 56th AARES Annual Conference Fremantle, Western Australia 7-10 February 2012 William T. Coyle #12;Global Biofuel Production and Food Security: Making the Connection --Past analysis and the evidence about biofuels and spiking

366

AMALGAMATED SECURITY COMMUNITIES  

E-Print Network [OSTI]

This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

Harvey, Andrew Stephen

2011-08-31T23:59:59.000Z

367

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

1988-01-22T23:59:59.000Z

368

Safety, Security & Fire Report  

E-Print Network [OSTI]

2013 Safety, Security & Fire Report Stanford University #12;Table of Contents Public Safety About the Stanford University Department of Public Safety Community Outreach & Education Programs Emergency Access Transportation Safety Bicycle Safety The Jeanne Clery and Higher Education Act Timely Warning

Straight, Aaron

369

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

2007-05-25T23:59:59.000Z

370

Operations Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

1992-04-30T23:59:59.000Z

371

Engineering secure software  

E-Print Network [OSTI]

In recent years computer software has gained notoriety for the endemic nature of security problems in software. These problems have been exploited with malicious intent by attackers. Most attempts at fixing these problems have been after...

Jetly, Prateek

2001-01-01T23:59:59.000Z

372

Incidents of Security Concern  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

2004-03-17T23:59:59.000Z

373

SECURING RADIO FREQUENCY IDENTIFICATION (RFID)  

E-Print Network [OSTI]

business process for an organization; as a result, the security risks for RFID systems and the controls for an organization; as a result, the security risks for RFID systems and the controls available to address themMay 2007 SECURING RADIO FREQUENCY IDENTIFICATION (RFID) SYSTEMS SECURING RADIO FREQUENCY

374

ANNUAL SECURITY & FIRE SAFETY REPORT  

E-Print Network [OSTI]

ANNUAL SECURITY & FIRE SAFETY REPORT 2014 A guide to policies, procedures, practices, and programs implemented to keep students, faculty, and staff safe and facilities secure. www.montana.edu/reports/security.pdf #12;Inside this Report 2014 Annual Security and Fire Safety Report for Reporting Year 2013

Maxwell, Bruce D.

375

Lemnos Interoperable Security Program  

SciTech Connect (OSTI)

The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or ?? tunnels?, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

2012-01-31T23:59:59.000Z

376

PRIVACY AND SECURITY OF PERSONAL INFORMATION  

E-Print Network [OSTI]

Chapter 1 PRIVACY AND SECURITY OF PERSONAL INFORMATION Economic Incentives and Technological for many, the economic #12;2 incentives have not generated widespread adoption, and government in University acquisti@andrew.cmu.edu Abstract I discuss the evolution of the economic analysis of privacy

Sadeh, Norman M.

377

People's Electric Corporation | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentrating Solar Powerstories onFocusOski Energy LLCPascoag UtilityPennsylvaniaPeopleCorporation

378

Jackson Purchase Energy Corporation | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentrating Solar Powerstories on climate compatibleInformation offApproachEnergy Corporation

379

Meridian Biorefining Corporation | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentrating Solar Powerstories on climateJunoMedanosElectric CoMeridian Biorefining Corporation

380

NanoPV Corporation | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy Resources Jump to:46 -Energieprojekte3Informationof Energy Calculator29NanoPV Corporation Jump to:

Note: This page contains sample records for the topic "analysis securities corporation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Nanomaterials Discovery Corporation NDC | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy Resources Jump to:46 -Energieprojekte3Informationof Energy Calculator29NanoPV Corporation

382

Cosmos Energy Corporation | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentratingRenewable Solutions LLC Jump to:Information NewAdvisorsCosmos Energy Corporation

383

Miami Power Corporation | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy Resources Jump to:46 -Energieprojekte GmbH Jump to: navigation,MetalysisMi GmbHMiami Power Corporation

384

PPP Equipment Corporation | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy ResourcesLoading map...(UtilityCounty,Orleans County,PPP Equipment Corporation Jump to: navigation,

385

Powder River Energy Corporation | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy ResourcesLoadingPenobscot County, Maine:Plug Power IncPowder River Energy Corporation Place: Sundance,

386

GainSpan Corporation | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentrating Solar Power Basics (TheEtelligenceGainSpan Corporation Jump to: navigation, search

387

Gateway Energy Services Corporation (Pennsylvania) | Open Energy  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentrating Solar Power Basics (TheEtelligenceGainSpan Corporation JumpGarkane Energy

388

Gateway Energy Services Corporation | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentrating Solar Power Basics (TheEtelligenceGainSpan Corporation JumpGarkane EnergyGateway

389

Catamount Resources Corporation CRC | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartmentAUDIT REPORT Americium/CuriumSunways JVGroup India Jump to:Corporation CRC Jump

390

Safety and Security Interface Technology Initiative  

SciTech Connect (OSTI)

Safety and Security Interface Technology Initiative Mr. Kevin J. Carroll Dr. Robert Lowrie, Dr. Micheal Lehto BWXT Y12 NSC Oak Ridge, TN 37831 865-576-2289/865-241-2772 carrollkj@y12.doe.gov Work Objective. Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. Supporting Excellence in Operations Through Safety Analysis, (workshop theme) includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is Safeguards/Security Integration with Safety. This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security Documentation Integration, Configuration Control, and development of a shared tool box of information/successes. Specific Benefits. The expectation or end state resulting from the topical report and associated implementation plan includes: (1) A recommended process for handling the documentation of the security and safety disciplines, including an appropriate change control process and participation by all stakeholders. (2) A means to package security systems with sufficient information to help expedite the flow of that system through the process. In addition, a means to share successes among sites, to include information and safety basis to the extent such information is transportable. (3) Identification of key security systems and associated essential security elements being installed and an arrangement for the sites installing these systems to host an appropriate team to review a specific system and determine what information is exportable. (4) Identification of the security systems essential elements and appropriate controls required for testing of these essential elements in the facility. (5) The ability to help refine and improve an agreed to control set at the manufacture stage.

Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie

2007-05-01T23:59:59.000Z

391

The Olympus Scandal and Corporate Governance Reform: Can Japan Find a Middle Ground between the Board Monitoring Model and Management Model  

E-Print Network [OSTI]

OLYMPUS SCANDAL AND CORPORATE GOVERNANCE REFORM: CAN JAPANScandal and Corporate Governance Issues A. Background of theunder Japan's Corporate Governance System ..

Aronson, Bruce E.

2012-01-01T23:59:59.000Z

392

Special Analysis for the Disposal of the Idaho National Laboratory Unirradiated Light Water Breeder Reactor Rods and Pellets Waste Stream at the Area 5 Radioactive Waste Management Site, Nevada National Security Site, Nye County, Nevada  

SciTech Connect (OSTI)

The purpose of this special analysis (SA) is to determine if the Idaho National Laboratory (INL) Unirradiated Light Water Breeder Reactor (LWBR) Rods and Pellets waste stream (INEL103597TR2, Revision 2) is suitable for disposal by shallow land burial (SLB) at the Area 5 Radioactive Waste Management Site (RWMS). The INL Unirradiated LWBR Rods and Pellets waste stream consists of 24 containers with unirradiated fabricated rods and pellets composed of uranium oxide (UO2) and thorium oxide (ThO2) fuel in zirconium cladding. The INL Unirradiated LWBR Rods and Pellets waste stream requires an SA because the 229Th, 230Th, 232U, 233U, and 234U activity concentrations exceed the Nevada National Security Site (NNSS) Waste Acceptance Criteria (WAC) Action Levels.

Shott, Gregory [NSTec

2014-08-31T23:59:59.000Z

393

Social Impact Management Plans: Innovation in corporate and public policy  

SciTech Connect (OSTI)

Social Impact Assessment (SIA) has traditionally been practiced as a predictive study for the regulatory approval of major projects, however, in recent years the drivers and domain of focus for SIA have shifted. This paper details the emergence of Social Impact Management Plans (SIMPs) and undertakes an analysis of innovations in corporate and public policy that have put in place ongoing processes assessment, management and monitoring to better identify the nature and scope of the social impacts that might occur during implementation and to proactively respond to change across the lifecycle of developments. Four leading practice examples are analyzed. The International Finance Corporation (IFC) Performance Standards require the preparation of Environmental and Social Management Plans for all projects financed by the IFC identified as having significant environmental and social risks. Anglo American, a major resources company, has introduced a Socio-Economic Assessment Toolbox, which requires mine sites to undertake regular assessments and link these assessments with their internal management systems, monitoring activities and a Social Management Plan. In South Africa, Social and Labour Plans are submitted with an application for a mining or production right. In Queensland, Australia, Social Impact Management Plans were developed as part of an Environmental Impact Statement, which included assessment of social impacts. Collectively these initiatives, and others, are a practical realization of theoretical conceptions of SIA that include management and monitoring as core components of SIA. The paper concludes with an analysis of the implications for the practice of impact assessment including a summary of key criteria for the design and implementation of effective SIMPs. -- Highlights: Social impact management plans are effective strategies to manage social issues. They are developed in partnership with regulatory agencies, investors and community. SIMPs link assessment to ongoing management and address social and community issues. SIMPs clarify responsibilities in the management of impacts, opportunities and risks. SIMPs demonstrate a shift to include management as a core component of SIA practice.

Franks, Daniel M., E-mail: d.franks@uq.edu.au [Centre for Social Responsibility in Mining, The University of Queensland, Sustainable Minerals Institute, St Lucia, Brisbane, Queensland 4072 (Australia); Vanclay, Frank, E-mail: frank.vanclay@rug.nl [Department of Cultural Geography, Faculty of Spatial Sciences, The University of Groningen, P.O. Box 800, 9700 AV Groningen (Netherlands)] [Department of Cultural Geography, Faculty of Spatial Sciences, The University of Groningen, P.O. Box 800, 9700 AV Groningen (Netherlands)

2013-11-15T23:59:59.000Z

394

Global Material Security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickr Flickr Editor'sshortGeothermal HeatStartedGirlsMaterial Security |

395

physical security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 Joint JOULECorrective Actions Program LANL TRU

396

safeguards and security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 JointProgram Consortium -

397

Nuclear Security 101 | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohnSecurityControls |Navy NuclearNuclear Science

398

Nuclear Security Enterprise | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohnSecurityControls |Navy NuclearNuclear

399

International Nuclear Security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickrinformation for and NovelFEG-SEMInterlibrary LoanExercises |Security

400

Defense Nuclear Security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to UserProduct: CrudeOffice ofINLNuclear Security | National Nuclear

Note: This page contains sample records for the topic "analysis securities corporation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment ofDepartment ofofOxfordVeteransAdministrationPhysical Security Systems |

402

The climate change and energy security nexus  

SciTech Connect (OSTI)

The study of the impacts of climate change on national and interna-tional security has grown as a research field, particularly in the last five years. Within this broad field, academic scholarship has concentrated primarily on whether climate change is, or may become, a driver of violent conflict. This relationship remains highly contested. However, national security policy and many non-governmental organizations have identified climate change as a threat multiplier in conflict situations. The U.S. Department of Defense and the United Kingdom's Ministry of Defense have incorporated these findings into strategic planning documents such as the Quadrennial Defense Review and the Strategic Defence and Security Review. In contrast to the climate-conflict nexus, our analysis found that academic scholarship on the climate change and energy security nexus is small and more disciplinarily focused. In fact, a search of social science litera-ture found few sources, with a significant percentage of these works attribut-able to a single journal. Assuming that policymakers are more likely to rely on broader social science literature than technical or scientific journals, this leaves a limited foundation. This then begged the question: what are these sources? We identified a body of grey literature on the nexus of climate change and energy security of a greater size than the body of peer-reviewed social science literature. We reviewed fifty-eight recent reports, issue briefs, and transcripts to better understand the nexus of climate change and energy security, as well as to gain insight about the questions policymakers need answered by those undertaking the research. In this article, we describe the nature of the sources reviewed, highlight possible climate change and energy security linkages found within those sources, identify emerging risks, and offer conclusions that can guide further research.

King, Marcus Dubois [George Washington University; Gulledge, Jay [ORNL

2013-01-01T23:59:59.000Z

403

"Enlightened Shareholder Value": Corporate Governance Beyond the Shareholder - Stakeholder Divide  

E-Print Network [OSTI]

Ho FINAL.docx Do Not Delete 11/15/2010 4:38 PM Enlightened Shareholder Value: Corporate Governance Beyond the Shareholder-Stakeholder Divide Virginia Harper Ho* I. INTRODUCTION... on Risk Management and Corporate Governance, Oct. 2009, for their generous comments on earlier drafts. All remaining errors are mine alone. Ho FINAL.docx Do Not Delete 11/15/2010 4:38 PM 60 The Journal of Corporation Law [Vol. 36:1 1. The Enlightened...

Harper Ho, Virginia E.

2010-01-01T23:59:59.000Z

404

The Shareholder Derivative Action and Good Corporate Governance in China: Why the Excitement is Actually for Nothing  

E-Print Network [OSTI]

Noack & Dirk Zetzsche, Corporate Governance Reform in Ger-Protection Seriously? Corporate Governance in the UnitedDonald C. Clarke, Corporate Governance in China: An Overview

Zhang, Zhong

2011-01-01T23:59:59.000Z

405

On the Export of U.S.-Style Corporate Fiduciary Duties to Other Cultures: Can A Transplant Take?  

E-Print Network [OSTI]

able to evolve corporate governance patterns that resemble2002. How To Fix Corporate Governance, Business Week 69-78 (Cultural Theory of Corporate Governance Systems, Delaware

Stout, Lynn A.

2005-01-01T23:59:59.000Z

406

Southwest Gas Corporation- Combined Heat and Power Program  

Broader source: Energy.gov [DOE]

Southwest Gas Corporation (SWG) offers incentives to qualifying commercial and industrial facilities who install efficient Combined Heat and Power systems (CHP). CHP systems produce localized, on...

407

Alternative Energy Projects by Rural Electric Membership Corporations (Indiana)  

Broader source: Energy.gov [DOE]

This legislation encourages the development of alternative energy projects using clean or renewable resources by rural electric membership corporations. The section establishes the Office of...

408

2008_Transition_Corporate_Overview_Book_One.pdf | Department...  

Broader source: Energy.gov (indexed) [DOE]

2008TransitionCorporateOverviewBookOne.pdf More Documents & Publications DOE Transition Documents - 2008 DOE Organization Chart - May 2, 2014 DOE Organization Chart - October...

409

Corporate Clean Energy Investment Trends in Brazil, China, India...  

Open Energy Info (EERE)

Brazil, China, India and South Africa Jump to: navigation, search Name Corporate Clean Energy Investment Trends in Brazil, China, India and South Africa AgencyCompany...

410

Electric, Street Railway, and Gas Corporations (South Dakota)  

Broader source: Energy.gov [DOE]

This legislation contains provisions pertaining to a corporation formed for the purpose of constructing, maintaining and operating a street railway or railways; generating, transmitting or...

411

azure dynamics corporation: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Coverage of Students on Medically Necessary Leave of Absence 116 Navneet Gulati Eaton Corporation, Engineering Websites Summary: autonomy to human-scale power-comparable...

412

Corn Belt Energy Corporation- Residential Energy Efficiency Rebate Program  

Broader source: Energy.gov [DOE]

Corn Belt Energy Corporation (CBEC), in association with the Wabash Valley Power Association, provides its customers with the "Power Moves" energy efficiency rebate program. Through this program,...

413

Preliminary Notice of Violation, Fluor Daniel Fernald Corporation...  

Broader source: Energy.gov (indexed) [DOE]

July 29, 1997 Issued to Fluor Daniel Fernald Corporation related to Corrective Actions Implementation Deficiencies at the Fernald Environmental Management Project, (EA-97-05) On...

414

Accounting for Taste: Board Member Preferences and Corporate Policy Choices  

E-Print Network [OSTI]

This paper explores whether firms that share common directors also pursue similar corporate policies. Using a sample of 885 U.S. firms with common directors, we find ...

Richardson, Scott

2003-05-23T23:59:59.000Z

415

EERE Partner Testimonials- Robert Gleason, Capstone Turbine Corporation  

Broader source: Energy.gov [DOE]

Robert Gleason, Senior Vice President of Product Development for Capstone Turbine Corporation describes the benefits of a strategic partnership with the U.S. Department of Energy.

416

EERE Partner Testimonials- Darren Jamison, Capstone Turbine Corporation  

Broader source: Energy.gov [DOE]

Darren Jamison, President and CEO of Capstone Turbine Corporation, shares his experience of partnering with the U.S. Department of Energy.

417

Southwest Gas Corporation- Commercial Energy Efficient Equipment Rebate Program  

Broader source: Energy.gov [DOE]

Southwest Gas Corporation (SWG) offers rebates to commercial customers in Nevada who purchase energy efficient natural gas equipment. Eligible equipment includes clothes washers, storage water...

418

Southwest Gas Corporation- Commercial High-Efficiency Equipment Rebate Program  

Broader source: Energy.gov [DOE]

Southwest Gas Corporation (SWG) offers rebates to commercial customers in Arizona who purchase energy efficient natural gas equipment. Eligible equipment includes natural gas storage and tankless...

419

Southwest Gas Corporation- Residential and Builder Efficiency Rebate Program (Arizona)  

Broader source: Energy.gov [DOE]

Southwest Gas Corporation (SWG) offers rebates to residential customers in Arizona who purchase and install energy efficient natural gas tankless water heaters, clothes dryers, windows, attic...

420

Security Administration Production Office,  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 %Security and

Note: This page contains sample records for the topic "analysis securities corporation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

SecuritySmart  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0SecuritySmart March 2009

422

Safety, Security & Environment  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared0 ResourceAwardsSafeguards and SecuritySafety for

423

Personnel Security - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2.2 Admin Chg 1, Personnel Security by Mark Pekrul Functional areas: Administrative Change, Personnel Security, Safety and Security The order establishes requirements that will...

424

Personnel Security - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

72.2 Chg 1, Personnel Security by Mark Pekrul Functional areas: Personnel Security, Security, Human Capital The order establishes requirements that will enable DOE to operate a...

425

Security enhanced with increased vehicle inspections  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security enhanced with increased vehicle inspections Security measures increase as of March: vehicle inspections won't delay traffic New increased security procedures meet LANL's...

426

On Cyber Security for Networked Control Systems  

E-Print Network [OSTI]

her students on security of process control systems. I amcyber-security tools for process control systems. In theon the security mechanisms of process control systems, few

Amin, Saurabh

2011-01-01T23:59:59.000Z

427

ata security feature: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing...

428

Chapter 2Chapter 2 A Complete CorporateA Complete Corporate  

E-Print Network [OSTI]

average cost of capital (WACC) Estimate expected future free cash flows (FCF)(FCF) Find value of company investors called the weightedinvestors--called the weighted average cost of capital (WACC) DES Chapter 2 13 #12;Steps in the corporate value model Determine weighted average cost of capitalDetermine weighted

Schubart, Christoph

429

Corporate Fellows Council | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to User GroupInformationE-GovNatural Gas Usage FormCorporate Fellows

430

Lithium Technology Corporation | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision hasInformation Earth's Heat JumpInc Place:KeystoneSolarList ofPassiveMachineBalance JumpCorporation

431

Corporate International Operations | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160Benin:EnergyWisconsin:2003) |Cordova Electric Coop, IncKilauea Name: Corporate

432

Diversified Energy Corporation | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address:011-DNA Jump to:52c8ff988c1Dering Harbor,DiscountDiversified Energy Corporation Jump to:

433

Workplace Charging Challenge Partner: Sears Holdings Corporation |  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment ofDepartment of EnergyofDepartment of Energy Sears Holdings Corporation

434

Applied Films Corporation | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300AlgoilEnergy Information the Army Permit:Films Corporation Jump to:

435

HydroChina Corporation | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartmentAUDIT REPORTOpen EnergyBoard"Starting a new pageHuadeHydroChina Corporation

436

Schering Plough Corporation | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revisionEnvReviewNonInvasiveExplorationUT-g Grant ofRichardton AbbeyA Jump to:Schering Plough Corporation Jump to:

437

Sound Geothermal Corporation | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia:FAQ < RAPID Jump to:Seadov Pty Ltd Jump to:InformationSolergyAddison,Souderton,Geothermal Corporation Jump

438

Vu1 Corporation | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 South Place: Salt Lake City,Division of OilGuyane Jump to:Vu1 Corporation

439

Jupiter Oxygen Corporation | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy Resources Jump to:46 - 429 Throttled (botOpen6 Climate ZoneJeromeCounty isJupiter Oxygen Corporation

440

Verenium Corporation (Massachusetts) | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentrating SolarElectric Coop,Save Energy NowNew HampshireValero RefiningCorporation

Note: This page contains sample records for the topic "analysis securities corporation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Bhoruka Power Corporation Ltd | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartmentAUDIT REPORT Americium/CuriumSunways JV Jump to:Bhoruka Power Corporation Ltd Jump

442

StarSolar Corporation | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia:FAQ < RAPID Jump to:Seadov Pty Ltd JumpGTZHolland,0162112°,St.Stanly County, NorthStarSolar Corporation Jump

443

SunPower Corporation | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia:FAQ < RAPID Jump to:Seadov Pty LtdSteen, Minnesota:36052°, -97.6114217°SunEnergy Power CorpSunOneCorporation

444

Technology Ventures Corporation TVC | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia:FAQ < RAPID Jump to:Seadov Pty LtdSteen,Ltd Jump to:Taos County, NewTechnologiekontor BremerhavenCorporation

445

Empire Natural Gas Corporation | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address:011-DNA Jump37. It is classifiedProject) |Emeryville,Empire Natural Gas Corporation Place:

446

EnerVault Corporation | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address:011-DNA Jump37. It is classifiedProject)EnerVault Corporation Jump to: navigation, search

447

IST Energy Corporation | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision hasInformation Earth's Heat Jump to:PhotonHolyName HousingIIIDrive LtdINDEX JumpISE CorporationIST

448

Safety and Security What do Safety/Security work with?  

E-Print Network [OSTI]

Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with Police reports · Education in "First medical aid" · Education in laboratory safety #12;If something

449

GAANN -Computer Systems Security GAANN Computer Systems Security  

E-Print Network [OSTI]

GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important? ­ Computing devices have a large impact on our daily life ­ Guaranteeing that the devices perform as desired

Alpay, S. Pamir

450

Securing Financial Incentives for Energy Efficiency Projects: How to Create Corporate Support  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage » SearchEnergyDepartment of Energy Moniz: WhatM-1 Section JOFFICE OF

451

Securing Financial Incentives for Energy Efficiency Projects: How to Create Corporate Support  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage » SearchEnergyDepartment of Energy Moniz: WhatM-1 Section JOFFICE OFAlcoa

452

National Security System Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

2007-03-08T23:59:59.000Z

453

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

1995-09-28T23:59:59.000Z

454

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

2011-07-21T23:59:59.000Z

455

September 2004 INFORMATION SECURITY  

E-Print Network [OSTI]

September 2004 INFORMATION SECURITY WITHIN THE SYSTEM DEVELOPMENT LIFE CYCLE Annabelle Lee of Standards and Technology Many System Development Life Cycle (SDLC) models exist that can be used. This model assumes that the system will be delivered near the end of its life cycle. Another SDLC model uses

456

Headquarters Security Operations  

Broader source: Energy.gov [DOE]

DOE strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; manages access authorization functions; ensures that executives and dignitaries are fully protected, and supports efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

457

Metaphors for cyber security.  

SciTech Connect (OSTI)

This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

2008-08-01T23:59:59.000Z

458

Information Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

2010-10-12T23:59:59.000Z

459

Information Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

2009-01-16T23:59:59.000Z

460

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

2005-08-26T23:59:59.000Z

Note: This page contains sample records for the topic "analysis securities corporation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

A network security monitor  

SciTech Connect (OSTI)

The study of security in computer networks is a rapidly growing area of interest because of the proliferation of networks and the paucity of security measures in most current networks. Since most networks consist of a collection of inter-connected local area networks (LANs), this paper concentrates on the security-related issues in a single broadcast LAN such as Ethernet. Specifically, we formalize various possible network attacks and outline methods of detecting them. Our basic strategy is to develop profiles of usage of network resources and then compare current usage patterns with the historical profile to determine possible security violations. Thus, our work is similar to the host-based intrusion-detection systems such as SRI's IDES. Different from such systems, however, is our use of a hierarchical model to refine the focus of the intrusion-detection mechanism. We also report on the development of our experimental LAN monitor currently under implementation. Several network attacks have been simulated and results on how the monitor has been able to detect these attacks are also analyzed. Initial results demonstrate that many network attacks are detectable with our monitor, although it can surely be defeated. Current work is focusing on the integration of network monitoring with host-based techniques. 20 refs., 2 figs.

Heberlein, L.T.; Dias, G.V.; Levitt, K.N.; Mukherjee, B.; Wood, J.; Wolber, D. (California Univ., Davis, CA (USA). Dept. of Electrical Engineering and Computer Science)

1989-11-01T23:59:59.000Z

462

ARMY Energy Security Considerations  

E-Print Network [OSTI]

ARMY Energy Security Considerations Don Juhasz, PE, CEM HQDA, OACSIM, DAIM-FDF Telephone: (703-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 Army Energy · · · · FOREIGN OIL 2 Situation OIL & GAS LIQUIDS 38% Rise in NTV Fuel Use 35% of DoD utilities 21% of Fed government 11

463

Transmission Line Security Monitor  

ScienceCinema (OSTI)

The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

None

2013-05-28T23:59:59.000Z

464

Departmental Personnel Security- Clearance Automation  

Broader source: Energy.gov [DOE]

The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

465

Database Security: A Historical Perspective  

E-Print Network [OSTI]

The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

Lesov, Paul

2010-01-01T23:59:59.000Z

466

System security Dr Len Hamey  

E-Print Network [OSTI]

, firewalls, detecting intrusions) Security process cycle policy implementation administration audit risk access with firewall Use generic service banners Use intrusion detection system that can detect;2 Security Services Confidentiality service. Authentication service. Integrity service. Access Control

Hamey, Len

467

Dead Hand and No Hand Pills: Precommitment Strategies in Corporate Law  

E-Print Network [OSTI]

Decisionmaking in Corporate Governance, 55 V AND . L. R EV .Dooley, Two Models of Corporate Governance, 47 B US . L AW .resurgence of the corporate governance issues that dominated

Bainbridge, Stephen M

2003-01-01T23:59:59.000Z

468

The Shareholder As Ulysses: Some Empirical Evidence on Why Investors in Public Corporations Tolerate Board Governance  

E-Print Network [OSTI]

default rules of corporate governance at all, they almostThe Means and Ends of Corporate Governance, 97 N W . U. L. Rof the way modern corporate governance actually works. In

Stout, Lynn A.

2003-01-01T23:59:59.000Z

469

Anglo-American Corporate Taxation: Tracing the Common Roots of Divergent Approaches  

E-Print Network [OSTI]

History and the Global Corporate Governance Revolution: Thelength structure of corporate governance, the U.K. continuedarms-length form of corporate governance in the U.K. was

Bank, Steven A.

2013-01-01T23:59:59.000Z

470

Software & Services Group Developer Products Division Copyright 2011, Intel Corporation. All rights reserved.  

E-Print Network [OSTI]

Software & Services Group Developer Products Division Copyright 2011, Intel Corporation. All & Services Group Developer Products Division Copyright 2011, Intel Corporation. All rights reserved. *Other Division Copyright 2011, Intel Corporation. All rights reserved. *Other brands and names are the property

California at Berkeley, University of

471

Safeguard Security and Awareness Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

2002-10-02T23:59:59.000Z

472

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

2008-08-12T23:59:59.000Z

473

Safeguards and Security Program References  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

2005-08-26T23:59:59.000Z

474

East Asian Security in 2025  

E-Print Network [OSTI]

East Asian Security in 2025 Who We Are Reagan Heavin Energy Adam Hudson State Capacity Brandon Krueger Military Sean ONeil Demographics Griffin Rozell Balance of Power Matt Suma Economy East Asian Security in 2025 China...: Competition, Cooperation, Plateau? Reagan Heavin Adam Hudson Brandon Krueger Sean ONeil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda Conclusions Projections Drivers Four Outcomes Questions East Asian Security in 2025...

Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

2008-01-01T23:59:59.000Z

475

Corporate Headquarters Associates of Cape Cod, Inc.  

E-Print Network [OSTI]

Buffer CD060: 60 Test Kit (diazo format) ACC can reserve reagents for up to 1 year: Helps reduce re-qualification colored samples 60 tests per vial when using 50 L: Cost savings EQUIPMENT AVAILABLE FROM ACC Secure Software 21 CFR Part 11 Compliant Software with Manual 5320500 Gen5TM Installation Qualification

Lebendiker, Mario

476

January 2005 INTEGRATING IT SECURITY  

E-Print Network [OSTI]

January 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS technology (IT) security and capital planning and investment control (CPIC) processes have been performed taining appropriate security controls, both at the enterprise-wide and system level, commensurate

477

RECOMMENDED SECURITY CONTROLS FOR FEDERAL  

E-Print Network [OSTI]

May 2005 RECOMMENDED SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS: GUIDANCE FOR SELECTING COST-EFFECTIVE CONTROLS USING A RISK-BASED PROCESS Shirley Radack, Editor, Computer Security Division, Information-53, Recommended Security Controls for Federal Information Systems The basic questions that organizations should

478

August 2003 IT SECURITY METRICS  

E-Print Network [OSTI]

, efficiency, effectiveness, and the impact of the security controls. The process steps need not be sequen tial metrics program and provides examples of metrics based on the criti cal elements and security controls and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

479

Positioning Security from electronic warfare  

E-Print Network [OSTI]

Positioning Security from electronic warfare to cheating RFID and road-tax systems Markus Kuhn;Military positioning-security concerns Electronic warfare is primarily about denying or falsifying location of the importance of global positioning security has led to the military discipline of "navigation warfare". 5 #12

Kuhn, Markus

480

Mass and Elite Views on Nuclear Security: US National Security Surveys 1993-1999  

SciTech Connect (OSTI)

This is the fourth report in an ongoing series of studies examining how US perspectives about nuclear security are evolving in the post-Cold War era. In Volume 1 the authors present findings from a nationwide telephone survey of randomly selected members of the US general public conducted from 13 September to 14 October 1999. Results are compared to findings from previous surveys in this series conducted in 1993, 1995, and 1997, and trends are analyzed. Key areas of investigation reported in Volume 1 include evolving perceptions of nuclear weapons risks and benefits, preferences for related policy and spending issues, and views about three emerging issue areas: deterrent utility of precision guided munitions; response options to attacks in which mass casualty weapons are used; and expectations about national missile defenses. In this volume they relate respondent beliefs about nuclear security to perceptions of nuclear risks and benefits and to policy preferences. They develop causal models to partially explain key preferences, and they employ cluster analysis to group respondents into four policy relevant clusters characterized by similar views and preferences about nuclear security within each cluster. Systematic links are found among respondent demographic characteristics, perceptions of nuclear risks and benefits, policy beliefs, and security policy and spending preferences. In Volume 2 they provide analysis of in-depth interviews with fifty members of the US security policy community.

HERRON,KERRY G.; JENKINS-SMITH,HANK C.; HUGHES,SCOTT D.

2000-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "analysis securities corporation" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Architectural support for enhancing security in clusters  

E-Print Network [OSTI]

to security, numerous security loopholes in cluster servers come to the forefront. Clusters usually rely on rewalls for their security, but the rewalls cannot prevent all security attacks; therefore, cluster systems should be designed to be robust...

Lee, Man Hee

2009-05-15T23:59:59.000Z

482

Comprehensive Renewable Energy Feasibility Study for Sealaska Corporation  

SciTech Connect (OSTI)

The purposes of this project were: (1) to conduct a comprehensive feasibility study to determine the potential sustainability of wind and/or small hydroelectric power plants on Southeast Alaska native village lands, and (2) to provide the villages with an understanding of the requirements, costs, and benefits of developing and operating wind or small hydroelectric power plants. The program was sponsored by the Tribal Energy program, Office of Energy Efficiency and Renewable Energy, US Department of Energy. The Contractor was Sealaska Corporation, the Regional Native Corporation for Southeast Alaska that includes 12 village/urban corporations. Most villages are isolated from any central electric transmission and use diesel-electric systems for power generation, making them prime candidates for deploying renewable energy sources. Wind Energy - A database was assembled for all of the candidate sites in SE Alaska, including location, demographics, electricity supply and demand, existing and planned transmission interties with central generation, topographical maps, macro wind data, and contact personnel. Field trips were conducted at the five candidate villages that were deemed most likely to have viable wind resources. Meetings were held with local village and utility leaders and the requirements, costs, and benefits of having local renewable energy facilities were discussed. Two sites were selected for anemometry based on their needs and the probability of having viable wind resources Yakutat and Hoonah. Anemometry was installed at both sites and at least one year of wind resource data was collected from the sites. This data was compared to long-term data from the closest weather stations. Reports were prepared by meteorologist John Wade that contains the details of the measured wind resources and energy production projections. Preliminary financial analysis of hypothetical wind power stations were prepared to gauge the economic viability of installing such facilities at each site. The average wind resources measured at Yakutat at three sites were very marginal, with an annual average of 4.0 mps (9 mph) at 60 meters above ground level. At Hoonah, the average wind resources measured on the 1,417 ft elevation ridge above the village were very low, with a six-month average of 3.9 mps (8.7 mph) at 60 meters above ground level. The wind resources at both sites were not sufficient to justify installation of wind turbines. In summary, although there are several known windy spots in SE Alaska (e.g., Skagway), we were not able to identify any isolated Native American villages that utilize diesel-electric power generation that have commercially viable wind resources. Small Hydroelectric - The study focused on the communities associated with Sealaska Corporation that use diesel-electric for electricity and have a potential for hydroelectric power generation. Most of them have had at least an assessment of hydroelectric potential, and a few have had feasibility studies of potential hydroelectric projects. Although none of the sites examined are financially viable without substantial grant funding, Hoonah, Kake, and Yakutat appear to have the best potential for new hydro facilities.

Robert Lynette; John Wade: Larry Coupe

2006-06-30T23:59:59.000Z

483

The Earth Institute I Corporate Circle Spring 2011  

E-Print Network [OSTI]

,000 in unrestricted support, to be renewed once a year Support the on-going sustainable development work on strategic plans, metrics, operations as relates to energy, water, sustainable food systems, etc. Corporate #12;The Earth Institute I Corporate Circle Indicative examples Global: PepsiCo: water & energy

Khatiwala, Samar

484

Industrial Engineering 361 Six Sigma Making Corporations and  

E-Print Network [OSTI]

Industrial Engineering 361 Six Sigma ­ Making Corporations and Stockholders... Kim Knuth Grant in the late 1980's. The term "Six Sigma" came to identify a popular form of corporate improvement://www.public.iastate.edu/~vardeman/stat531/sixsigma.pdf). Before we began research, we questioned the importance of Six Sigma and were

Vardeman, Stephen B.

485

Line Management Perspective: National Nuclear Security Administration...  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration (NNSA) Line Management Perspective: National Nuclear Security Administration (NNSA) Addthis Description Slide Presentation by Jim...

486

Workforce Statistics - Office of Secure Transportation | National...  

National Nuclear Security Administration (NNSA)

Office of Secure Transportation | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation...

487

Secretary Richardson Accepts Recommendations for Improving Security...  

National Nuclear Security Administration (NNSA)

Secretary Richardson Accepts Recommendations for Improving Security at Nuclear Weapons Laboratories | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS...

488

FOILFEST :community enabled security.  

SciTech Connect (OSTI)

The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

2005-09-01T23:59:59.000Z

489

Corporate governance reform in a developing country : the case of Bangladesh  

E-Print Network [OSTI]

Bangladesh reformed its corporate governance by adopting Bangladesh Corporate Governance Guidelines-2006 (the BCGG-2006 hereafter) due to pressures from international financial institutions (IFIs). However, there is huge ...

Sobhan, Md. Abdus

2014-07-02T23:59:59.000Z

490

Sandia National Laboratories: Modeling & Analysis  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Sandia Study Shows Large LNG Fires Hotter but Smaller Than Expected On December 6, 2011, in Analysis, Energy Assurance, Infrastructure Security, Modeling, Modeling & Analysis,...

491

The effect of a corporate name change related to a change in corporate image upon a firm's stock price  

E-Print Network [OSTI]

change to the corporate name during a CNC related to a change in corporate image? Third, what is the effect of a non-brand name altering CNC versus a brand name altering CNC on a firms stock price? This dissertation makes its primary contribution...

DeFanti, Mark P.

2009-06-02T23:59:59.000Z

492

Security seal. [Patent application  

DOE Patents [OSTI]

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, G.W.

1981-11-17T23:59:59.000Z

493

NNSA orders security enhancements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | National Nuclear SecurityAdministration

494

National Security Initiatives | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohn Cyber Security Nuclear Forensics Bioinformatics

495

Security Clearances; Limitations  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of Energyof the Americas | Department ofofDeliveredSectionSecuring theSEC. 1072.

496

Strengthening Global Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBiSiteNeutronStrategic Plan The

497

Museum security and the Thomas Crown Affair.  

SciTech Connect (OSTI)

Over the years, I've daydreamed about stealing a Vermeer, a Picasso, or Rembrandt. It tickles me, as much as watching the reboot of The Thomas Crown Affair. Why is it, do you suppose, so much fun to think about stealing a world renowned piece off the wall of a major metropolitan museum? Is it the romantic thoughts of getting away with it, walking past infrared detectors, and pressure sensors ala Indiana Jones with the sack of sand to remove the idol without triggering the security system? Is it the idea of snatching items with such fantastic prices, where the romance of possessing an item of such value is less intoxicating than selling it to a private collector for it to never be seen again? I suspect others share my daydreams as they watch theater or hear of a brazen daylight heist at museums around the world, or from private collections. Though when reality sets in, the mind of the security professional kicks in. How could one do it, why would one do it, what should you do once it's done? The main issue a thief confronts when acquiring unique goods is how to process or fence them. They become very difficult to sell because they are one-of-a-kind, easy to identify, and could lead to the people involved with the theft. The whole issue of museum security takes up an ironic twist when one considers the secretive British street artist 'Banksy'. Banksy has made a name for himself by brazenly putting up interesting pieces of art in broad daylight (though many critics don't consider his work to be art) on building walls, rooftops, or even museums. I bring him up for a interesting take on what may become a trend in museum security. In March of 2005, Banksy snuck a piece of his called 'Vandalized Oil Painting' into the Brooklyn Museum's Great Historical Painting Wing, plus 3 other pieces into major museums in New York. Within several days, 2 paintings had been torn down, but 2 stayed up much longer. In his home country of the UK, a unauthorized piece he created and placed in the British Museum known as 'Early Man Goes to Market' received different treatment when placed inside the walls. It was adopted into the permanent collection! I like his story because it's so counter-intuitive. Who would have thought that modern museum security might involve preventing people not just from stealing art, but from sneaking 'unauthorized' art into museums? What is next, tampering with the archive records in order to make it look like the piece in question has always been there? To learn more about museum security, I interviewed multiple experts in the field. It turns out that the glamorous lifestyle of Thomas Crown is not particularly relevant. In fact, usually nobody can point to a Mr. Big of the underworld coordinating thefts, though some organized crime families have been known to use stolen art as black market chips to trade. The common consensus among experts in the field of art theft is that, instead of most high-value pieces being stolen by outsiders with a blue print in hand and rappelling from a ceiling skylight, in reality, 80 percent of art thefts involve insiders or accomplices that execute the crime over a period of time while working or volunteering in the museum. Indeed, according to FBI statistics, between 70 and 80 percent of all solved art theft cases involve insider participation of some kind, yet according to Tom Cremers of the Musuem Security Network, 'Having been involved in risk assessments in over hundreds of museums over the past ten years, it is quite astonishing how rarely the risk of insider participation is discussed.' In regards to the insider threat, a museum is not much different from any corporation or other organization. There are directors, employees, interns, and cleaning staff (very often outsourced), security guards (again outsourced, typically with very high turnover rates). Unlike corporations, most museums also have volunteer staff, docents, and authorized visiting scholars. All these people can potentially take advantage of their position, or to be exploited by a clever attacker on the outside or insid

Michaud, E. C. (Nuclear Engineering Division)

2010-01-01T23:59:59.000Z

498

V-186: Drupal Login Security Module Security Bypass and Denial...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

U-162: Drupal Multiple Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

499

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerabil...  

Broader source: Energy.gov (indexed) [DOE]

or later. Addthis Related Articles V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

500

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability  

E-Print Network [OSTI]

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability Communications and Embedded Systems Department Southwest Research Institute Gary Ragsdale, Ph.D., P.E. August 24 ? 25, 2010 ESL-HH-10-08-09 Proceedings of the 17... of Smart Grid devices ? Describe progress made in Smart Grid security ? Propose a more robust approach to SG security ? Describe needs for further research and development ESL-HH-10-08-09 Proceedings of the 17th Symposium for Improving Building Systems...

Ragsdale, G.