Sample records for analysis securities corporation

  1. Corporate Security and Conflict Outcomes 

    E-Print Network [OSTI]

    Tkach, Benjamin K

    2013-10-21T23:59:59.000Z

    militaries (Avant 2000). Existing research has shown a steady increase in the number and employment of private security firms (PSFs) over the last five decades due to expansion of global market demand for private security (Avant 2005; Dunigan 2011; Singer... prominent role in international aviation security (Abrahamsen and Williams 2011). Because PSFs are based largely on corporate profit motivations, contract fulfillment and reputation are critical for firms to secure market share. The international market...

  2. Corporate Analysis of DOE Safety Performance

    Broader source: Energy.gov [DOE]

    The Office of Environment, Health, Safety and Security (EHSS), Office of Analysis develops analysis tools and performance dashboards, and conducts analysis of DOE safety performance corporately and on a variety of specific environment, safety and health topics.

  3. Corporate Culture | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisitingContract Management Fermi Site Office (FSO)Corporate Culture | National

  4. Using Security and Domain ontologies for Security Requirements Analysis

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Using Security and Domain ontologies for Security Requirements Analysis Amina Souag, Camille.Mouratidis@uel.ac.uk Abstract-- Recent research has argued about the importance of considering security during Requirements that security being a multi-faceted problem, a single security ontology is not enough to guide SR Engineering

  5. First Analysis Securities Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdf Jump to:ar-80m.pdfFillmore County, Minnesota:Island, NewFirmGreen Energy

  6. Corporate decision analysis : an engineering approach

    E-Print Network [OSTI]

    Tang, Victor, Ph.D. Massachusetts Institute of Technology

    2006-01-01T23:59:59.000Z

    We explore corporate decisions and their solutions under uncertainty using engineering methods. Corporate decisions tend to be complex; they are interdisciplinary and defy programmable solutions. To address these challenges, ...

  7. FY 2010 Sandia Corporation PER Summary | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved:Administration Sandia Corporation PER Summary | National Nuclear

  8. FY 2011 Sandia Corporation PER Summary | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved:Administration Sandia Corporation PER SummaryAdministration

  9. FY 2012 Sandia Corporation PER Summary | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved:Administration Sandia Corporation

  10. Copyright 1997 by Rational Software Corporation Analysis and Design

    E-Print Network [OSTI]

    Mylopoulos, John

    Page 1 Copyright © 1997 by Rational Software Corporation Analysis and Design with UML Page 2 Copyright © 1997 by Rational Software Corporation Agenda n Benefits of Visual Modeling n History of the UML n Visual Modeling with UML n The Rational Iterative Development Process #12;Page 3 Copyright © 1997

  11. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    SciTech Connect (OSTI)

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01T23:59:59.000Z

    Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

  12. Statistical analysis of correlated fossil fuel securities

    E-Print Network [OSTI]

    Li, Derek Z

    2011-01-01T23:59:59.000Z

    Forecasting the future prices or returns of a security is extraordinarily difficult if not impossible. However, statistical analysis of a basket of highly correlated securities offering a cross-sectional representation of ...

  13. IS THE TAIL WAGGING THE DOG? AN EMPIRICAL ANALYSIS OF CORPORATE CARBON FOOTPRINTS AND FINANCIAL PERFORMANCE

    E-Print Network [OSTI]

    Delmas, Magali A; Nairn-Birch, Nicholas S.

    2011-01-01T23:59:59.000Z

    The importance of carbon footprint estimation boundaries.ANALYSIS OF CORPORATE CARBON FOOTPRINTS AND FINANCIALANALYSIS OF CORPORATE CARBON FOOTPRINTS AND FINANCIAL

  14. MARGIN AND SENSITIVITY METHODS SECURITY ANALYSIS

    E-Print Network [OSTI]

    MARGIN AND SENSITIVITY METHODS FOR SECURITY ANALYSIS OF ELECTRIC POWER SYSTEMS by Scott Greene the amount by which system loads or power transfers can change before a security violation, such as an overloaded transmission line, is encountered. This thesis shows how to efficiently compute security margins

  15. A Forrester Consulting Thought Leadership Paper Commissioned By Microsoft And RSA, The Security Division Of EMC The Value Of Corporate Secrets

    E-Print Network [OSTI]

    Narasayya, Vivek

    Division Of EMC The Value Of Corporate Secrets How Compliance And Collaboration Affect Enterprise, the security division of EMC, commissioned Forrester Consulting to assess the data security practices of North

  16. Security Analysis and Project Management Systems | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Analysis and Project Management Systems SHARE Security Analysis and Project Management Systems ORNL brings together the subject matter experts with programmers to design,...

  17. Corporate Law's Current-Owner Bias

    E-Print Network [OSTI]

    Fried, Jesse M.

    2005-01-01T23:59:59.000Z

    Owner Bias in Corporate Governance Jesse Fried * Boalt Hallmy conclusion that corporate governance arrangements choseninterventions in corporate governance through the securities

  18. Corporate Law's Current-Owner Bias

    E-Print Network [OSTI]

    Fried, Jesse M.

    2006-01-01T23:59:59.000Z

    Owner Bias in Corporate Governance Jesse Fried * Boalt Hallmy conclusion that corporate governance arrangements choseninterventions in corporate governance through the securities

  19. Principles of Secure Information Flow Analysis Geoffrey Smith

    E-Print Network [OSTI]

    Smith, Geoffrey

    Principles of Secure Information Flow Analysis Geoffrey Smith School of Computing and Information to explain the #12;2 Geoffrey Smith principles underlying secure information flow analysis and to discuss

  20. Sandia Corporation

    Office of Environmental Management (EM)

    Corporation Sandia National Laboratories P.O. Box 5800, MS 0101 Albuquerque, New Mexico 87185-0101 WEL-2012-01 Dear Dr. Hommert: The Office of Health, Safety and Security's...

  1. An Integrated View of Security Analysis and Performance Evaluation

    E-Print Network [OSTI]

    Aldini, Alessandro

    An Integrated View of Security Analysis and Performance Evaluation: Trading QoS with Covert Channel@sti.uniurb.it Abstract. Security analysis and performance evaluation are two funda- mental activities in the system. This is accomplished by proposing a tool-supported methodology that combines noninterference-based security analysis

  2. Office of Corporate Security Strategy, Analysis and Special Operations |

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 111 1,613 122Commercial602 1,39732onMake YourDepartment ofC T O B EOff-Grid

  3. Security Requirements Engineering: A Framework for Representation and Analysis

    E-Print Network [OSTI]

    Nuseibeh, Bashar

    Security Requirements Engineering: A Framework for Representation and Analysis Charles B. Haley Abstract--This paper presents a framework for security requirements elicitation and analysis. The framework is based on constructing a context for the system, representing security requirements as constraints

  4. An Approach for Security Evaluation and Analysis in Cloud Computing

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    An Approach for Security Evaluation and Analysis in Cloud Computing T. Probst1,2 , E. Alata1,3 , M for security evaluation and analysis in cloud computing environments. The objective is to provide an automated way to evaluate the efficiency of security mechanisms aiming at protecting the cloud computing

  5. Combination of Safety and Security Analysis -Finding Security Problems That Threaten The

    E-Print Network [OSTI]

    Boyer, Edmond

    -physical Systems) of the 32nd International Conference on Computer Safety, Reliability and Security, France (2013Combination of Safety and Security Analysis - Finding Security Problems That Threaten The Safety of a System Max Steiner and Peter Liggesmeyer AG Software Engineering: Dependability, TU Kaiserslautern

  6. SAFEGUARDS AND SECURITY INTEGRATION WITH SAFETY ANALYSIS

    SciTech Connect (OSTI)

    Hearn, J; James Lightner, J

    2007-04-13T23:59:59.000Z

    The objective of this paper is to share the Savannah River Site lessons learned on Safeguards and Security (S&S) program integration with K-Area Complex (KAC) safety basis. The KAC Documented Safety Analysis (DSA), is managed by the Washington Savannah River Company (WSRC), and the S&S program, managed by Wackenhut Services, Incorporated--Savannah River Site (WSI-SRS). WSRC and WSI-SRS developed a contractual arrangement to recognize WSI-SRS requirements in the KAC safety analysis. Design Basis Threat 2003 (DBT03) security upgrades required physical modifications and operational changes which included the availability of weapons which could potentially impact the facility safety analysis. The KAC DSA did not previously require explicit linkage to the S&S program to satisfy the safety analysis. WSI-SRS have contractual requirements with the Department of Energy (DOE) which are separate from WSRC contract requirements. The lessons learned will include a discussion on planning, analysis, approval of the controls and implementation issues.

  7. Essays on the structural estimation and analysis of corporate and industrial markets

    E-Print Network [OSTI]

    Cohen, Moshe Aharon

    2009-01-01T23:59:59.000Z

    The three chapters which comprise my thesis are a collection of essays on the analysis of the corporate governance and airline markets and of the federal appellate structure. In Chapter 1, I use a discrete choice framework ...

  8. Distributed Temporal Logic for the Analysis of Security Protocol Models

    E-Print Network [OSTI]

    Basin, David

    , showing that it is sufficient to consider models in which the intruder completely controls the networkDistributed Temporal Logic for the Analysis of Security Protocol Models David Basin Department to reason about and relate different security-protocol models. This includes reasoning about model

  9. Modelling and Simulation for the Analysis of Securities Markets

    E-Print Network [OSTI]

    Watt, Stephen M.

    Modelling and Simulation for the Analysis of Securities Markets Rui Hu1,2 , Vadim Mazalov1 recognition algorithms. Our evaluation environment is a mar- ket simulator that uses historical data or live approach to modelling and simulation and how they work together. 1 Introduction Securities markets have

  10. Software Analysis for Security Spiros Mancoridis

    E-Print Network [OSTI]

    Mancoridis, Spiros

    of the processes, practices, and technolo- gies that can help software maintenance engineers improve the security of software systems. A particular emphasis is placed on validating security architectures, verifying- erating system mechanisms that impose rules on untrusted programs (e.g., role-based access control), anti

  11. Network Traffic Analysis and SCADA Security

    E-Print Network [OSTI]

    Hu, Jiankun

    systems are widely used for monitoring and controlling industrial systems including power plants, water of traffic generated. Finally, network traffic monitoring can be used in security management to identify the vulnerabilities of SCADA systems because this 383 © Springer 2010 , Handbook of Information and Communication

  12. NNSA Corporate CPEP Process NNSA LOS ALAMOS NATIONAL SECURITY, LLC PER

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved:AdministrationAnalysis andB -Reports |Y-12 |Administration NNSA

  13. NNSA Corporate CPEP Process NNSA Lawrence Livermore National Security, LLC PER

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved:AdministrationAnalysis andB -Reports |Y-12 |Administration

  14. SAAS: Simulation Analysis of Aviation Security Year One Report

    E-Print Network [OSTI]

    Wang, Hai

    Under FEMA Grant EMW-2004-GR-0112 November 2005 Center for Risk and Economic Analysis of Terrorism to implement an integrated simulation-based decision support tool framework to enable emergency personnel by the United States Department of Homeland Security through the Center for Risk and Economic Analysis

  15. Corporate social responsibility (CSR) : responsibility or Innovation? : an analysis of the feedback between CSR activities and the expectations placed upon corporations

    E-Print Network [OSTI]

    Rodriguez, Adrian Xavier

    2010-01-01T23:59:59.000Z

    This thesis uses case study and interview data to present a framework for analyzing corporate behavior in order to define corporate social responsibility (CSR). It answers the question: Can corporations tie corporate social ...

  16. Office of Environmental Protection, Sustainability Support, and Corporate Safety Analysis

    Broader source: Energy.gov [DOE]

    The Office of Environmental Protection, Sustainability Support and Analysis establishes environmental protection requirements and expectations for the Department to ensure protection of workers and the public and protection of the environment from the hazards associated with all Department operations.

  17. A generalized shell for dynamic security analysis in operations planning

    SciTech Connect (OSTI)

    Marceau, R.J.; Mailhot, R.; Galiana, F.D. (McGill Univ., Montreal, Quebec (Canada))

    1993-08-01T23:59:59.000Z

    This paper introduces the concept of a generalized shell for performing power-system dynamic security analysis. The generalized shell mechanizes routines traditionally carried out by human experts and that are essential to power-system dynamic security analysis, thereby greatly accelerating the realization of complex processes. The shell semantics express high-level goals and tasks using a friendly, highly compact syntax which closely matches the language of operations planners. Typically, the shell will execute appropriate load-flow and transient-stability simulations (i.e. using commercially available simulation software), perform result analysis, make input changes and repeat this process until a user-defined goal has been achieved. A working shell prototype for performing key algorithmic processes is described and results of a typical sensitivity study are presented using a 700-bus model of the Hydro-Quebec network. It is expected that the prototype will reduce study-cycle time, improve the accuracy of dynamic security limits and, indeed, transform the working environment of operations and system planners. Eventually, it can be foreseen that the approach will gravitate towards supporting on-line dynamic security analysis.

  18. Design and analysis of an ATM network traffic security device

    E-Print Network [OSTI]

    Teodor, Dan Cristian

    1997-01-01T23:59:59.000Z

    and retransmit the network traffic from one ATM network switch output port. The Receivers queue the incoming data from the ATM network switch and present the data to the Analysis Modules in manageable pieces. The Analysis Modules capture the data from... at an exponential rate. With the continuation of this growth, the requirements of providing uniform security management will become more and more difficult to manage without occupying a significant portion of the network traffic capability available to the end...

  19. Model-based Security Analysis of the German Health Card Architecture

    E-Print Network [OSTI]

    Jurjens, Jan

    information systems, security, German Health Card. 1 #12;1 Introduction The use of health-care information information security that are particularly significant for health-care systems, due both to the inherent these risks and enable secure health-care information systems, the security analysis has to be embedded

  20. Information Security Analysis Using Game Theory and Simulation

    SciTech Connect (OSTI)

    Schlicher, Bob G [ORNL] [ORNL; Abercrombie, Robert K [ORNL] [ORNL

    2012-01-01T23:59:59.000Z

    Information security analysis can be performed using game theory implemented in dynamic simulations of Agent Based Models (ABMs). Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. Our approach addresses imperfect information and scalability that allows us to also address previous limitations of current stochastic game models. Such models only consider perfect information assuming that the defender is always able to detect attacks; assuming that the state transition probabilities are fixed before the game assuming that the players actions are always synchronous; and that most models are not scalable with the size and complexity of systems under consideration. Our use of ABMs yields results of selected experiments that demonstrate our proposed approach and provides a quantitative measure for realistic information systems and their related security scenarios.

  1. Power System Probabilistic and Security Analysis on Commodity High Performance Computing Systems

    E-Print Network [OSTI]

    Franchetti, Franz

    power system infrastructures also requires merging of offline security analyses into on- line operationPower System Probabilistic and Security Analysis on Commodity High Performance Computing Systems tools for power system probabilistic and security analysis: 1) a high performance Monte Carlo simulation

  2. A quantitative man-machine model for cyber security efficiency analysis

    E-Print Network [OSTI]

    Jung, Sung-Oh

    2007-04-25T23:59:59.000Z

    The analysis of security defense processes is of utmost importance in the management of various cyber-security attacks, which are increasing in scope and rapidity. Organizations need to optimize their resources based on a sound understanding...

  3. Climate change and energy security: an analysis of policy research

    SciTech Connect (OSTI)

    King, Marcus Dubois [George Washington University] [George Washington University; Gulledge, Jay [ORNL] [ORNL

    2013-01-01T23:59:59.000Z

    The literature on climate change's impacts on energy security is scattered across disparate fields of research and schools of thought. Much of this literature has been produced outside of the academy by scholars and practitioners working in "think tanks," government agencies, and international/multilateral institutions. Here we reviewed a selected set of 58 articles and reports primarily from such sources and performed textual analysis of the arguments. Our review of this literature identifies three potential mechanisms for linking climate change and energy security: Climate change may 1) create second-order effects that may exacerbate social instability and disrupt energy systems; 2) directly impact energy supply and/or systems or 3) influence energy security through the effects of climate-related policies. We identify emerging risks to energy security driven by climate mitigation tech-nology choices but find less evidence of climate change's direct physical impacts. We used both empirical and qualitative selection factors for choosing the grey literature sample. The sources we selected were published in the last 5 years, available through electronic media and were written in language accessible to general policy or academic readers. The organi-zations that published the literature had performed previous research in the general fields of energy and/or climate change with some analytical content and identified themselves as non-partisan. This literature is particularly valuable to scholars because identifies understudied relationships that can be rigorously assessed through academic tools and methodologies and informs a translational research agenda that will allow scholars to engage with practitioners to address challenges that lie at the nexus of climate change and energy security.

  4. Personnel Security Specialist

    Broader source: Energy.gov [DOE]

    The Office of the Associate Under Secretary for Environment, Health, Safety, and Security (AU) which provides corporate leadership and strategic approaches for protecting DOEs workers, the public,...

  5. Analysis and Enforcement of Web Application Security Policies

    E-Print Network [OSTI]

    Weinberger, Joel Howard Willis

    2012-01-01T23:59:59.000Z

    the Application of CSP . . . . . . . . 4.4 Relatedsecurity policy (csp), 2012. http://developer.chrome.com/en-US/ docs/Security/CSP/Introducing_Content_Security_

  6. Corporate bankruptcy : assessment, analysis and prediction of financial distress, insolvency, and failure

    E-Print Network [OSTI]

    Danilov, Konstantin A

    2014-01-01T23:59:59.000Z

    This paper is divided into three sections that address the various elements of understanding, predicting and analyzing corporate failure and bankruptcy. Part I covers the definitions of corporate failure, explains the ...

  7. Energy Independence and Security Act of 2007 Select News and Analysis

    E-Print Network [OSTI]

    Collins, Gary S.

    Energy Independence and Security Act of 2007 Select News and Analysis WSU Extension Energy Library and Security Act of 2007 Select News and Analysis WSU Extension Energy Library http://www.energy/01/15/Analysis-Biofuels-law- attracts-opposition/UPI-42461200409947/ New Energy Law to Phase Out Today's Common

  8. Applications of shape analysis to domestic and international security.

    SciTech Connect (OSTI)

    Prasad, Lakshman; Skourikhine, A. N. (Alexei N.); Doak, J. E. (Justin E.)

    2002-01-01T23:59:59.000Z

    The rapidly growing area of cooperative international security calls for pervasive deployment of smart sensors that render valuable information and reduce operational costs and errors. Among the sensors used, vision sensors are by far the most versatile, tangible, and rich in the information they provide about their environment. On the flip side, they are also the most complex to analyze automatically for the extraction of high-level information. The ability to process imagery in a useful manner requires at least partial functional emulation of human capabilities of visual understanding. Of all visual cues available in image data, shape is perhaps the most important for understanding the content of an image. In this paper we present an overview of ongoing research at LANL on geometric shape analysis. The objective of our research is to develop a computational framework for multiscale characterization, analysis, and recognition of shapes. This framework will enable the development of a comprehensive and connected body of mathematical methods and algorithms, based on the topological, metrical, and morphological properties of shapes. We discuss its potential applications to automated surveillance, monitoring, container tracking and inspection, weapons dismantlement, and treaty verification. The framework will develop a geometric filtering scheme for extracting semantically salient shape features. This effort creates a paradigm for solving shape-related problems in Pattern Recognition, Computer Vision, and Image Understanding in a conceptually cohesive and algorithmically amenable manner. The research aims to develop an advanced image analysis capability at LANL for solving a wide range of problems in automated facility surveillance, nuclear materials monitoring, treaty verification, and container inspection and tracking. The research provides the scientific underpinnings that will enable us to build smart surveillance cameras, with a direct practical impact on LANL's capabilities in domestic and international safeguards and security.

  9. Recommended Practice for Securing Control System Modems

    SciTech Connect (OSTI)

    James R. Davidson; Jason L. Wright

    2008-01-01T23:59:59.000Z

    This paper addresses an often overlooked “backdoor” into critical infrastructure control systems created by modem connections. A modem’s connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods.

  10. Some Physics And System Issues In The Security Analysis Of Quantum Key Distribution Protocols

    E-Print Network [OSTI]

    Horace P. Yuen

    2014-05-07T23:59:59.000Z

    In this paper we review a number of issues on the security of quantum key distribution (QKD) protocols that bear directly on the relevant physics or mathematical representation of the QKD cryptosystem. It is shown that the cryptosystem representation itself may miss out many possible attacks which are not accounted for in the security analysis and proofs. Hence the final security claims drawn from such analysis are not reliable, apart from foundational issues about the security criteria that are discussed elsewhere. The cases of continuous-variable QKD and multi-photon sources are elaborated upon.

  11. Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE

    E-Print Network [OSTI]

    Stamatakis, Alexandros

    Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy agriculture and food supply chains Optimized military supply chains Electric power and rail transportation No support for standard DB interfaces (e.g., ODBC) Standard database APIs not designed for "bursty" input

  12. Using Secure Real-time Padding Protocol to Secure Voice-over-IP from Traffic Analysis Attacks

    E-Print Network [OSTI]

    Mohanty, Saswat

    2012-07-16T23:59:59.000Z

    utilize the length of the encrypted packets to infer the language and spoken phrases of the conversation. Secure Real-time Padding Protocol (SRPP) is a new RTP profile which pads all VoIP sessions in a unique way to thwart traffic analysis attacks...

  13. Information Analysis Methodology for Border Security Deployment Prioritization and Post Deployment Evaluation

    SciTech Connect (OSTI)

    Booker, Paul M.; Maple, Scott A.

    2010-06-08T23:59:59.000Z

    Due to international commerce, cross-border conflicts, and corruption, a holistic, information driven, approach to border security is required to best understand how resources should be applied to affect sustainable improvements in border security. The ability to transport goods and people by land, sea, and air across international borders with relative ease for legitimate commercial purposes creates a challenging environment to detect illicit smuggling activities that destabilize national level border security. Smuggling activities operated for profit or smuggling operations driven by cross border conflicts where militant or terrorist organizations facilitate the transport of materials and or extremists to advance a cause add complexity to smuggling interdiction efforts. Border security efforts are further hampered when corruption thwarts interdiction efforts or reduces the effectiveness of technology deployed to enhance border security. These issues necessitate the implementation of a holistic approach to border security that leverages all available data. Large amounts of information found in hundreds of thousands of documents can be compiled to assess national or regional borders to identify variables that influence border security. Location data associated with border topics of interest may be extracted and plotted to better characterize the current border security environment for a given country or region. This baseline assessment enables further analysis, but also documents the initial state of border security that can be used to evaluate progress after border security improvements are made. Then, border security threats are prioritized via a systems analysis approach. Mitigation factors to address risks can be developed and evaluated against inhibiting factor such as corruption. This holistic approach to border security helps address the dynamic smuggling interdiction environment where illicit activities divert to a new location that provides less resistance to smuggling activities after training or technology is deployed at a given location. This paper will present an approach to holistic border security information analysis.

  14. A UNIFIED FRAMEWORK OF INFORMATION ASSURANCE FOR THE DESIGN AND ANALYSIS OF SECURITY ALGORITHMS

    E-Print Network [OSTI]

    Baras, John S.

    A UNIFIED FRAMEWORK OF INFORMATION ASSURANCE FOR THE DESIGN AND ANALYSIS OF SECURITY ALGORITHMS several information security goals, such as authentication, integrity and secrecy, have often been and the Institute for Systems Research, University of Maryland, College Park, MD, 20742 ABSTRACT Most information

  15. On the Exact Solution to a Smart Grid Cyber-Security Analysis Problem

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    terminal units (RTUs), SCADA systems measure data such as trans- mission line power flows, bus power1 On the Exact Solution to a Smart Grid Cyber-Security Analysis Problem Kin Cheong Sou, Henrik Sandberg and Karl Henrik Johansson Abstract--This paper considers a smart grid cyber-security problem

  16. An analysis of the impact of mergers between community development corporations

    E-Print Network [OSTI]

    Haque, Shoma S

    2005-01-01T23:59:59.000Z

    This thesis explores the occurrence of mergers between community development corporations (CDC's) in the United States in the past five years. The research examines how mergers between CDC's affect their capacity to achieve ...

  17. Corporate social responsibility in Brazil : a comparative analysis of two paper companies

    E-Print Network [OSTI]

    Nascimento, Ana Paula M. do, 1966-

    2004-01-01T23:59:59.000Z

    If being socially responsible can result in short or long-term economic benefits, then why do not all companies adopt corporate social responsibility (CSR) practices? This thesis draws on general assumptions from illustrative ...

  18. ANALYSIS OF ELECTRIC GRID SECURITY UNDER TERRORIST THREAT Javier Salmeron

    E-Print Network [OSTI]

    Baldick, Ross

    analytical techniques to help mitigate the disruptions to electric power grids caused by terrorist attacks; Homeland security I. INTRODUCTION Electric power systems are critical to any country's economy and security has long been recognized [1]. This vulnerability has increased in recent years because infrastructure

  19. Commercial Aircraft Corporation of China (Comac) attempts to break the Airbus-Boeing duopoly, will it succeed? : an industry analysis framework applied

    E-Print Network [OSTI]

    Fuentes, Jose L., S.M. Massachusetts Institute of Technology

    2011-01-01T23:59:59.000Z

    Using an industry analysis framework, this thesis analyzes whether the recently established Commercial Aircraft Corporation of China (Comac) is likely to break the Boeing-Airbus duopoly in the industry of large commercial ...

  20. Integration of the EM Corporate QA Performance Metrics With Performanc...

    Office of Environmental Management (EM)

    Integration of the EM Corporate QA Performance Metrics With Performance Analysis Process Integration of the EM Corporate QA Performance Metrics With Performance Analysis Process...

  1. Copyright 2011 Northrop Grumman Corporation Northrop Grumman Information Systems (NGIS)

    E-Print Network [OSTI]

    from unattended sensors · Space vulnerabilities and survivability · Cyber security/informationCopyright © 2011 Northrop Grumman Corporation Northrop Grumman Information Systems (NGIS Northrop Grumman Corporation Page 2 1. Overview Information Sponsor ­Northrop Grumman Information Systems

  2. Concise and Tight Security Analysis of the Bennett-Brassard 1984 Protocol with Finite Key Lengths

    E-Print Network [OSTI]

    Masahito Hayashi; Toyohiro Tsurumaru

    2012-05-17T23:59:59.000Z

    We present a tight security analysis of the Bennett-Brassard 1984 protocol taking into account the finite size effect of key distillation, and achieving unconditional security. We begin by presenting a concise analysis utilizing the normal approximation of the hypergeometric function. Then next we show that a similarly tight bound can also be obtained by a rigorous argument without relying on any approximation. In particular, for the convenience of experimentalists who wish to evaluate the security of their QKD systems, we also give explicit procedures of our key distillation, and also show how to calculate the secret key rate and the security parameter from a given set of experimental parameters. Besides the exact values of key rates and security parameters, we also present how to obtain their rough estimates using the normal approximation.

  3. VEA-bility Security Metric: A Network Security Analysis Tool Melanie Tupper

    E-Print Network [OSTI]

    Zincir-Heywood, Nur

    network configurations. An administrator can then use the VEA-bility scores of different configurations the given options. These tools are important to network administrators as they strive to provide secure, yet by computer networks. For this reason, a primary objective for a network/system administrator is to maintain

  4. Security Enforcement Preliminary Notice of Violation issued to...

    Broader source: Energy.gov (indexed) [DOE]

    May 27, 2015 Security Enforcement Preliminary Notice of Violation issued to Sandia Corporation On May 27, 2015, the National Nuclear Security Administration issued a Preliminary...

  5. Corporate Affiliate Event Details

    E-Print Network [OSTI]

    Shahriar, Selim

    Corporation Tampa Bay Lightning Tenneco Inc. TreeHouse Foods, Inc. Attendee Profile 2013 Corporate Counsel

  6. Security Analysis and Project Management Systems | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our Instagram Secretary Moniz is Taking OverEvaluating ' M MSecurity bySecurity

  7. Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration

    E-Print Network [OSTI]

    Langerhans, Brian

    , for the United States Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL; determining rate of spread and social network for smallpox epidemic in Abakaliki, Nigeria (1972) · Studying

  8. Two-Tier Hierarchical Cyber-Physical Security Analysis Framework For Smart Grid

    E-Print Network [OSTI]

    Kundur, Deepa

    Two-Tier Hierarchical Cyber-Physical Security Analysis Framework For Smart Grid Jin Wei and Deepa consequence of cyber and/or physical disruption) using distributed control. In particular, we consider, USA Abstract--We propose a two-tier hierarchical cyber-physical framework for analyzing transient

  9. Automated Analysis of Security-Critical JavaScript APIs Stanford University

    E-Print Network [OSTI]

    Pratt, Vaughan

    Automated Analysis of Security-Critical JavaScript APIs Ankur Taly Stanford University ataly. The trusted portion of each application may then expose an API to untrusted code, interposing a reference define the semantics of a restricted version of JavaScript devised by the ECMA Standards committee

  10. IEEE TRANSACTIONS ON POWER SYSTEMS 1 Web-based Security Cost Analysis in Electricity

    E-Print Network [OSTI]

    Cañizares, Claudio A.

    IEEE TRANSACTIONS ON POWER SYSTEMS 1 Web-based Security Cost Analysis in Electricity Markets Hong, and describes its implementation using a 3-tier client/server architecture and up-to-date web technologies to certain system parameters. The web implementation allows easy and effective access by all market

  11. DYNAMIC SECURITY ANALYSIS OF ELECTRIC POWER SYSTEMS: PASSIVITY-BASED APPROACH AND POSITIVE INVARIANCE APPROACH

    E-Print Network [OSTI]

    Shen, Jinglai

    DYNAMIC SECURITY ANALYSIS OF ELECTRIC POWER SYSTEMS: PASSIVITY-BASED APPROACH AND POSITIVE in modern power system opera- tion. With the aid of analytic tools for large-scale and hybrid systems, this paper proposes two new safety verification methods for power systems. The first method is based

  12. Secure key generation using an ultra-long fiber laser: transient analysis and experiment

    E-Print Network [OSTI]

    Zadok, Avinoam

    Secure key generation using an ultra-long fiber laser: transient analysis and experiment Avi Zadok-optic components. In our Ultra-long Fiber Laser (UFL) system, each user places a randomly chosen, spectrally, based on establishing laser oscillation between two parties, which is realized using standard fiber

  13. Security Analysis of Selected AMI Failure Scenarios Using Agent Based Game Theoretic Simulation

    SciTech Connect (OSTI)

    Abercrombie, Robert K [ORNL] [ORNL; Schlicher, Bob G [ORNL] [ORNL; Sheldon, Frederick T [ORNL] [ORNL

    2014-01-01T23:59:59.000Z

    Information security analysis can be performed using game theory implemented in dynamic Agent Based Game Theoretic (ABGT) simulations. Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. We concentrated our analysis on the Advanced Metering Infrastructure (AMI) functional domain which the National Electric Sector Cyber security Organization Resource (NESCOR) working group has currently documented 29 failure scenarios. The strategy for the game was developed by analyzing five electric sector representative failure scenarios contained in the AMI functional domain. From these five selected scenarios, we characterize them into three specific threat categories affecting confidentiality, integrity and availability (CIA). The analysis using our ABGT simulation demonstrates how to model the AMI functional domain using a set of rationalized game theoretic rules decomposed from the failure scenarios in terms of how those scenarios might impact the AMI network with respect to CIA.

  14. Corporate Governance and Taxation

    E-Print Network [OSTI]

    Dyck, Alexander

    2004-01-01T23:59:59.000Z

    Accounting and Corporate Governance,” Journal of Accounting1997) “A Survey of Corporate Governance” Journal of FinanceCorporate Governance and Taxation Mihir A. Desai* Harvard

  15. Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration

    E-Print Network [OSTI]

    Sidiropoulos, Nikolaos D.

    , for the United States Department of Energy's National Nuclear Security Administration under contract DE-AC04-94ALT i For example: #12;Semantic Graphs · Different types of edges · Attribute or relationship labels type of edge. DEDICOM PARAFAC Multilinear algebra Adjacency matrix Adjacency tensor #12;Using Tensors

  16. Electric Power Network Security Analysis via Minimum Cut Relaxation Kin Cheong Sou, Henrik Sandberg and Karl Henrik Johansson

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    ) and ma directed arcs (i.e., transmission lines) on which power flows. The flow can The authorsElectric Power Network Security Analysis via Minimum Cut Relaxation Kin Cheong Sou, Henrik Sandberg the security of power transmission networks is presented. In order to strategically allocate protection devices

  17. SELF-ORGANIZING NETWORK SECURITY ENVIRONMENTS A SIMULATIVE ANALYSIS Falko Dressler, Lavanya Poondru, Tobias Limmer and Reinhard German

    E-Print Network [OSTI]

    Breu, Ruth

    SELF-ORGANIZING NETWORK SECURITY ENVIRONMENTS ­ A SIMULATIVE ANALYSIS Falko Dressler, Lavanya-organized network security environments in a simulation model. First simulation results outline both the feasibility model for the network simulator OMNeT++ [14], which allows a detailed performance evaluation. Using

  18. Towards secure virtual directories : a risk analysis framework.

    SciTech Connect (OSTI)

    Claycomb, William R.

    2010-07-01T23:59:59.000Z

    Directory services are used by almost every enterprise computing environment to provide data concerning users, computers, contacts, and other objects. Virtual directories are components that provide directory services in a highly customized manner. Unfortunately, though the use of virtual directory services are widespread, an analysis of risks posed by their unique position and architecture has not been completed. We present a detailed analysis of six attacks to virtual directory services, including steps for detection and prevention. We also describe various categories of attack risks, and discuss what is necessary to launch an attack on virtual directories. Finally, we present a framework to use in analyzing risks to individual enterprise computing virtual directory instances. We show how to apply this framework to an example implementation, and discuss the benefits of doing so.

  19. Probabilistic risk analysis toward cost-effective 3S (safety, safeguards, security) implementation

    SciTech Connect (OSTI)

    Suzuki, Mitsutoshi; Mochiji, Toshiro [Department of Science and Technology for Nuclear Material Management, Japan Atomic Energy Agency, 2-4 Shirane, Shirakata, Tokai-mura, Naka-gun, Ibaraki 319-1193 (Japan)

    2014-09-30T23:59:59.000Z

    Probabilistic Risk Analysis (PRA) has been introduced for several decades in safety and nuclear advanced countries have already used this methodology in their own regulatory systems. However, PRA has not been developed in safeguards and security so far because of inherent difficulties in intentional and malicious acts. In this paper, probabilistic proliferation and risk analysis based on random process is applied to hypothetical reprocessing process and physical protection system in nuclear reactor with the Markov model that was originally developed by the Proliferation Resistance and Physical Protection Working Group (PRPPWG) in Generation IV International Framework (GIF). Through the challenge to quantify the security risk with a frequency in this model, integrated risk notion among 3S to pursue the cost-effective installation of those countermeasures is discussed in a heroic manner.

  20. Transportation Secure Data Center: Real-World Data for Environmental and Air Quality Analysis (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2013-01-01T23:59:59.000Z

    The National Renewable Energy Laboratory (NREL) and the U.S. Department of Transportation (DOT) have launched the free, web-based Transportation Secure Data Center (TSDC). The TSDC (www.nrel.gov/tsdc) preserves respondent anonymity while making vital transportation data available to a broad group of users through secure, online access. The TSDC database provides free-of-charge web-based access to valuable transportation data that can be used for: Emissions and air pollution modeling, Vehicle energy and power analysis, Climate change impact studies, Alternative fuel station planning, and Validating transportation data from other sources. The TSDC's two levels of access make composite data available with simple online registration, and allow researchers to use detailed spatial data after completing a straight forward application process.

  1. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    Analysis of Information Security Games, Proceedings of theon the Economics of Information Security WEIS’, Hanover, NH,on the Economics of Information Security’. Anderson, R. and

  2. Los Alamos National Security LLC Selected to Manage Los Alamos...

    Office of Environmental Management (EM)

    to be the management and operations contractor for Los Alamos National Laboratory in New Mexico. Los Alamos National Security LLC is a limited liability corporation made up of...

  3. Security Science & Technology | Nuclear Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Science & Technology Border Security Comprehensive Vulnerability and Threat Analysis Consequence Management, Safeguards, and Non-Proliferation Tools Export...

  4. Do More Transparent Corporate Actions Following a Restatement Influence the SEC's Decision to Issue an Enforcement Action? 

    E-Print Network [OSTI]

    Files, Rebecca Lynn

    2010-10-12T23:59:59.000Z

    This study examines whether corporate transparency about a restatement influences the Securities and Exchange Commission's (SEC) decision to issue an enforcement action. I consider corporate transparency to be higher when ...

  5. Law and Corporate Governance

    E-Print Network [OSTI]

    Fligstein, Neil; Choo, Jennifer

    2005-01-01T23:59:59.000Z

    1997. A survey of corporate governance. J. Finan. 52(2):737-1999. Employees and Corporate Governance. Washington, DC:structural change in corporate governance. J. Law Soc. 27(

  6. Business-driven security White paper

    E-Print Network [OSTI]

    March 2008 Business-driven security White paper Take a holistic approach to business-driven security. #12;Take a holistic approach to business-driven security. 2 Overview Today's corporate leaders face multiple challenges, including the need to innovate in extremely competitive business climates

  7. Analysis to determine the maximum dimensions of flexible apertures in sensored security netting products.

    SciTech Connect (OSTI)

    Murton, Mark; Bouchier, Francis A.; vanDongen, Dale T.; Mack, Thomas Kimball; Cutler, Robert Paul; Ross, Michael P.

    2013-08-01T23:59:59.000Z

    Although technological advances provide new capabilities to increase the robustness of security systems, they also potentially introduce new vulnerabilities. New capability sometimes requires new performance requirements. This paper outlines an approach to establishing a key performance requirement for an emerging intrusion detection sensor: the sensored net. Throughout the security industry, the commonly adopted standard for maximum opening size through barriers is a requirement based on square inches-typically 96 square inches. Unlike standard rigid opening, the dimensions of a flexible aperture are not fixed, but variable and conformable. It is demonstrably simple for a human intruder to move through a 96-square-inch opening that is conformable to the human body. The longstanding 96-square-inch requirement itself, though firmly embedded in policy and best practice, lacks a documented empirical basis. This analysis concluded that the traditional 96-square-inch standard for openings is insufficient for flexible openings that are conformable to the human body. Instead, a circumference standard is recommended for these newer types of sensored barriers. The recommended maximum circumference for a flexible opening should be no more than 26 inches, as measured on the inside of the netting material.

  8. Transportation Secure Data Center: Real-World Data for Planning, Modeling, and Analysis (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2014-01-01T23:59:59.000Z

    This fact sheet describes the Transportation Secure Data Center (TSDC) - an NREL-operated resource that provides secure access to detailed GPS travel data for valuable research purposes in a way that protects original participant privacy.

  9. Office of Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  10. Coupling Lemma and Its Application to The Security Analysis of Quantum Key Distribution

    E-Print Network [OSTI]

    Kentaro Kato

    2015-05-23T23:59:59.000Z

    It is known that the coupling lemma provides a useful tool in the study of probability theory and its related areas. It describes the relation between the variational distance of two probability distributions and the probability that outcomes from the two random experiments associated with each distribution are not identical. In this paper, the failure probability interpretation problem that has been presented by Yuen and Hirota is discussed from the viewpoint of the application of the coupling lemma. First, we introduce the coupling lemma, and investigate properties of it. Next, it is shown that the claims for this problem in the literatures are justified by using the coupling lemma. Consequently, we see that the failure probability interpretation is not adequate in the security analysis of quantum key distribution.

  11. Dartmouth Computer Science Technical Report TR2011-689 802.15.4/ZigBee Analysis and Security

    E-Print Network [OSTI]

    of devices for executing physical attacks against the onboard hardware. Attacks against the PHY and MACDartmouth Computer Science Technical Report TR2011-689 802.15.4/ZigBee Analysis and Security: Tools #12;Ricky A. Melgares Thesis Report 1 Introduction For the last decade or so, we have seen

  12. Frequency Interpolation Methods for Accelerating Parallel EMC Analysis Secure Computing Laboratory, Computer System Laboratories, Fujitsu Laboratories Ltd

    E-Print Network [OSTI]

    Strazdins, Peter

    Frequency Interpolation Methods for Accelerating Parallel EMC Analysis K. Homma Secure Computing-specific Electromagnetic Compatibility (EMC) re- quirements. Hence, minimizing the undesired radiation and avoiding electromagnetic wave radiation from these devices tends to increase. In such a situation, the estimation of EMC

  13. Experimental Security Analysis of a Modern Automobile Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, and Tadayoshi Kohno

    E-Print Network [OSTI]

    Hu, Fei

    Experimental Security Analysis of a Modern Automobile Karl Koscher, Alexei Czeskis, Franziska: {s,dlmccoy,brian,d8anders,hovav,savage}@cs.ucsd.edu Abstract--Modern automobiles are no longer mere evaluate these issues on a modern automobile and demonstrate the fragility of the underlying system

  14. THE CONTENT OF CORPORATE FEDERALISM

    E-Print Network [OSTI]

    Bratton, William W.

    2004-01-01T23:59:59.000Z

    Federalism in Corporate Governance: Protecting ShareholderCollaborative Corporate Governance: Listing Standards, Stateof Care Stadanrd in Corporate Governance 75 Iowa L. Rev. 1,

  15. Our Corporate Residents...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the quality and variety of the Corporate Residents who call ETTP home. From young start-ups to Fortune 500 corporations, Heritage Center's resources and assets are being fully...

  16. Essays on corporate bonds

    E-Print Network [OSTI]

    Bao, Jack (Jack C.)

    2009-01-01T23:59:59.000Z

    This thesis consists of three empirical essays on corporate bonds, examining the role of both credit risk and liquidity. In the first chapter, I test the ability of structural models of default to price corporate bonds in ...

  17. Corporate sustainability assessment methodology

    E-Print Network [OSTI]

    Pinchuk, Natallia

    2011-01-01T23:59:59.000Z

    Sustainability is a vague concept specifically in the context of a corporate world. There are numerous definitions for corporate sustainability and just as many ways of evaluating it. This work attempts to define, structure ...

  18. Yubing Wang EMC Corporation

    E-Print Network [OSTI]

    Claypool, Mark

    Yubing Wang EMC Corporation Hopkinton, MA 01748, USA wang_yubing@emc.com Mark Claypool Computer@cs.wpi.edu Zheng Zuo EMC Corporation Hopkinton, MA 01748, USA zuo_zheng@emc.com Abstract--The tremendous increase

  19. Indianapolis Public Transportation Corporation

    SciTech Connect (OSTI)

    Not Available

    2004-12-01T23:59:59.000Z

    Fact sheet describes the National Renewable Energy Laboratory's evaluation of Indianapolis Public Transportation Corporation's (IndyGo's) hybrid electric buses.

  20. CORPORATIONS APAC Tennessee Incorporated

    E-Print Network [OSTI]

    Dasgupta, Dipankar

    Business Resources Breast Cancer Eradication Initiative Incorporated Brother International Corporation Resources Incorporated ETI Corporation Corporate and Foundation Giving The University of Memphis is grateful Family of Companies KPMG Peat Marwick LLP Knox Music Incorporated Frank Ricks/Looney Ricks Kiss Lane

  1. GEORG-AUGUST-UNIVERSITT Computer Security

    E-Print Network [OSTI]

    Grabowski, Jens

    GEORG-AUGUST-UNIVERSITÄT GÖTTINGEN Computer Security Overview and Introduction Computer Security Security @ Göttingen » Research group for comuter security » Prof. Dr. Konrad Rieck » 4 PhD students (+ 2 security » Research on analysis, detection and prevention of threats » Development of intelligent security

  2. Cyber Security Analysis of State Estimators in Electric Power Systems Andre Teixeira, Saurabh Amin, Henrik Sandberg, Karl H. Johansson, and Shankar S. Sastry

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    Cyber Security Analysis of State Estimators in Electric Power Systems Andr´e Teixeira, Saurabh Amin security of state estimators in Supervisory Control and Data Acquisition (SCADA) systems operating in power random outliers in the measurement data. Such schemes are based on high measurement redundancy. Although

  3. Gone Rogue: An Analysis of Rogue Security Software Campaigns (Invited Paper)

    E-Print Network [OSTI]

    Yang, Junfeng

    victims. A troubling, recent example of this trend is cyber- criminals distributing rogue security or no protection. While the technical and economical aspects of rogue security software (e.g., its distribution programs are distributed by cyber- criminals to generate a financial profit. In fact, after the initial

  4. SECURITY ANALYSIS OF A CANCELABLE IRIS RECOGNITION SYSTEM BASED ON BLOCK REMAPPING

    E-Print Network [OSTI]

    Uhl, Andreas

    templates in case of a database breach. In this paper a security survey of a cancelable iris recognition for template protection. Two adjunctive scenarios and their impact on the security of the system are examined. First off it is assumed that an attacker got a hold on a single iris template. In the second scenario

  5. Security Analysis of Palm Operating System Martin Vandepas and Karin Olsrud

    E-Print Network [OSTI]

    and Network Security Department of Electrical and Computer Engineering Oregon State University Corvallis there are deficiencies in the code of the OS itself which introduce various security vulnerabilities. In this paper, we improvements which would prevent the exploitation of these vulnerabilities. 1 Introduction With the modern

  6. Transportation Secure Data Center: Real-world Data for Planning, Modeling, and Analysis (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2015-01-01T23:59:59.000Z

    The Transportation Secure Data Center (TSDC) at www.nrel.gov/tsdc provides free, web-based access to detailed transportation data from a variety of travel surveys conducted across the nation. While preserving the privacy of survey participants, this online repository makes vital transportation data broadly available to users from the comfort of their own desks via a secure online connection.

  7. MIRAGE: A Management Tool for the Analysis and Deployment of Network Security Policies

    E-Print Network [OSTI]

    Garcia-Alfaro, Joaquin

    of configuration policies over network security components, such as firewalls, intrusion detection systems, and VPN the advances in the field of network security technologies, such as filtering of traffic, use of encrypted be exploited by unauthorized parties. The use of firewalls, NIDSs (network intrusion detection systems

  8. Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

  9. A Multiple Network Approach to Corporate Governance

    E-Print Network [OSTI]

    Bonacina, Fausto; Moretto, Enrico; Stefani, Silvana; Torriero, Anna

    2014-01-01T23:59:59.000Z

    In this work, we consider Corporate Governance ties among companies from a multiple network perspective. Such a structurenaturally arises from the close interrelation between the Shareholding Network and the Board of Directors network. Inorder to capture the simultaneous effects on both networks on Corporate Governance, we propose to model the Corporate Governance multiple network structure via tensor analysis. In particular, we consider the TOPHITS model, based on the PARAFAC tensor decomposition, to show that tensor techniques can be successfully applied in this context. After providing some empirical results from the Italian financial market in the univariate case, we will show that a tensor-based multiple network approach can reveal important information.

  10. Analysis of the Security of Web Browsers via API Calls and Function Return Values

    E-Print Network [OSTI]

    Liebrock, Lorie M.

    @cs.nmt.edu kearney@cs.nmt.edu bondili@cs.nmt.edu Department of Computer Science New Mexico Institute of Mining exceptions. None of the more rarely used APIs have been specifically used by attackers to exploit security

  11. Strategic philanthropy for cyber security : an extended cost-benefit analysis framework to study cybersecurity

    E-Print Network [OSTI]

    Cho, Yiseul

    2012-01-01T23:59:59.000Z

    The international climate of cyber security is dramatically changing and thus unpredictable. As such, agile yet sustainable solutions are needed, along with an effective and a pragmatic evaluation framework to assess and ...

  12. A Security Framework for the Analysis and Design of Software Attestation

    E-Print Network [OSTI]

    need for enabling technologies that can validate and verify the integrity of a system's software state cryptographic primitives and protocols useless, a fact that demands for keyless security solutions. Therefore

  13. Food Security in Haiti After the 2010 Earthquake: Analysis and Evaluation of NGO Relief Efforts 

    E-Print Network [OSTI]

    McGaughey, Katie

    Haiti suffered an earthquake in January of 2010, bringing instability and widespread hunger. Even after two years, many Haitians lack food security, and one must look at the failings of the Haitian government and those who attempted to provide aid...

  14. Security analysis of communication system based on the synchronization of different order chaotic systems

    E-Print Network [OSTI]

    G. Alvarez; L. Hernandez; J. Munoz; F. Montoya; Shujun Li

    2005-06-27T23:59:59.000Z

    This work analyzes the security weakness of a recently proposed communication method based on chaotic modulation and masking using synchronization of two chaotic systems with different orders. It is shown that its application to secure communication is unsafe, because it can be broken in two different ways, by high-pass filtering and by reduced order system synchronization, without knowing neither the system parameter values nor the system key.

  15. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    cyber-security analysis of the SCADA system of the Gignac water distributioncyber security of SCADA systems managing other infrastructures (e.g. , oil and natural gas distribution

  16. Automotive Fuel Cell Corporation

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Automotive Fuel Cell Corporation n SNL researcher Cy Fujimoto demonstrates his new flexible hydrocarbon polymer electrolyte mem- brane, which could be a key factor in realizing a...

  17. National Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Mobile Applications StreamingReal-time Data Data System Architectures for National Security Sensor Networks Visual Analytics Risk Analysis Systems Modeling Engineering Analysis...

  18. Corporate Headquarters 317 Route 104

    E-Print Network [OSTI]

    Firestone, Jeremy

    Sustainable Energy Developments, Inc. is a New York Corporation Founded April 2002 Visualization Phone: (978) 422 7744 Sustainable Energy Developments, Inc. is a New York Corporation Founded Energy Developments, Inc. is a New York Corporation Founded April 2002

  19. Corporate and Business Plan

    E-Print Network [OSTI]

    Corporate and Business Plan 2010-2011 #12;Main addresses Forest Research Alice Holt Lodge Farnham Research's Business Plan 2010-2011 ..........................12 Table Contents Table 1 - Income This Corporate and Business Plan sets out FR's aims and strategic objectives. It describes the Key Performance

  20. Corporate Information & Computing Services

    E-Print Network [OSTI]

    Martin, Stephen John

    Corporate Information & Computing Services High Performance Computing Report March 2008 Author The University of Sheffield's High Performance Computing (HPC) facility is provided by CiCS. It consists of both Graduate Students and Staff. #12;Corporate Information & Computing Services High Performance Computing

  1. Smith & Franklin Academic Publishing Corporation

    E-Print Network [OSTI]

    Tong, Liang

    Smith & Franklin Academic Publishing Corporation www.smithandfranklin.com Science, Religion | Pages 23 Smith & Franklin Academic Publishing Corporation www.smithandfranklin.com ic origin, meant

  2. Using Violation and Vulnerability Analysis to Understand the Root-Causes of Complex Security Incidents

    E-Print Network [OSTI]

    Johnson, Chris

    Incidents C.W. Johnson Dept. of Computing Science, University of Glasgow, Glasgow, Scotland. http Department of Energy has also established the Information Security Resource Center to coordinate the `root is appropriate because it included failures in the underlying audit and control mechanisms. It also stemmed from

  3. Scalable, Secure Energy Information Management for Demand-Response Analysis Yogesh Simmhan1,2

    E-Print Network [OSTI]

    Prasanna, Viktor K.

    is expanding at a rapid rate to enable communication using emerging standards, the software architecture. A medical emergency or disaster preparedness agency imposes relaxed privacy requirements during emergency by the smart grid in the context of cyber-security ­ the real time nature of data and the large scale at which

  4. Teaching in computer security and privacy The Computer Laboratory's undergraduate and masters programmes

    E-Print Network [OSTI]

    Crowcroft, Jon

    computing security · Economics of cybercrime · Economics of information security · Formal methods · Hardware security · Location and positioning systems · Malware analysis · Medical information security · MobileTeaching in computer security and privacy The Computer Laboratory's undergraduate and masters

  5. Transportation Secure Data Center: Real-World Data for Planning, Modeling and Analysis (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2013-01-01T23:59:59.000Z

    The National Renewable Energy Laboratory (NREL) and the U.S. Department of Transportation (DOT) have launched the free, web-based Transportation Secure Data Center (TSDC). The TSDC (www.nrel.gov/tsdc) preserves respondent anonymity while making vital transportation data available to a broad group of users through secure, online access. The TSDC database gives, metropolitan planning organizations, universities, national laboratories, air quality management districts, disaster planning agencies and auto manufacturers free-of-charge web-based access to valuable transportation data. The TSDC's two levels of access make composite data available with simple online registration, and allow researchers to use detailed spatial data after completing a straight forward application process.

  6. Security analysis of RSA cryptosystem algorithm and it’s properties

    SciTech Connect (OSTI)

    Liu, Chenglian [School of Mathematics and Computer Science, Long Yan university, Lonyan 364012 (China); Guo, Yongning, E-mail: guoyn@163.com, E-mail: linjuanliucaihong@qq.com; Lin, Juan, E-mail: guoyn@163.com, E-mail: linjuanliucaihong@qq.com [Department of Mathematics and Computer Science, Fuqing Branch of Fujian Normal University, Fuqing 350300 (China)

    2014-10-06T23:59:59.000Z

    The information technology rapidly development and dramatically changed the life style people, in addition to shortening the distance of communication, but also promote the smooth exchange of information flows. However, derivatives to facilitate the relative safety of these issues, since into the digital information age, the majority of the practitioners of engineering and technical personnel and technical workers in terms of technology, information security is increasingly becoming an important issue. The RSA algorithm was published in 1978. It is a kind of very popular and widely application modem cryptosystem in the world. Even though there are lots of articles to discuss about how to break the RSA, but it is still secure today. In this paper, the authors would like to introduce a variant attack to RSA.

  7. Rutgers Business School Corporate Finance

    E-Print Network [OSTI]

    Lin, Xiaodong

    Rutgers Business School Corporate Finance Fall 2014 Instructor: Vikram Nanda Office: 5186 to the basic and current research questions and methods ­ theoretical and empirical ­ in corporate finance areas in corporate finance. Among these: · Tirole, Corporate Finance · Finance Handbooks such as: Jarrow

  8. Cyber Security

    Energy Savers [EERE]

    Associate CIO for Cyber Security (IM-30) Rod Turk Deputy Associate CIO for Cyber Security (IM-30) Michael Maraya Incident Management Division (IM-32) Rob Ciochon Director Policy,...

  9. information security

    E-Print Network [OSTI]

    Faculty listing for "information security" ... 1167; Phone: +1 765 49-46022; Email: wagstaff@purdue.edu; Research Interests: number theory, information security.

  10. Corporate Energy Management Process

    E-Print Network [OSTI]

    Geiger, T.

    2013-01-01T23:59:59.000Z

    . May 21-24, 2013 Corporate Energy Management Process 2 ?Brief introduction to BASF ? BASF Corporate Energy Management ? Management Support ? Goals ? Continuous Improvement ? Best Practices ? Recognition ?Summary ESL-IE-13-05-25 Proceedings...-value products ? Intelligent, sustainable system solutions ? 2012 Sales: ?72.1 Billion ? Employees: 110,000 Company overview BASF ? The Chemical Company ESL-IE-13-05-25 Proceedings of the Thrity-Fifth Industrial Energy Technology Conference New Orleans, LA...

  11. Statement by Harvard Corporation Committee on Shareholder Responsibility (CCSR) Regarding Stock in China Petroleum and Chemical Corporation (Sinopec Corporation)

    E-Print Network [OSTI]

    Corporation and its closely affiliated parent company, China Petrochemical Corporation (Sinopec Group listed company in which a dominant (68 percent) interest is held by China Petrochemical Corporation

  12. Corporate Depreciation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand JumpConceptual Model, clickInformationNew|Core Analysis At Geysers|Cornwall,Corporate Depreciation

  13. Corporate Exemption | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand JumpConceptual Model, clickInformationNew|Core Analysis At Geysers|Cornwall,Corporate

  14. Corporate Governance, the Environment, and the Internet

    E-Print Network [OSTI]

    Andrew, Jane

    2003-01-01T23:59:59.000Z

    contemporary society: Corporate governance at a crossroads.R. (1997). A survey of corporate governance. The Journal ofCorporate Governance, the Environment, and the Internet Jane

  15. Lesson from Fiascos in Russian Corporate Governance

    E-Print Network [OSTI]

    Fox, Merritt; Heller, Michael

    2000-01-01T23:59:59.000Z

    Cause Corporate Governance Failures . . . . . . . . . 1.understanding of how corporate governance works. See Heller,Shareholders in Corporate Governance (1999) (mimeo on file

  16. Lesson from Fiascos in Russian Corporate Governance

    E-Print Network [OSTI]

    Fox, Merritt B.; Heller, Michael A.

    1999-01-01T23:59:59.000Z

    Cause Corporate Governance Failures . . . . . . . . . 1.understanding of how corporate governance works. See Heller,Shareholders in Corporate Governance (1999) (mimeo on file

  17. Capital Structure Implications for Corporate Governance

    E-Print Network [OSTI]

    Rajan, Nishanth

    2012-01-01T23:59:59.000Z

    A. R¨oell, 2002, “Corporate governance and control,” ECGI-Enjoying the quiet life? Corporate governance and managerialGrinstein, 2007, “Corporate governance and firm value: The

  18. Corporate Law, Social Norms and Belief Systems

    E-Print Network [OSTI]

    Eisenberg, Melvin

    1999-01-01T23:59:59.000Z

    fiduciary duties, corporate governance, and takeovers (Partinvestors in corporate governance. Often, the operation ofthe ALI’s Principles of Corporate Governance provides that a

  19. Quality Assurance Corporate Board | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Assurance Corporate Board Quality Assurance Corporate Board The Office of Environmental Management (EM) Quality Assurance Corporate Board is an executive board that includes both...

  20. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    and validation of models used to evaluate nuclear power plant components such as the spent fuel pools (shown acentralroleinmanyapplicationssupportingnuclear reactor safety analysis, severe consequence analyses, and nuclear fuel cycle programs including National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly

  1. In Proceedings of APSEC 2010 Cloud Workshop, Sydney, Australia, 30th An Analysis of The Cloud Computing Security Problem

    E-Print Network [OSTI]

    Grundy, John

    of The Cloud Computing Security Problem Mohamed Al Morsy, John Grundy and Ingo Müller Computer Science to adopt IT without upfront investment. Despite the potential gains achieved from the cloud computing solution. Keywords: cloud computing; cloud computing security; cloud computing security management. I

  2. ASRC AREOSPACE CORPORATION

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    security complex and the Pantex plant, with an option to include the Savannah River Tritium operations. Next, we're going to consider noncompetitively extending the contract for...

  3. Power Analysis of Atmel CryptoMemory Recovering Keys from Secure EEPROMs

    E-Print Network [OSTI]

    Verdult, Roel

    , [...] including physical attacks". We de- veloped a successful power analysis attack on the authentication step knowledge, this is the first power analysis attack on Atmel CryptoMemory products reported in the literature

  4. Economics definitions, methods, models, and analysis procedures for Homeland Security applications.

    SciTech Connect (OSTI)

    Ehlen, Mark Andrew; Loose, Verne William; Vargas, Vanessa N.; Smith, Braeton J.; Warren, Drake E.; Downes, Paula Sue; Eidson, Eric D.; Mackey, Greg Edward

    2010-01-01T23:59:59.000Z

    This report gives an overview of the types of economic methodologies and models used by Sandia economists in their consequence analysis work for the National Infrastructure Simulation&Analysis Center and other DHS programs. It describes the three primary resolutions at which analysis is conducted (microeconomic, mesoeconomic, and macroeconomic), the tools used at these three levels (from data analysis to internally developed and publicly available tools), and how they are used individually and in concert with each other and other infrastructure tools.

  5. Information Security: Coordination of Federal Cyber Security...

    Office of Environmental Management (EM)

    Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

  6. An Analysis of Security and Privacy Issues in Smart Grid Software Architectures on Yogesh Simmhan, Alok Gautam Kumbhare, Baohua Cao, and Viktor Prasanna

    E-Print Network [OSTI]

    Prasanna, Viktor K.

    Grids that use large scale smart meter deployments at power consumers for bi-directional realtime, the growth of third party Smart Grid applications for consumers, such as Google PowerMeter1 and MicrosoftAn Analysis of Security and Privacy Issues in Smart Grid Software Architectures on Clouds Yogesh

  7. Security Issues in Data Warehousing and Data Mining: Panel Discussion

    E-Print Network [OSTI]

    Lin, Tsau Young

    and mining. Position by Linda Schlipper For most enterprises there is no shortage of data. Operational dataSecurity Issues in Data Warehousing and Data Mining: Panel Discussion Bhavani Thuraisingham Corporation Abstract This paper describes the panel discussion on data warehousing, data mining and security

  8. Decision Support for Choice of Security

    E-Print Network [OSTI]

    Langseth, Helge

    Decision Support for Choice of Security Solution The Aspect-Oriented Risk Driven Development (AORDD decisions. (4) RDD annotation rules for security risk and security solution variable estimation. (5) The AORDD security solution trade-o¤ analysis and trade-o¤ tool BBN topology. (6) Rule set for how

  9. Essays in Behavioral Corporate Finance

    E-Print Network [OSTI]

    Zheng, Hui

    2012-01-01T23:59:59.000Z

    and practice of corporate finance: evidence from the field,Journal of Applied Corporate Finance 15, 8–23. 18. Graham,governance, Journal of Finance 63, 2737–2784. 21. Hackbarth,

  10. Corporate governance and insider trading

    E-Print Network [OSTI]

    Rozanov, Konstantin A

    2008-01-01T23:59:59.000Z

    I investigate the relation between corporate governance and insider trading by corporate executives. Despite the general view that trade on non-public information adversely affects capital market participants, the impact ...

  11. Corporate governance and banking regulation

    E-Print Network [OSTI]

    Alexander, Kern

    The globalisation of banking markets has raised important issues regarding corporate governance regulation for banking institutions. This research paper addresses some of the major issues of corporate governance as it relates to banking regulation...

  12. 3M Corporation Abbott Laboratories

    E-Print Network [OSTI]

    Napier, Terrence

    . Agilent Technologies, Inc. Air Products Foundation Alaska Airlines Albemarle Corporation Alcoa Foundation Energy Group, Inc. Corning Incorporated Foundation Crayola, LLC Deloitte Foundation Delta Air Lines3M Corporation Abbott Laboratories Adage Capital Management, LP Adams Electric Cooperative, Inc

  13. Introducing Abuse Frames for Analysing Security Requirements Luncheng Lin Bashar Nuseibeh Darrel Ince Michael Jackson Jonathan Moffett

    E-Print Network [OSTI]

    Nuseibeh, Bashar

    a focus for early security threat analysis. Traditional information security development methods haveIntroducing Abuse Frames for Analysing Security Requirements Luncheng Lin Bashar Nuseibeh Darrel using Jackson's Problem Frames to analyse security problems in order to determine security

  14. A Method for Estimating the Financial Impact of Cyber Information Security Breaches Utilizing the Common Vulnerability Scoring System and Annual Loss Expectancy

    E-Print Network [OSTI]

    Lindsey, Michael B.

    2010-05-14T23:59:59.000Z

    Information security is relatively new field that is experiencing rapid growth in terms of malicious attack frequency and the amount of capital that firms must spend on attack defense. This rise in security expenditures has prompted corporate...

  15. Forestry Commission England Corporate Plan

    E-Print Network [OSTI]

    Forestry Commission England Corporate Plan 2011-15 This is the Corporate Plan for the Forestry Commission in England. It is one of a suite of plans including those for Forestry Commission (GB) and Forest Research. Page 1Forestry Commission England Corporate Plan 2011-15 #12;Page 2Forestry Commission England

  16. Climate-derived tensions in Arctic security.

    SciTech Connect (OSTI)

    Backus, George A.; Strickland, James Hassler

    2008-09-01T23:59:59.000Z

    Globally, there is no lack of security threats. Many of them demand priority engagement and there can never be adequate resources to address all threats. In this context, climate is just another aspect of global security and the Arctic just another region. In light of physical and budgetary constraints, new security needs must be integrated and prioritized with existing ones. This discussion approaches the security impacts of climate from that perspective, starting with the broad security picture and establishing how climate may affect it. This method provides a different view from one that starts with climate and projects it, in isolation, as the source of a hypothetical security burden. That said, the Arctic does appear to present high-priority security challenges. Uncertainty in the timing of an ice-free Arctic affects how quickly it will become a security priority. Uncertainty in the emergent extreme and variable weather conditions will determine the difficulty (cost) of maintaining adequate security (order) in the area. The resolution of sovereignty boundaries affects the ability to enforce security measures, and the U.S. will most probably need a military presence to back-up negotiated sovereignty agreements. Without additional global warming, technology already allows the Arctic to become a strategic link in the global supply chain, possibly with northern Russia as its main hub. Additionally, the multinational corporations reaping the economic bounty may affect security tensions more than nation-states themselves. Countries will depend ever more heavily on the global supply chains. China has particular needs to protect its trade flows. In matters of security, nation-state and multinational-corporate interests will become heavily intertwined.

  17. Press Release Corporate Communications

    E-Print Network [OSTI]

    Haller-Dintelmann, Robert

    Page: 1/2 Press Release Corporate Communications Karolinenplatz 5 D-64289 Darmstadt Germany Your.ch@pvw.tu- darmstadt.de Internet: http://www.tu- darmstadt.de/presse e-mail: presse@tu-darmstadt.de On Cloud Nine TU). She intends to use the funding for basic research into the programming of software that will be fit

  18. Antecedents of corporate volunteerism

    E-Print Network [OSTI]

    Henning, Jaime Blaine

    2009-05-15T23:59:59.000Z

    LIST OF FIGURES FIGURE Page 1 Hypothesized relationships between the perceived locus of causality, functional motives, and theory of planned behavior variables ....................... 41 2 Significant... engages in, independent of work, with or without the support of the employer, whereas corporate volunteerism (CV) requires some form of knowledge and support for the volunteering on the part of the employer (Graff, 2004; Lukka, 2000; Seel, 1995...

  19. 2013 Annual Workforce Analysis and Staffing Plan Report- Office of Health, Safety and Security

    Broader source: Energy.gov [DOE]

    Managers perform an annual workforce analysis of their organization and develop staffing plans that identify technical capabilities and positions they need to ensure safe operation of defense nuclear facilities.

  20. 2011 Annual Workforce Analysis and Staffing Plan Report- Office of Health, Safety and Security

    Broader source: Energy.gov [DOE]

    Managers perform an annual workforce analysis of their organization and develop staffing plans that identify technical capabilities and positions they need to ensure safe operation of defense nuclear facilities.

  1. 2010 Annual Workforce Analysis and Staffing Plan Report- Office of Health, Safety and Security

    Broader source: Energy.gov [DOE]

    Managers perform an annual workforce analysis of their organization and develop staffing plans that identify technical capabilities and positions they need to ensure safe operation of defense nuclear facilities.

  2. 2012 Annual Workforce Analysis and Staffing Plan Report- Office of Health, Safety and Security

    Broader source: Energy.gov [DOE]

    Managers perform an annual workforce analysis of their organization and develop staffing plans that identify technical capabilities and positions they need to ensure safe operation of defense nuclear facilities.

  3. 2014 Annual Workforce Analysis and Staffing Plan Report- Office of Environment, Health, Safety and Security

    Broader source: Energy.gov [DOE]

    Managers perform an annual workforce analysis of their organization and develop staffing plans that identify technical capabilities and positions they need to ensure safe operation of defense nuclear facilities.

  4. adp security plan: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security College is a joint initiative of the Commonwealth Government. In this environment, national security policymaking depends critically on realistic strategic analysis,...

  5. Security Walls, LLC, January 14-18, 2013

    Broader source: Energy.gov (indexed) [DOE]

    their contributions to health and safety at Security Walls. Security Walls uses the Job Hazard Analysis process to address protective force hazards and develop controls. Subject...

  6. Security analysis of boolean algebra based on Zhang-Wang digital signature scheme

    SciTech Connect (OSTI)

    Zheng, Jinbin, E-mail: jbzheng518@163.com [School of Mathematics and Computer Science, Long Yan University, Longyan 364012 (China)

    2014-10-06T23:59:59.000Z

    In 2005, Zhang and Wang proposed an improvement signature scheme without using one-way hash function and message redundancy. In this paper, we show that this scheme exits potential safety concerns through the analysis of boolean algebra, such as bitwise exclusive-or, and point out that mapping is not one to one between assembly instructions and machine code actually by means of the analysis of the result of the assembly program segment, and which possibly causes safety problems unknown to the software.

  7. Japanese Corporate Governance: The Hidden Problems of the Corporate Law and Their Solutions

    E-Print Network [OSTI]

    Shishido, Zenichi

    1999-01-01T23:59:59.000Z

    norm. Japanese Corporate Governance: The Hidden Problems ofsame time. Arguments on corporate governance can be dividedinto two types: corporate governance in the narrow sense and

  8. Abstract--Distribution factors play a key role in many system security analysis and market applications. The injection shift

    E-Print Network [OSTI]

    for and the computationally efficient evaluation of LODFs under multiple- line outages. Index Terms--power transfer distribution factors, line outage distribution factors, multiple-line outages, system security. I. INTRODUCTION. Given the usefulness of LODFs in the study of security with many outaged lines, such as in blackouts

  9. Benchmarking Corporate Energy Management

    E-Print Network [OSTI]

    Norland, D. L.

    BENCHMARKING CORPORATE ENERGY MANAGEMENT Dr. Douglas L. Norland Director of Research and Industrial Programs Alliance to Save Energy Washington, DC ABSTRACT There is growing interest among energy managers in finding out how their company...'s energy management procedures and perfonnance compare to that of other companies. Energy management involves everything from setting goals and targets to implementing best maintenance practices. This paper, however, discusses benchmarking energy...

  10. IBM Internet Security Systems Threat Insight Monthly

    E-Print Network [OSTI]

    the Report 01 Keylogging, by the numbers 02 Securing the Secure Shell ­ Advanced user authentication and key Page 1 #12;Keylogging, by the numbers Introduction During the course of malware analysis, especially

  11. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14T23:59:59.000Z

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  12. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15T23:59:59.000Z

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  13. Cybersecurity Management in the States: The Emerging Role of Chief Information Security Officers

    E-Print Network [OSTI]

    Goodyear, Marilu; Goerdel, Holly T.; Portillo, Shannon; Williams, Linda M.

    2010-01-01T23:59:59.000Z

    , and in their personal lives. Both corporations and government have responded by creating a new role in their organizations to lead the safeguarding efforts—chief information security officers (CISOs). The role of these officers is still under development. Do...

  14. Gender Diversity in Corporate Leadership

    E-Print Network [OSTI]

    McLean, Lindsey

    2011-01-01T23:59:59.000Z

    ceiling’ and attain top leadership positions has positivehierarchy. Thus, changing leadership may be a mechanism toDiversity in Corporate Leadership RECENTLY RELEASED WORKING

  15. THE AEROSPACE CORPORATION

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group currentBradleyTableSelling7 AugustAFRICAN3uj: ;;I : T' j-jE: i tCORPORATION

  16. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  17. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    Information Security Group IY5512 Computer Security Part 7b: Windows securityPart 7b: Windows security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security Group) of Windows machines. 2 Information Security Group Objectives II · Focus on Active Directory, authentication

  18. LANL named 2010 top corporate volunteer organization

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2010 top corporate volunteer organization LANL named 2010 top corporate volunteer organization The Laboratory ranked ahead of dozens of other qualifying companies with 10,000 or...

  19. Siemens Pittsburgh, PA Novelis Corporation Atlanta, GA

    E-Print Network [OSTI]

    McGaughey, Alan

    Industrial Design ­ Shanghai, China Eaton Corporation ­ Pittsburgh, PA CMU, CTTEC ­ PittsburghSiemens ­ Pittsburgh, PA Novelis Corporation ­ Atlanta, GA Expense

  20. Implementing a Corporate Energy Management System

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Implementing a Corporate Energy Management System" Steve Schultz Corporate Energy Manager 3M Presented at the U.S. Department of Energy Industrial Technologies Program June 3, 2010...

  1. Transportation Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

  2. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08T23:59:59.000Z

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  3. Transportation Secure Data Center: Real-World Data for Transportation Planning and Land Use Analysis (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2013-01-01T23:59:59.000Z

    The National Renewable Energy Laboratory (NREL) and the U.S. Department of Transportation (DOT) have launched the free, web-based Transportation Secure Data Center (TSDC). The TSDC (www.nrel.gov/tsdc) preserves respondent anonymity while making vital transportation data available to a broad group of users through secure, online access. The TSDC database provides free-of-charge web-based access to valuable transportation data that can be used for: Transit planning, Travel demand modeling, Homeland Security evacuation planning, Alternative fuel station planning, and Validating transportation data from other sources. The TSDC's two levels of access make composite data available with simple online registration, and allow researchers to use detailed spatial data after completing a straight forward application process.

  4. Unconditional security at a low cost

    E-Print Network [OSTI]

    Xiongfeng Ma

    2006-07-31T23:59:59.000Z

    By simulating four quantum key distribution (QKD) experiments and analyzing one decoy-state QKD experiment, we compare two data post-processing schemes based on security against individual attack by L\\"{u}tkenhaus, and unconditional security analysis by Gottesman-Lo-L\\"{u}tkenhaus-Preskill. Our results show that these two schemes yield close performances. Since the Holy Grail of QKD is its unconditional security, we conclude that one is better off considering unconditional security, rather than restricting to individual attacks.

  5. Security Specialist

    Broader source: Energy.gov [DOE]

    The position is located in the Office of Environmental Management (EM),Office of Safeguards, Security and Emergency Preparedness (EM-44). The mission of EM-44 is to develop and oversee the...

  6. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  7. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27T23:59:59.000Z

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  8. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20T23:59:59.000Z

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  9. NNSA Corporate CPEP Process NNSA LOS ALAMOS NATIONAL SECURITY...

    National Nuclear Security Administration (NNSA)

    were taken that delivered savings, including a very favorable overhaul of the employee health care plan, but more comprehensive cost control efforts are needed. The Laboratory...

  10. FY 2006 Sandia Corporation PER Summary | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved: 5-13-14Russianvolunteer0017 Federal Register09National

  11. FY 2007 Sandia Corporation PER Summary | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved: 5-13-14Russianvolunteer0017 FederalAdministration

  12. FY 2008 Sandia Corporation PER Summary | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved: 5-13-14Russianvolunteer0017National NuclearAdministration Sandia

  13. FY 2009 Sandia Corporation PER Summary | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved: 5-13-14Russianvolunteer0017NationalNational

  14. Taxation and Social Security

    E-Print Network [OSTI]

    Kaplow, Louis

    2006-01-01T23:59:59.000Z

    Re: Taxation and Social Security Attached is draft chapter11 TAXATION AND SOCIAL SECURITY A substantial fraction ofaspects of social security schemes in a setting in which

  15. Security and Elections

    E-Print Network [OSTI]

    Bishop, Matt; Peisert, Sean

    2012-01-01T23:59:59.000Z

    World Conf. Information Security Education, 2007, pp. 17–24;Security andElections IEEE Security & Privacy, 10(5):64–67, Sept. -

  16. CAMPUS SECURITY REPORT 2009

    E-Print Network [OSTI]

    CAMPUS SECURITY REPORT 2009 San Francisco State University University Police Department 1600 & Procedure Concerning Security, Access & Maintenance of Campus Facilities & Weapons Policies........................................................... 6 g. Safety & Security

  17. Corporate Jobs Tax Credit (Louisiana)

    Broader source: Energy.gov [DOE]

    Corporate Jobs Tax Credit is a one-time tax credit ranging from up to $225 for each net new permanent job created as the result of a new business start-up or the expansion of an existing one. ...

  18. Power Reliability at BASF Corporation

    E-Print Network [OSTI]

    Theising, T. R.

    2011-01-01T23:59:59.000Z

    Power Reliability at BASF Corporation Thomas R. Theising Energy Systems Manager BASF Corporation ABSTRACT: Quality is defined not as what the supplier puts into the product but what the customer gets out and is willing to pay for. Power.... INTRODUCTION: BASF often identifies its? power quality by the effects it has on its ability to manufacture products. Improvements are made to remedy the power quality problems either through the elimination of the problems or through some means...

  19. Power Reliability at BASF Corporation

    E-Print Network [OSTI]

    Theising, T. R.

    2012-01-01T23:59:59.000Z

    Power Reliability at BASF Corporation Thomas R. Theising Energy Systems Manager BASF Corporation ABSTRACT: Quality is defined not as what the supplier puts into the product but what the customer gets out and is willing to pay for. Power.... INTRODUCTION: BASF often identifies its? power quality by the effects it has on its ability to manufacture products. Improvements are made to remedy the power quality problems either through the elimination of the problems or through some means...

  20. Security analysis of the decoy method with the Bennett-Brassard 1984 protocol for finite key lengths

    E-Print Network [OSTI]

    Masahito Hayashi; Ryota Nakayama

    2013-11-19T23:59:59.000Z

    This paper provides a formula for the sacrifice bit-length for privacy amplification with the Bennett-Brassard 1984 protocol for finite key lengths when we employ the decoy method. Using the formula, we can guarantee the security parameter for realizable quantum key distribution system. The key generation rates with finite key lengths are numerically evaluated. The proposed method improves the existing key generation rate even in the asymptotic setting.

  1. Special features of corporation accounting in Texas

    E-Print Network [OSTI]

    Davis, Garnett Stant

    1943-01-01T23:59:59.000Z

    ') Excess of Depletion Reserve over Leasehold Costs. The analysis of changes in taxable capital consists of a combined income and surplus statement, together with any additions or deductions from capital stock that may have taken place withLn the year... Forfeited Stock To record forfeitup of stock and previous payments. 500. 00 200i00 500. 00 200. 00 300. 00 200 00 tchell v. Porter, Tex. Civ. App. , 223 S. S. 1/7. Hildebrand, Texas Corporations, Vol. 1, p. 111. Broad, Some Comments on Surplus...

  2. Corporate International Operations | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand JumpConceptual Model, clickInformationNew|Core Analysis At Geysers|Cornwall,CorporateInternational

  3. Covanta Holding Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand JumpConceptual Model, clickInformationNew|Core AnalysisCouncil, Idaho: EnergyCovantaIncCorporation

  4. Tag: Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Tag: Security Displaying 1 - 6 of 6... Category: Security Sheltering in Place If you are advised to shelter-in-place by local news or our website, please follow these...

  5. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29T23:59:59.000Z

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  6. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  7. Security Rulemaking

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergy SmallImplementingSecurity SymposiumSecuring the Nation's509Department2

  8. Faculty Information Security Guide

    E-Print Network [OSTI]

    Myers, Lawrence C.

    Faculty Information Security Guide Dartmouth Your information is vitally important to your teaching protect your information. THE DARTMOUTH INFORMATION SECURITY COMMITTEE The Dartmouth Information Security Committee (DISC) meets monthly to assess vulnerabilities of information security, and to develop and revise

  9. SELECTING INFORMATION TECHNOLOGY SECURITY

    E-Print Network [OSTI]

    April 2004 SELECTING INFORMATION TECHNOLOGY SECURITY PRODUCTS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Information technology security prod ucts are essential to better secure infor mation technology (IT) systems

  10. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    FROM: SUBJECT: USIUK Memorandum of Understanding between National Nuclear Security Administration's (NNSA) Associate Administrator for Defense Nuclear Security (AADNS)...

  11. Karnataka Power Corporation Limited and National Thermal Power...

    Open Energy Info (EERE)

    Limited and National Thermal Power Corporation JV Jump to: navigation, search Name: Karnataka Power Corporation Limited and National Thermal Power Corporation JV Place: India...

  12. Culture, Law, and Finance: Cultural Dimensions of Corporate Governance Laws

    E-Print Network [OSTI]

    Licht, Amir N.; Goldschmidt, Chanan; Schwartz, Shalom H.

    2001-01-01T23:59:59.000Z

    Protection and Corporate Governance, 58 J. Fin. Econ.the legal approach to corporate governance by presenting newlegal rules of corporate governance. 5 The need to take

  13. Corporate Governance, State-Contingent Control Rights, and Financial Distress

    E-Print Network [OSTI]

    Rasmussen, Robert K.

    2004-01-01T23:59:59.000Z

    20-6:00 pm, Boalt 13 Corporate Governance, State-ContingentRobert K. Rasmussen Corporate Governance, State-ContingentTraditional accounts of corporate governance focus on how

  14. U.S. Style Corporate Governance in Korea's Largest Companies

    E-Print Network [OSTI]

    Ehrlich, Craig; Kang, Dae-Seob

    2000-01-01T23:59:59.000Z

    E.g. , D. Gordon Smith, Corporate Governance and ManagerialPrinciples of Corporate Governance, http://www.oecd.orgdaf/Bank/OECD Global Corporate Governance Forum, Washington

  15. Corporate Social Responsibility as a Conflict Between Owners

    E-Print Network [OSTI]

    Rubin, Amir

    2005-01-01T23:59:59.000Z

    Metrick, 2003, Corporate governance and equity prices,to link CSR with corporate governance. Arguably this linkexpenditure and good corporate governance mechanisms are to

  16. How Big a Problem is U.S. Corporate Governance?

    E-Print Network [OSTI]

    Kaplan, Steve

    2007-01-01T23:59:59.000Z

    suggests that poor corporate governance or managerial powertheories argue that corporate governance deteriorated in thestealing CEOs or poor corporate governance cannot possibly

  17. Choice as Regulatory Reform: The Case of Japanese Corporate Governance

    E-Print Network [OSTI]

    Milhaupt, Curtis

    2004-01-01T23:59:59.000Z

    Globalization of Corporate Governance: Convergence of Formthe idea that U.S. corporate governance was a model for AsiaWoochan Kim, Does Corporate Governance Predict Firms’ Market

  18. Nuclear Safety Enforcement Letter issued to Sandia Corporation...

    Broader source: Energy.gov (indexed) [DOE]

    Enforcement Letter issued to Sandia Corporation Nuclear Safety Enforcement Letter issued to Sandia Corporation 9222014 Enforcement Letter, Sandia Corporation, September 22, 2014...

  19. abolishes corporate income: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    5, 2014 12;Corporate Affiliates Chairman: Mark Ambrose San Diego Site Executive, Raytheon 12;Corporate Affiliates Program Welcome New CAP Members 12;Corporate Affiliates...

  20. agua corporal total: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    5, 2014 12;Corporate Affiliates Chairman: Mark Ambrose San Diego Site Executive, Raytheon 12;Corporate Affiliates Program Welcome New CAP Members 12;Corporate Affiliates...

  1. abolishing corporate income: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    5, 2014 12;Corporate Affiliates Chairman: Mark Ambrose San Diego Site Executive, Raytheon 12;Corporate Affiliates Program Welcome New CAP Members 12;Corporate Affiliates...

  2. Steffes Corporation Smart Grid RFI: Addressing Policy and Logistical...

    Energy Savers [EERE]

    Steffes Corporation Smart Grid RFI: Addressing Policy and Logistical Challenges Steffes Corporation Smart Grid RFI: Addressing Policy and Logistical Challenges Steffes Corporation...

  3. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27T23:59:59.000Z

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  4. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29T23:59:59.000Z

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Admin Chg 2, dated 5-15-15, cancels Admin Chg 1.

  5. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18T23:59:59.000Z

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  6. Special Analysis of the Area 3 Radioactive Waste Management Site at the Nevada National Security Site, Nye County, Nevada

    SciTech Connect (OSTI)

    National Security Technologies, LLC, Environmental Management

    2012-09-30T23:59:59.000Z

    This report describes the methods and results of a special analysis (SA) of the Area 3 Radioactive Waste Management Site (RWMS) on the Nevada National Security Site (NNSS). The purpose of the SA is to determine if the approved performance assessment (PA) and composite analysis (CA) (Shott et al., 2001) remain valid. The Area 3 RWMS PA and CA were prepared as a single document and received conditional approval on October 6, 1999. A conditional Disposal Authorization Statement (DAS) for the Area 3 RWMS was issued on October 20, 1999. Since preparation of the approved PA and CA, new information and additional environmental monitoring data have been used to update the PA and CA. At the same time, continual advancements in computer processors and software have allowed improvement to the PA and CA models. Annual reviews of the PA and CA required by U.S. Department of Energy (DOE) Order DOE O 435.1 have documented multiple changes occurring since preparation of the PA and CA. Potentially important changes include: Development of a new and improved baseline PA and CA model implemented in the probabilistic GoldSim simulation platform. A significant increase in the waste inventory disposed at the site. Revision and updating of model parameters based on additional years of site monitoring data and new research and development results. Although changes have occurred, many important PA/CA issues remain unchanged, including the site conceptual model, important features, events, and processes, and the points of compliance. The SA is performed to document the current status of the PA/CA model and to quantitatively assess the impact of cumulative changes on the PA and CA results. The results of the SA are used to assess the validity of the approved PA/CA and make a determination if revision of the PA or CA is necessary. The SA was performed using the Area 3 RWMS, version 2.102, GoldSim model, the current baseline PA/CA model. Comparison of the maximum SA results with the PA performance objectives indicates that there continues to be a reasonable expectation of compliance. The resident exposure scenario was evaluated for compliance with the air pathway and all-pathways annual total effective dose (TED) performance objectives. The maximum mean air pathway TED, 7E-6 millisievert (mSv) at 1,000 years (y) has decreased relative to the approved PA and is significantly less than the 0.1 mSv limit. The maximum mean all-pathways annual TED, 7E-5 mSv at 1,000 y has increased but remains a small fraction of the 0.25 mSv limit. The SA maximum mean radon-222 (222Rn) flux density, 0.03 becquerel per square meter per second (Bq m-2 s-1), has increased relative to the PA results but is significantly less than the 0.74 Bq m-2 s-1 limit. The SA results continue to support a conclusion that the disposed waste inventory is protective of intruders and groundwater resources. The maximum mean intruder TED, 0.01 mSv for an acute construction scenario at the U-3ah/at disposal unit, was less than the 5 mSv performance measure. Site monitoring data and research results continue to support a conclusion that a groundwater pathway will not exist within the 1,000 y compliance period. Projected releases to the environment are a small fraction of the performance objectives. Cost-effective options for reducing releases further are unlikely to exist. Therefore, releases from the Area 3 RWMS are judged to be as low as reasonably achievable. Comparison of the maximum CA result with the 0.3 mSv CA dose constraint indicates that no action is required to reduce the dose from the Area 3 RWMS and all interacting sources of residual radioactive contamination. The SA maximum mean CA annual TED, 0.02 mSv at 1,000 y, has increased from the approved CA result but remains less than 10% of the dose constraint. The CA TED continues to be due predominantly to inhalation of plutonium-239 resuspended from soils contaminated by nuclear weapons tests conducted near the Area 3 RWMS. The SA results estimated with the Area 3 RWMS version 2.102 model indicate that changes to the PA and CA do not

  7. Analysis of ISO NE Balancing Requirements: Uncertainty-based Secure Ranges for ISO New England Dynamic Inerchange Adjustments

    SciTech Connect (OSTI)

    Etingov, Pavel V.; Makarov, Yuri V.; Wu, Di; Hou, Zhangshuan; Sun, Yannan; Maslennikov, S.; Luo, X.; Zheng, T.; George, S.; Knowland, T.; Litvinov, E.; Weaver, S.; Sanchez, E.

    2013-01-31T23:59:59.000Z

    The document describes detailed uncertainty quantification (UQ) methodology developed by PNNL to estimate secure ranges of potential dynamic intra-hour interchange adjustments in the ISO-NE system and provides description of the dynamic interchange adjustment (DINA) tool developed under the same contract. The overall system ramping up and down capability, spinning reserve requirements, interchange schedules, load variations and uncertainties from various sources that are relevant to the ISO-NE system are incorporated into the methodology and the tool. The DINA tool has been tested by PNNL and ISO-NE staff engineers using ISO-NE data.

  8. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security's IT Security Procedures require that non-public University information, including social security numbers and professional information in a secure and appropriate manner. #12;

  9. Development of the SEA Corporation Powergrid{trademark} photovoltaic concentrator

    SciTech Connect (OSTI)

    Kaminar, N.; Curchod, D.; Daroczi, S.; Walpert, M.; Sahagian, J.; Pepper, J. [Photovoltaics International, LLC, Sunnyvale, CA (United States)

    1998-03-01T23:59:59.000Z

    This report covers the three phase effort to bring the SEA Corporation`s Powergrid{trademark} from the concept stage to pilot production. The three phases of this contract covered component development, prototype module development, and pilot line production. The Powergrid is a photovoltaic concentrator that generates direct current electricity directly from sunlight using a linear Fresnel lens. Analysis has shown that the Powergrid has the potential to be very low cost in volume production. Before the start of the project, only proof of concept demonstrations of the components had been completed. During the project, SEA Corporation developed a low cost extruded Fresnel lens, a low cost receiver assembly using one sun type cells, a low cost plastic module housing, a single axis tracking system and frame structure, and pilot production equipment and techniques. In addition, an 800 kW/yr pilot production rate was demonstrated and two 40 kW systems were manufactured and installed.

  10. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  11. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  12. Security Procedures Caltech Campus Security Dispatch

    E-Print Network [OSTI]

    Goddard III, William A.

    Security Procedures Caltech Campus Security Dispatch: 5000 (from any Caltech phone) or (626) 395-5000 (from any phone) When emergencies arise, contact Caltech Campus Security MEDICAL If someone experiences a medical emergency: · Remain calm · Notify Campus Security Dispatch · Do NOT move victim EARTHQUAKE When

  13. Security rules versus Security properties Mathieu Jaume

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Security rules versus Security properties Mathieu Jaume SPI ­ LIP6 ­ University Pierre & Marie components of security policies can be expressed, and we identify their role in the de- scription of a policy, of a system and of a secure system. In this setting, we formally describe two approaches to define policies

  14. Essays in Corporate Finance

    E-Print Network [OSTI]

    Syron, Erin Elizabeth

    2010-01-01T23:59:59.000Z

    ment,” The Journal of Finance, 42(2), 1097–1102. Dechow, P.Analysis,” Journal of Finance, 53(1), 27–64. Palmrose, Z. -Accounting, Auditing and Finance, Forthcoming. Beneish, M.

  15. Matching Gift Companies LEHIGH UNIVERSITY 1 3M Corporation

    E-Print Network [OSTI]

    Gilchrist, James F.

    Corporation Foundation The Eaton Charitable Fund Electroline Corporation Eli Lilly and Company FoundationMatching Gift Companies LEHIGH UNIVERSITY 1 3M Corporation Abbott Laboratories Accenture Foundation Technologies, Inc. Air Products Air Products Foundation Albemarle Corporation Alcoa Foundation Alliance Capital

  16. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Energy Savers [EERE]

    92: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System...

  17. Using Operational Security (OPSEC) to Support a Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

  18. V-186: Drupal Login Security Module Security Bypass and Denial...

    Office of Environmental Management (EM)

    186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability V-186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability June...

  19. Corporate Headquarters Tax Credit (West Virginia)

    Broader source: Energy.gov [DOE]

    The Corporate Headquarters Tax Credit is available to companies who relocate their corporate headquarters to West Virginia and create 15 new jobs. The credit can offset up to 100% of the tax...

  20. Corporate governance : the case for Asian REITs

    E-Print Network [OSTI]

    Tan, Denise, S.M. Massachusetts Institute of Technology

    2009-01-01T23:59:59.000Z

    At the entity level, the design of sound corporate governance mechanisms is critical for REITs that are preparing to go public. At the industry level, issues of transparency and corporate governance are consequential to ...

  1. The Market for Borrowing Corporate Bonds

    E-Print Network [OSTI]

    Asquith, Paul

    This paper describes the market for borrowing corporate bonds using a comprehensive data set from a major lender. The cost of borrowing corporate bonds is comparable to the cost of borrowing stock, between 10 and 20 basis ...

  2. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W. (Albuquerque, NM)

    1985-01-01T23:59:59.000Z

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  3. Sandia Energy - Installation Energy Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Installation Energy Security Home Stationary Power Grid Modernization Resilient Electric Infrastructures Military Installation Energy Security Installation Energy SecurityTara...

  4. Corporate Real Estate and Facilities Cost Reduction IBM Corporation | December 2, 2009 Page 1 of 7

    E-Print Network [OSTI]

    Corporate Real Estate and Facilities Cost Reduction © IBM Corporation | December 2, 2009 Page 1 of 7 - Internal distribution only Corporate Real Estate and Facilities Cost Reduction Summary By moving and facilities costs by 15-20%, whilst still improving services. Successful cost reduction in corporate real

  5. The CORAS Tool for Security Risk Analysis Fredrik Vraalsen, Folker den Braber, Mass Soldal Lund, and Ketil Stlen

    E-Print Network [OSTI]

    Stølen, Ketil

    integrates aspects from partly complementary risk analysis techniques, like HazOp [1], FMEA [2], and FTA [3

  6. Mastermind Session: Wisconsin Energy Conservation Corporation...

    Energy Savers [EERE]

    Corporation Better Buildings Neighborhood Program Peer Exchange Call: Program Sustainability Mastermind Session, featuring host Brian Driscoll, Wisconsin Energy Conservation...

  7. Analysis of operations and cyber security policies for a system of cooperating Flexible Alternating Current Transmission System (FACTS) devices.

    SciTech Connect (OSTI)

    Phillips, Laurence R.; Tejani, Bankim; Margulies, Jonathan; Hills, Jason L.; Richardson, Bryan T.; Baca, Micheal J.; Weiland, Laura

    2005-12-01T23:59:59.000Z

    Flexible Alternating Current Transmission Systems (FACTS) devices are installed on electric power transmission lines to stabilize and regulate power flow. Power lines protected by FACTS devices can increase power flow and better respond to contingencies. The University of Missouri Rolla (UMR) is currently working on a multi-year project to examine the potential use of multiple FACTS devices distributed over a large power system region in a cooperative arrangement in which the FACTS devices work together to optimize and stabilize the regional power system. The report describes operational and security challenges that need to be addressed to employ FACTS devices in this way and recommends references, processes, technologies, and policies to address these challenges.

  8. Essays on the Market for Corporate Control

    E-Print Network [OSTI]

    Kim, Hyunjung

    2011-02-22T23:59:59.000Z

    corporate governance play its role during this process? And why do managers often resist takeovers? The agency model this paper develops is compatible with existing theories on takeovers including neoclassical, inefficient stock market, and the free cash... .............................................................................................................. 72 IV CORPORATE GOVERNANCE DRIVEN TAKEOVERS ........................................... 82 1. The basic setting ................................................................................................. 82 2. Corporate...

  9. Internship opportunity with URS Corporation

    E-Print Network [OSTI]

    Internship opportunity with URS Corporation URS is the largest global engineering design firm of undergraduate studies to participate in an internship program with the School of Ocean & Earth Science & Technology (SOEST) at the University of Hawaii. The intent of the internship is two-fold: · To establish

  10. Hindawi Publishing Corporation Prostate Cancer

    E-Print Network [OSTI]

    Ahn, Hongshik

    Hindawi Publishing Corporation Prostate Cancer Volume 2011, Article ID 176164, 7 pages doi:10.1155/2011/176164 Clinical Study Effect of Zoledronic Acid on Bone Mineral Density in Men with Prostate Cancer Receiving cancer is well recognized. We assessed the effects of quarterly infusion of zoledronic acid on bone

  11. Security Perimeter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol HomeFacebook TwitterSearch-Comments Sign InNuclear SecurityUnder Budget

  12. Safety, Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Scienceand Requirements RecentlyElectronicResourcesjobsJuly throughR EMaterialsSafety, Security

  13. Computer Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMForms AboutRESEARCHHydrosilylationComputer Security All JLF

  14. INFRASTRUCTURE SECURITY & ENERGY

    E-Print Network [OSTI]

    Schrijver, Karel

    INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Delivery and Energy Reliability #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY Federal agencies to support waivers and specific response legal authorities #12;INFRASTRUCTURE SECURITY

  15. CAMPUS SECURITY CARD REQUISITION

    E-Print Network [OSTI]

    CAMPUS SECURITY CARD REQUISITION DEPARTMENT LAST NAME GIVEN NAME(S) SFU ID NUMBER CARD NUMBER CAMPUS SECURITY OFFICE USE ONLY SERVICE CHARGE: ___________________________ DEPOSIT be reported or returned to Campus Security TC 050 (291-5448). CARDHOLDER SIGNATURE DATE: #12;

  16. Designing security into software

    E-Print Network [OSTI]

    Zhang, Chang Tony

    2006-01-01T23:59:59.000Z

    When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

  17. Bondholders and Securities Class Actions

    E-Print Network [OSTI]

    Park, James

    2015-01-01T23:59:59.000Z

    et al. , Does Corporate Governance Matter to Bondholders? ,Private Lenders in Corporate Governance, 57 UCLA L. R EV .Vishny, A Survey of Corporate Governance, 52 J. F IN . 737,

  18. A brief history of Sandia's National security missions.

    SciTech Connect (OSTI)

    Drewien, Celeste A.; O'Canna, Myra Lynn; Stikar, John Anthony.

    2014-09-01T23:59:59.000Z

    To help members of the workforce understand what factors contribute to Sandia National Laboratories national security mission, the authors describe the evolution of Sandias core mission and its other mission components. The mission of Sandia first as a division of Los Alamos and later as Sandia Corporation underlies our core nuclear weapon mission of today. Sandias mission changed in 1963 and twice more in the 1970s. This report should help staff and management appreciate the need for mission evolution. A clear definition and communication of a consistent corporate mission statement is still needed.

  19. Cyber Security | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power Administration would likeConstitution4Customer-Comments Sign In About |Cyber SecurityCyber

  20. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25T23:59:59.000Z

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  1. Security & Privacy | EMSL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security & Privacy Security & Privacy Privacy Notice We collect no personal information about you without your knowledge when you visit this site, although you may choose to...

  2. Advancing Global Nuclear Security

    Broader source: Energy.gov [DOE]

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  3. Sandia Corporation (Albuquerque, NM)

    DOE Patents [OSTI]

    Ewsuk, Kevin G. (Albuquerque, NM); Arguello, Jr., Jose G. (Albuquerque, NM)

    2006-01-31T23:59:59.000Z

    A method of designing a primary geometry, such as for a forming die, to be used in a powder pressing application by using a combination of axisymmetric geometric shapes, transition radii, and transition spaces to simulate the geometry where the shapes can be selected from a predetermined list or menu of axisymmetric shapes and then developing a finite element mesh to represent the geometry. This mesh, along with material properties of the component to be designed and powder, is input to a standard deformation finite element code to evaluate the deformation characteristics of the component being designed. The user can develop the geometry interactively with a computer interface in minutes and execute a complete analysis of the deformation characteristics of the simulated component geometry.

  4. LANL Plutonium-Processing Facilities National Security

    E-Print Network [OSTI]

    55 (TA-55). TA-55 is the nation's most modern plu- tonium science and manufacturing facility, including world-class manufacturing capabilities for solving significant national security challenges and nondestructive analysis laboratories. Additionally, TA-55 can safely and securely ship, receive, handle

  5. BASF Corporate Energy Management Process

    E-Print Network [OSTI]

    Geiger, T.

    2014-01-01T23:59:59.000Z

    Process 2 2 ? Brief introduction to BASF ? BASF Corporate Energy Management ? Management Support ? Goals ? Continuous Improvement ? Knowledge Sharing ? Recognition ESL-IE-14-05-30 Proceedings of the Thrity-Sixth Industrial Energy Technology Conference... • 2013 Sales: €74 Billion • Employees: 112,000 Company overview BASF – The Chemical Company 3 ESL-IE-14-05-30 Proceedings of the Thrity-Sixth Industrial Energy Technology Conference New Orleans, LA. May 20-23, 2014 Structure of BASF’s segments...

  6. Singapore's Economic Balancing Act: How a Company's Collapse Challenged the Country's New Corporate Governance Regime

    E-Print Network [OSTI]

    Roseme, Sam

    2007-01-01T23:59:59.000Z

    THE COUNTRY'S NEW CORPORATE GOVERNANCE REGIME Sam RosemeON SINGAPORE'S CORPORATE GOVERNANCE REGIME . A.CORPORATE GOVERNANCE .. B. CHINA'S

  7. Security tasks are highly interdependent.

    E-Print Network [OSTI]

    Motivation Security tasks are highly interdependent. To improve security tools, we need to understand how security practitioners collaborate in their organizations. Security practitioners in context Exchange of Information Develop security tools that: · Integrate information from different communication

  8. Security Policies Dr. Ahmad Almulhem

    E-Print Network [OSTI]

    Almulhem, Ahmad

    Security Policies Dr. Ahmad Almulhem Computer Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 51 #12;Security Policies Types of Security Policies Trust Types of Access Control Summary Part I Overview Ahmad Almulhem - Network Security Engineering

  9. A Declarative Framework for Security: Secure Concurrent Constraint Programming

    E-Print Network [OSTI]

    Valencia, Frank D.

    Javeriana Cali {halopez,japerez,crueda}@cic.puj.edu.co 2 INRIA and LIX École Polytechnique catuscia in the analysis of security protocols and one promising approach is the development of formalisms that model and implementations for CCP have been developed: E.g., denotational models [SRP91], specification logics and proof

  10. Integrating Security and Real-Time Requirements Using Covert

    E-Print Network [OSTI]

    Son, Sang H.

    ÐConcurrency control, covert channel analysis, database systems, locking protocols, multilevel security, real secure database systems use an access control mechanism based on the Bell- LaPadula model [3]. This model. Multilevel security requirements introduce a new dimension to transaction processing in real-time database

  11. Towards OLAP Security Design Survey and Research Issues

    E-Print Network [OSTI]

    Song, Il-Yeol

    as an open system. Especially exploratory OLAP analysis requires this open nature; security controls may hinder the analytical discovery process. Keywords Data warehouse, OLAP, security, access control, design on the technical issues laying an accent on authorization and access control. We explore these security issues

  12. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22T23:59:59.000Z

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  13. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16T23:59:59.000Z

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  14. Office of Security Assistance

    Broader source: Energy.gov [DOE]

    The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

  15. Cyber Security

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Strategic Programs Division IM-52 George Dudley Director Associate CIO for IT Policy & Governance (IM-20) LeAnn Oliver Porfolio & Analysis Division (IM-21) Robin Crisp Director...

  16. Cyber Security

    Energy Savers [EERE]

    Programs Division IM-52 Al Gallo (Acting) Director Associate CIO for IT Policy & Governance (IM-20) LeAnn Oliver Porfolio & Analysis Division (IM-21) Robin Crisp Director...

  17. Of Enterprise Principles & Corporate Groups: Does Corporate Law Reach Human Rights?

    E-Print Network [OSTI]

    Harper Ho, Virginia E.

    2013-03-01T23:59:59.000Z

    conduct by remote affiliates and business partners of vast multinational corporate organizations. Corporate law, in contrast, governs the "internal affairs" of discrete legal entities within a given jurisdiction, each protected by a limited liability...

  18. U.S. Patent Pending, Information Security Analysis Using Game Theory and Simulation, U.S. Patent Application No.: 14/097,840

    SciTech Connect (OSTI)

    Abercrombie, Robert K [ORNL] [ORNL; Schlicher, Bob G [ORNL] [ORNL

    2013-01-01T23:59:59.000Z

    Vulnerability in security of an information system is quantitatively predicted. The information system may receive malicious actions against its security and may receive corrective actions for restoring the security. A game oriented agent based model is constructed in a simulator application. The game ABM model represents security activity in the information system. The game ABM model has two opposing participants including an attacker and a defender, probabilistic game rules and allowable game states. A specified number of simulations are run and a probabilistic number of the plurality of allowable game states are reached in each simulation run. The probability of reaching a specified game state is unknown prior to running each simulation. Data generated during the game states is collected to determine a probability of one or more aspects of security in the information system.

  19. The Data and Application Security and Privacy (DASPY) Challenge

    E-Print Network [OSTI]

    Sandhu, Ravi

    Computer security Information security = Computer security + Communications security Information Computer security Information security = Computer security + Communications security Information Cyber security (defensive) goals have evolved Computer security Information security = Computer

  20. MasteringWeb Services Security MasteringWeb Services Security

    E-Print Network [OSTI]

    Preview of MasteringWeb Services Security Preview of MasteringWeb Services Security Konstantin introduction Highlights of the book Web Services security problem XML Security WS-Security Security mechanisms for ASP.NET Web Services Planning and building secure Web Service systems ­ Architectural and policy

  1. North American Electric Reliability Corporation (NERC): Reliability...

    Office of Environmental Management (EM)

    (NERC): Reliability Considerations from the Integration of Smart Grid North American Electric Reliability Corporation (NERC): Reliability Considerations from the Integration of...

  2. Panasonic Corporation Energy Company formerly Matsushita Battery...

    Open Energy Info (EERE)

    to: navigation, search Name: Panasonic Corporation Energy Company (formerly Matsushita Battery Industrial Co) Place: Moriguchi, Osaka, Japan Zip: 570-8511 Product: Producer of...

  3. Duro Corporation: Proposed Penalty (2014-CE-23009)

    Broader source: Energy.gov [DOE]

    DOE alleged in a Notice of Proposed Civil Penalty that Duro Corporation failed to certify cooking products as compliant with the applicable energy conservation standards.

  4. Resources, real options, and corporate strategy

    E-Print Network [OSTI]

    Bernardo, Antonio; Chowdhry, Bhagwan

    1998-01-01T23:59:59.000Z

    211–234 Resources, real options, and corporate strategy $D83; G30; G31 Keywords: Real options; Valuation; Corporateparticipants at the Real Options Conference at Northwestern

  5. PRELIMINARY SURVEY OF WESTINGHOUSE ELECTRIC CORPORATION EAST...

    Office of Legacy Management (LM)

    OAK RIDGE NATIONAL LABORATORY operated by UNION CARBIDE CORPORATION for the DEPARTMENT OF ENERGY as part of the Formerly Utilized Sites-- Remedial Action Program WESTINGHOUSE...

  6. Gibson Electric Membership Corporation- Energy Efficiency Rebates

    Broader source: Energy.gov [DOE]

    Gibson Electric Membership Corporation, in collaboration with the Tennessee Valley Authority, promotes energy efficient building design through its [http://www.energyright.com/ ''energy right'']...

  7. Corporate Plan Page 1Forestry Commission England Corporate Plan 2011-15

    E-Print Network [OSTI]

    Corporate Plan 2011-15 Page 1Forestry Commission England Corporate Plan 2011-15 Welcome This is the Corporate Plan for the Forestry Commission in England. It is one of a suite of plans including those for Forestry Commission (GB) and Forest Research. This document has been optimised for on-screen reading

  8. Information GRID in the Corporate World Information GRID in the Corporate World

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Information GRID in the Corporate World Information GRID in the Corporate World .Bogonikolos Zeus Ontology Grid) project, an EU project funded under the Information Society Technologies programme and EAI Tools is discussed. The COG (Corporate Ontology Grid) project addresses the problem of accessing

  9. Dominance of a corporate institutional elite: the extended power of energy

    SciTech Connect (OSTI)

    Purdy, D.A.

    1983-01-01T23:59:59.000Z

    The objective of this study was to outline the patterns whereby large corporations may exert extensive influence over various aspects of socio-political-economic life. By focusing on the largest sector of the economy, energy corporation - and one on which all other sectors are at least partially dependent - the structure through which this corporate influence can be exercised is examined. Results demonstrate the extreme dominance of the entire energy field by the 20 largest petroleum corporations and intrusion of the petroleum industry's vast number of tenacles into all other sectors of the economy. In addition, the excessive number of interconnections between the largest petroleum corporations provide an extensive communication network among so-called competitors. Two major conclusions reached from this analysis were: (1) that within the fragile technostructure of modern America, the energy industry has reached approximate parity with the banking industry concerning its importance to society; and (2) that America during the latter half of the twentieth century has undergone a transition from social rule by a wealthy, social elite class to that of a corporate elite class through their interconnected roles on behalf of the mammoth corporations.

  10. Carbona Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to:EzfeedflagBiomassSustainableCSL GasPermitsGreen BioEnergy LLC JumpCarbona Corporation Jump to:

  11. JYT Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual Siteof Energy 2,AUDIT REPORTEnergyFarmsPower Co LtdTN LLC Jump to:PtyJYT Corporation Jump

  12. Kirmart Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual Siteof Energy 2,AUDIT REPORTEnergyFarmsPower Co LtdTN LLCKirmart Corporation Jump to:

  13. Vairex Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to:Ezfeedflag JumpID-fTri Global EnergyUtility Rate Home >Vairex Corporation Jump to:

  14. AES Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to:Ezfeedflag JumpID-fTriWildcat 1 WindtheEnergySulfonate asAEE Solar Jump to:AES Corporation

  15. Powerex Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual SiteofEvaluatingGroupPerfectenergyInformation toPower and ElectricityPowerex Corporation

  16. ISE Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to: navigation, search OpenEIHesperia,IDGWP Wind Farm Jump to:ILab IncubatorISE Corporation Jump

  17. Pemery Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I Geothermal Pwer PlantMunhall,Missouri:EnergyOssian,Parle BiscuitsPemery Corporation Jump to: navigation,

  18. Emcore Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand JumpConceptual Model,DOEHazel Crest,Energy Information ElkhornElwood,Emcore Corporation Jump to:

  19. Epco Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand JumpConceptual Model,DOEHazel Crest,EnergySerranopolisEnviroMission LtdEnvisolar JumpEpco Corporation

  20. Sinosteel Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualProperty Edit with form HistoryRistmaSinosteel Corporation Jump to: navigation, search Name:

  1. Sojitz Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualProperty Edit with form HistoryRistmaSinosteel CorporationSocovoltaic SystemsSoitec SA

  2. corporate | netl.doe.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron4 Self-Scrubbing:,, , ., ..., ,+ . :,2013constantconvertCorporate

  3. Ryokuseisha Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro Industries Pvt Ltd Jump to:Roscommon County,Vermont:Kentucky:Wisconsin:Ryokuseisha Corporation

  4. EXAR Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualPropertyd8c-a9ae-f8521cbb8489 No revision| Open Jump to:(RES-AEI) | OpenEUHYFISEXAR Corporation

  5. Fact #870: April 27, 2015 Corporate Average Fuel Economy Progress...

    Office of Environmental Management (EM)

    Fact 870: April 27, 2015 Corporate Average Fuel Economy Progress, 1978-2014 Fact 870: April 27, 2015 Corporate Average Fuel Economy Progress, 1978-2014 The Corporate Average Fuel...

  6. Law, Politics and Markets of Corporate Governance: Institutional Investors' Influence

    E-Print Network [OSTI]

    Carniglia, Stephen Davis

    2013-01-01T23:59:59.000Z

    S. , “The State of Corporate Governance Research,” 23 R.What Matters in Corporate Governance? ,” 22 R. Fin. StudiesLegitimacy and Corporate Governance,” 32 Del. J. Corp. L.

  7. Measuring Efficiency in Corporate Law: The Role of Shareholder Primacy

    E-Print Network [OSTI]

    Fisch, Jill

    2004-01-01T23:59:59.000Z

    17 Empirical studies of corporate governance reforms such asDirectors as a Corporate Governance Mechanism: Theories andMeans and Ends of Corporate Governance, 97 N W .U. L. R EV .

  8. Preliminary Notice of Violation, Safety and Ecology Corporation...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Safety and Ecology Corporation - EA-2005-03 Preliminary Notice of Violation, Safety and Ecology Corporation - EA-2005-03 June 14, 2005 Issued to Safety and Ecology Corporation...

  9. Sandia Energy - Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessment Home Climate & Earth Systems WaterEnergy Nexus Water Monitoring & Treatment Technology Security Risk Assessment Security Risk Assessmentcwdd2015-05-04T21:...

  10. Sandia National Laboratories: Climate Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    MonitoringClimate Security Climate Security Climate Security Global reductions in greenhouse gases will eventually be motivated by an international climate treaty and will entail...

  11. Corporate Training On-Site Online Global

    E-Print Network [OSTI]

    Barrett, Jeffrey A.

    MAKE THE RIGHT MOVE Corporate Training On-Site · Online · Global IMPROVE YOUR COMPETITIVE ADVANTAGE WITH WORLD-CLASS ON-SITE AND ONLINE SOLUTIONS TAILORED TO MEET YOUR BUSINESS AND EMPLOYEE TRAINING NEEDS a competitive advantage depends on how well your staff executes. UCIrvineExtension's Corporate Training helps

  12. QUESTIONING THE RELEVANCE OF CORPORATE SOCIAL PERFORMANCE

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    on the limits of the concept of Corporate Social Performance (CSP) and its instrumentation in the form on Corporate Social Performance (CSP) and its instrumentation in the form of models for measuring form, the BSC reduces its search for balance to three essential Stakeholders: employees, customers

  13. Is Sustainability Attractive for Corporate Real Estate

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Is Sustainability Attractive for Corporate Real Estate Decisions ? Research Center ESSEC Working Is Sustainability Attractive for Corporate Real Estate Decisions? Ingrid Nappi-Choulet Professor ESSEC BUSINESS SCHOOL Real Estate and Sustainable Development Chair nappi@essec.fr Aurélien Décamps Researcher ESSEC

  14. Corporate Political Donations: Investment or Agency?

    E-Print Network [OSTI]

    Aggarwal, Rajesh K.; Meschke, Felix; Wang, Tracy Yue

    2012-04-01T23:59:59.000Z

    are negatively correlated with returns. A $10,000 increase in donations is associated with a reduction in annual excess returns of 7.4 basis points. Worse corporate governance is associated with larger donations. Even after controlling for corporate governance...

  15. 2011 IBM Corporation Computer system energy management

    E-Print Network [OSTI]

    Shi, Weisong

    level EnergyScale Microcontroller IBM Systems Director · Policy management · Power & performance© 2011 IBM Corporation Computer system energy management Charles Lefurgy 28 July 2011 #12;© 2011 IBM Corporation2 Outline A short history of server power management POWER7 EnergyScale AMESTER power

  16. Corporate Venture Capital (CVC) Seeking Innovation and

    E-Print Network [OSTI]

    , Technology Innovation Program, National Institute of Standards and Technology #12;Corporate Venture Capital, Deputy Director Technology Innovation Program Marc G. Stanley, Director #12;ii Acknowledgments T his policymakers in the role of corporate venture capital (CVC) in technology innovation. The research included

  17. Analysis of the optical coupling of wavelength-shifting fibers to organic liquid scintillator filled fluoropolymer tubes for industrial and nuclear security applications

    E-Print Network [OSTI]

    Schools, Chad C

    2014-01-01T23:59:59.000Z

    Industrial and nuclear security applications continue to push radiation detection development into new and exciting frontiers. In this work, an innovative detection module is developed and tested for use in a cosmic ray ...

  18. Sandia National Laboratories: ECIS-Automotive Fuel Cell Corporation...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ClimateECAbout ECFacilitiesCRFECIS-Automotive Fuel Cell Corporation: Hydrocarbon Membrane Fuels the Success of Future Generation Vehicles ECIS-Automotive Fuel Cell Corporation:...

  19. Comments of New England Electric Transmission Corporation on...

    Broader source: Energy.gov (indexed) [DOE]

    out of time and comments of New England Electric Transmission Corporation, New England Hydro-Transmission Electric Company, Inc. and New England Hydro-Transmission Corporation and...

  20. EA-1727: AE Polysilicon Corporation Polysilicon Production Facility...

    Office of Environmental Management (EM)

    7: AE Polysilicon Corporation Polysilicon Production Facility in Fairless Hills, PA EA-1727: AE Polysilicon Corporation Polysilicon Production Facility in Fairless Hills, PA...

  1. New York State Electric & Gas Corporation Smart Grid Demonstration...

    Open Energy Info (EERE)

    Electric & Gas Corporation Smart Grid Demonstration Project Jump to: navigation, search Project Lead New York State Electric & Gas Corporation Country United States Headquarters...

  2. IT Capital Planning Corporate Management Improvement Program (CMIP)

    Broader source: Energy.gov [DOE]

    The Corporate Management Improvement Program (CMIP) was initiated by the Department in recognition of the fact that corporate legacy systems that support administrative functions were nearing the...

  3. Trony Solar Corporation formerly Shenzhen Trony Science Technology...

    Open Energy Info (EERE)

    Trony Solar Corporation formerly Shenzhen Trony Science Technology Development Co Ltd Jump to: navigation, search Name: Trony Solar Corporation (formerly Shenzhen Trony Science &...

  4. EA-1631: Beacon Power Corporation Frequency Regulation Facility...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Beacon Power Corporation Frequency Regulation Facility in Stephentown, NY EA-1631: Beacon Power Corporation Frequency Regulation Facility in Stephentown, NY February 2, 2009...

  5. Shenyang Huachuang Wind Energy Corporation HCWE aka China Creative...

    Open Energy Info (EERE)

    Shenyang Huachuang Wind Energy Corporation HCWE aka China Creative Wind Energy Co Ltd Jump to: navigation, search Name: Shenyang Huachuang Wind Energy Corporation (HCWE) (aka China...

  6. Testimonials - Partnerships in R&D - Capstone Turbine Corporation...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    R&D - Capstone Turbine Corporation Testimonials - Partnerships in R&D - Capstone Turbine Corporation Addthis Text Version The words Office of Energy Efficiency and Renewable Energy...

  7. SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS

    E-Print Network [OSTI]

    SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology The selection and implementation of security controls are critical decisions for protecting

  8. Campus Security Report 1 Campus seCurity

    E-Print Network [OSTI]

    Wilmers, Chris

    Campus Security Report 1 Campus seCurity and Fire saFety report UC Santa Cruz 2010 #12;Campus Security Report 2 UC Santa Cruz Geography ........................................................ 8 Security and Access to Campus Buildings and Grounds ........................................ 8

  9. Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES

    E-Print Network [OSTI]

    Newby, Gregory B.

    Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES Gregory B. Newby School an active role in information security. INTRODUCTION By most accounts, the proliferation of the Internet of information security, making concrete recommendations for safeguarding information and information access

  10. Temperature measurement in the Intel Efraim Rotem Mobile Platform Group, Intel corporation

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    , Intel corporation Jim Hermerding ­ Mobile platform Group, Intel corporation Cohen Aviad - Microprocessor

  11. Special Analysis for the Disposal of the Neutron Products Incorporated Sealed Source Waste Stream at the Area 5 Radioactive Waste Management Site, Nevada National Security Site, Nye County, Nevada

    SciTech Connect (OSTI)

    Shott, Gregory

    2014-08-31T23:59:59.000Z

    The purpose of this special analysis (SA) is to determine if the Neutron Products Incorporated (NPI) Sealed Sources waste stream (DRTK000000056, Revision 0) is suitable for disposal by shallow land burial (SLB) at the Area 5 Radioactive Waste Management Site (RWMS). The NPI Sealed Sources waste stream consists of 850 60Co sealed sources (Duratek [DRTK] 2013). The NPI Sealed Sources waste stream requires a special analysis (SA) because the waste stream 60Co activity concentration exceeds the Nevada National Security Site (NNSS) Waste Acceptance Criteria (WAC) Action Levels.

  12. Performance Assessment and Recommendations for Rejuvenation of a Permeable Reactive Barrier: Cotter Corporation’s Cañon City, Colorado, Uranium Mill

    Broader source: Energy.gov [DOE]

    Performance Assessment and Recommendations for Rejuvenation of a Permeable Reactive Barrier: Cotter Corporation’s Canon City, Colorado, Uranium Mill (April 2005)

  13. ANNUAL SECURITY FIRE SAFETY REPORT

    E-Print Network [OSTI]

    ANNUAL SECURITY AND FIRE SAFETY REPORT OCTOBER 1, 2013 DARTMOUTH COLLEGE http://www.dartmouth.edu/~security/ #12;1 Table of Contents MESSAGE FROM THE DIRECTOR OF SAFETY AND SECURITY................................................................................................................................................................... 7 ANNUAL SECURITY REPORT

  14. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01T23:59:59.000Z

    of climate change, energy security and economic stability.DoD is improving U.S. energy security and national security.www.greenpacks.org • Energy Security & Climate Change:

  15. UNIVERSITY OF OKLAHOMA BOND ISSUE TAX CODE AND SECURITIES LAW COMPLIANCE

    E-Print Network [OSTI]

    Oklahoma, University of

    -1- UNIVERSITY OF OKLAHOMA BOND ISSUE TAX CODE AND SECURITIES LAW COMPLIANCE POLICY I. GENERAL The University of Oklahoma, a body corporate and politic, and instrumentality of the State of Oklahoma ("University of Oklahoma") duly created and existing pursuant to [Title 73 O.S. §§151 et seq., / Title 60

  16. UNIVERSITY OF OKLAHOMA BOND ISSUE TAX CODE AND SECURITIES LAW COMPLIANCE

    E-Print Network [OSTI]

    Oklahoma, University of

    UNIVERSITY OF OKLAHOMA BOND ISSUE TAX CODE AND SECURITIES LAW COMPLIANCE POLICY I. GENERAL The University of Oklahoma, a body corporate and politic, and instrumentality of the State of Oklahoma ("University of Oklahoma") duly created and existing pursuant to [Title 73 O.S. §§151 et seq., / Title 60

  17. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  18. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    for process that controls interactions between users and resources. · Access control system implements Information Security Group Agenda · Access control basics · ACLs and capabilities · Information flow policies· Information flow policies · Bell-LaPadula Model · Role-Based Access Control · Resources 3 Information Security

  19. Security system signal supervision

    SciTech Connect (OSTI)

    Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

    1991-09-01T23:59:59.000Z

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  20. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12T23:59:59.000Z

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  1. SECURITY AND FIRE SAFETY

    E-Print Network [OSTI]

    Barrash, Warren

    ANNUAL SECURITY AND FIRE SAFETY REPORT 2014 #12;2 Boise State University 2014 Annual Security and Fire Safety Report From the Vice President for Campus Operations and General Counsel At Boise State University, we are committed to providing a safe and secure environment for students, staff

  2. UNIVERSITY POLICE ANNUAL SECURITY

    E-Print Network [OSTI]

    Kulp, Mark

    UNIVERSITY POLICE 2013 ANNUAL SECURITY AND FIRE SAFETY GUIDE In compliance with the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act The University of New Orleans. Please take a moment to read the following information. #12;ANNUAL SECURITY AND FIRE SAFETY GUIDE 2013

  3. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1846P CustomTraining Sandia providesPRAsandhowtheycanbemanaged to increase levels of safety and security. Like othertrainings,Sandiaexpertsdesigncoursesto beasbroadorin

  4. Secure Core Contact Information

    E-Print Network [OSTI]

    Secure Core Contact Information C. E. Irvine irvine@nps.edu 831-656-2461 Department of Computer for the secure management of local and/or remote information in multiple contexts. The SecureCore project Science Graduate School of Operations and Information Sciences www.cisr.nps.edu Project Description

  5. Information Security Guide

    E-Print Network [OSTI]

    Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

  6. international security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved:AdministrationAnalysisDarby Dietrich5

  7. physical security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved:AdministrationAnalysisDarby Dietrich57/%2A0/%2A en NNSA4/%2A en5/%2A

  8. analysis risk models: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of the analysis Paris-Sud XI, Universit de 6 IT Security Risk Analysis based on Business Process Models enhanced with Security Requirements Computer Technologies and...

  9. EMERGENCY RESPONSE FOR HOMELAND SECURITY: LESSONS LEARNED AND THE

    E-Print Network [OSTI]

    Wang, Hai

    EMERGENCY RESPONSE FOR HOMELAND SECURITY: LESSONS LEARNED AND THE NEED FOR ANALYSIS Larson, R;Emergency Response for Homeland Security: Lessons Learned and the Need for Analysis By Richard C. Larson. In this section, we are particularly concerned with `lessons learned' and with recurring decisions that must

  10. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05T23:59:59.000Z

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  11. Daiwa House Industry Co., Ltd. Asahi Kasei Amidas Corporation Sompo Japan Insurance Inc. Nihon Shokken Holdings Co., Ltd. Sysmex Corporation NS Solutions Corporation Fujitsu Research Institute Rakuten Inc. Nomura Research Institute, Ltd. Toray Industries,

    E-Print Network [OSTI]

    Banbara, Mutsunori

    Daiwa House Industry Co., Ltd. Asahi Kasei Amidas Corporation Sompo Japan Insurance Inc. Nihon Shokken Holdings Co., Ltd. Sysmex Corporation NS Solutions Corporation Fujitsu Research Institute Corporation Kawasaki Heavy Industries, Ltd. All Nippon Airways Co., Ltd. Lotteria Co., Ltd. Kao

  12. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W. [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2014-10-15T23:59:59.000Z

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  13. A new secure process for steganography: CI2 Stego-security and topological-security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    A new secure process for steganography: CI2 Stego-security and topological-security Nicolas Friot1- formation hiding security fields. We show that the proposed scheme is stego-secure, which is the highest level of security in a well defined and studied category of attack called "watermark-only attack

  14. Secure sequential transmission of quantum information

    E-Print Network [OSTI]

    Kabgyun Jeong; Jaewan Kim

    2015-01-19T23:59:59.000Z

    We propose a quantum communication protocol that can be used to transmit any quantum state, one party to another via several intermediate nodes, securely on quantum communication network. The scheme makes use of the sequentially chained and approximate version of private quantum channels satisfying certain commutation relation of $n$-qubit Pauli operations. In this paper, we study the sequential structure, security analysis, and efficiency of the quantum sequential transmission (QST) protocol in depth.

  15. Essays on consumption cycles and corporate finance

    E-Print Network [OSTI]

    Issler, Paulo Floriano

    2013-01-01T23:59:59.000Z

    In: The Journal of Finance 41.1, pp. 19–37. Flannery, Markand practice of corporate finance: evidence from the field”.Issues”. In: Journal of Finance 51.5, pp. 1809–33. Hamilton,

  16. 3M's Corporate Approach to Energy Management

    E-Print Network [OSTI]

    Schultz, S. C.; Bingham, P. R.

    number of companies have recognized the benefits of developing structured approaches to improving their energy efficiency through means that are also compatible with being environmentally responsible. 3M has long been recognized as a corporate...

  17. Law as Economy: Convention, Corporation, Currency

    E-Print Network [OSTI]

    Barrett, Jeffrey A.

    1015 Law as Economy: Convention, Corporation, Currency Ritu Birla* I. Law as Economy: Nomos. Law Inside/Outside Economy of an orthodox faith in economy as universal law, that is, in the free market as the law of the universe

  18. Refundable Clean Heating Fuel Tax Credit (Corporate)

    Broader source: Energy.gov [DOE]

    The state of New York began offering a corporate income tax credit for biodiesel purchases used for residential space heating and water heating beginning in 2006. The original credit was authorized...

  19. Alternative Energy Development Incentive (Corporate) (Utah)

    Broader source: Energy.gov [DOE]

    The Alternative Energy Development Incentive (AEDI) is a post-performance non-refundable tax credit for 75% of new state tax revenues (including, state, corporate, sales and withholding taxes) over...

  20. Selecting Financing Strategies to Overcome Corporate Barriers

    E-Print Network [OSTI]

    Michaelson, M. L.

    1984-01-01T23:59:59.000Z

    , or longer than the list of presentations at this year's Industrial Energy Conservation Conference. This paper will focus on two of the many potential answers. First, the corporate decision making process in industrial firms presents many obstacles to a final...

  1. Managing preventative maintenance activities at Intel Corporation

    E-Print Network [OSTI]

    Fearing, Rebecca Cassler

    2006-01-01T23:59:59.000Z

    The work for this thesis was completed at Intel Corporation in Colorado Springs, Colorado at Fab 23, a semiconductor fabrication facility making flash memory. The project focused on evaluating and managing preventative ...

  2. Renewable Energy Production Tax Credit (Corporate)

    Broader source: Energy.gov [DOE]

    Enacted in 2002, the New Mexico Renewable Energy Production Tax Credit provides a tax credit against the corporate income tax of one cent per kilowatt-hour for companies that generate electricity...

  3. IBM Software Group Copyright IBM Corporation 2007

    E-Print Network [OSTI]

    · Componentization of existing code · Assembler programs repackaged as reusable objects · Breaks monolithic code base © Copyright IBM Corporation 2007Page 4 z/TPF fits into your Services Centric Plug and Play Strategy Transport

  4. Information SecurityInformation Security--Applications andApplications and

    E-Print Network [OSTI]

    Ahmed, Farid

    Information SecurityInformation Security-- Applications andApplications and Techniques about? InformationInformation SecuritySecurity Information SecurityInformation Security What?What? Why of Information SecuritySecurity Network SecurityNetwork Security PGP, SSL,PGP, SSL, IPsecIPsec Data Security

  5. Energy Conservation in China North Industries Corporation

    E-Print Network [OSTI]

    You, W. T.; De, C. H.; Chu, J. X.; Fu, L. R.

    . In some plants which have stable steam consumption we have established small scale power and steam cogeneration. This has improved boilers' efficiencies and utilization of energy. For further reduction oil firing, we have been studying on alternative... ENERGY CONSERVATION IN CHINA NORTH INDUSTRIES CORPORATION Wang Tian You, Chen Hua De, Jing Xing Chu, Ling Rui Fu, China North Industries Corporation Beijing, People's Republic of China ABSTRACT This paper describes an overview of the energy...

  6. Securing Internet Routing Securing Internet Routing

    E-Print Network [OSTI]

    Goldberg, Sharon

    Plane (Routing protocols): S h b d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc · Set up paths between nodes [Kent Lynn Seo 00] Listen-Whisper, etc., Data Plane: · Given d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc · Set up paths

  7. Investor Sentiment and Antitrust Law as Determinants of Corporate Ownership Structure: The great Merger Wave of 1897 to 1903

    E-Print Network [OSTI]

    Cheffins, Brian R.

    2002-01-01T23:59:59.000Z

    for Corporate Control: Corporate Governance and EconomicCurrent Trends in Corporate Governance: Going From London toon international corporate governance. This paper retrieves

  8. Investor Sentiment and Antitrust Law as Determinants of Corporate Ownership Structure: The Great Merger Wave of 1897 to 1903

    E-Print Network [OSTI]

    Cheffins, Brian

    2002-01-01T23:59:59.000Z

    for Corporate Control: Corporate Governance and EconomicCurrent Trends in Corporate Governance: Going From London toon international corporate governance. This paper retrieves

  9. Corporate Investment Decisions Finance 549

    E-Print Network [OSTI]

    Carter, John

    for adjusting for risk, the application of Monte Carlo analysis to assess risk, the effect of capital in a short write-up accompanying your quantitative analysis for the four cases assigned, you are required size 12, one inch margins all around) accompanied by your quantitative analysis. It is highly suggested

  10. SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2013)

    E-Print Network [OSTI]

    2013-01-01T23:59:59.000Z

    SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2013) Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/sec.819 SPECIAL ISSUE PAPER Integrating security mechanisms, must be protected against security threats. Due to the security and also resource constraint concerns

  11. Information Security Governance: When Compliance Becomes more Important than Security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Information Security Governance: When Compliance Becomes more Important than Security Terence Tan1 information security must adapt to changing conditions by extending security governance to middle management for implementing information security are more interested in complying with organizational standards and policies

  12. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security.cuny.edu Published: November 2014 Holiday Season Phishing Scams and Malware Campaigns CUNY/CIS Information Security.cuny.edu under "CUNY Issued Security Advisories" Visit the Federal Trade Commission's Consumer Information page

  13. INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY

    E-Print Network [OSTI]

    Subramanian, Sriram

    - 1 ­ INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable ­ INFORMATION SECURITY POLICY.doc Introduction Why Information Security? The access, availability

  14. Grid Information Security Functional Requirement - Fulfilling Information Security of a Smart Grid System

    E-Print Network [OSTI]

    Ling, Amy Poh Ai; 10.5121/ijgca.2011.2201

    2011-01-01T23:59:59.000Z

    This paper describes the background of smart information infrastructure and the needs for smart grid information security. It introduces the conceptual analysis to the methodology with the application of hermeneutic circle and information security functional requirement identification. Information security for the grid market cover matters includes automation and communications industry that affects the operation of electric power systems and the functioning of the utilities that manage them and its awareness of this information infrastructure has become critical to the reliability of the power system. Community benefits from of cost savings, flexibility and deployment along with the establishment of wireless communications. However, concern revolves around the security protections for easily accessible devices such as the smart meter and the related communications hardware. On the other hand, the changing points between traditional versus smart grid networking trend and the information security importance on...

  15. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01T23:59:59.000Z

    Information and communication systems’ securityTrust: An Element of Information Security,” in Security andInternational Journal of Information Security, vol. 4, pp.

  16. FY 2013 Performance Evaluation Report Sandia Corporation, Contract DE-AC04-94AL85000

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved:Administration Sandia CorporationNuclear Security

  17. Page 1Forestry Commission England Corporate Plan 2012-13 Corporate Plan

    E-Print Network [OSTI]

    Page 1Forestry Commission England Corporate Plan 2012-13 Corporate Plan 2012-13 #12;Page 2Forestry the environment and supporting a strong green economy, and the Forestry Commission is well placed to contribute toward this. The recent report from the Forestry Regulation Task Force highlighted the need to make

  18. Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop

    SciTech Connect (OSTI)

    Sheldon, Frederick T [ORNL; Krings, Axel [ORNL; Yoo, Seong-Moo [ORNL; Mili, Ali [ORNL; Trien, Joseph P [ORNL

    2006-01-01T23:59:59.000Z

    The workshop theme is Cyber Security: Beyond the Maginot Line Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglected or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyberspace including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more . . .

  19. Australian Efforts to Promote Corporate Social Responsibility: Can Disclosure Alone Suffice?

    E-Print Network [OSTI]

    von Nessen, Paul

    2009-01-01T23:59:59.000Z

    they comply with the ASX Corporate Governance Principles andAUSTRALIAN EFFORTS Corporate Governance Principles, isand Gary O'Donovan, Corporate Governance and Environmental

  20. Comparative Corporate Governance: Findings from a Workshop, March 14-15, 2008

    E-Print Network [OSTI]

    Huberty, Mark; Newsome, Akasemi; Street, Alex; Ziegler, J. Nicholas

    2008-01-01T23:59:59.000Z

    of Chicago, ‘‘Corporate Governance: History withoutComparative Corporate Governance Findings from a Workshopon Comparative Corporate Governance, March 14-15, 2008

  1. The Maximands of Corporate Governance: A Theory of Values and Cognitive Style

    E-Print Network [OSTI]

    Licht, Amir

    2004-01-01T23:59:59.000Z

    roots of American corporate governance. See Mark J. Roe, Aover the maximands of corporate governance. 4 My goal ison the maximands of corporate governance, that identifies

  2. Firm Value and Corporate Governance: How the Former Determines the Latter

    E-Print Network [OSTI]

    Hermalin, Benjamin E.

    2008-01-01T23:59:59.000Z

    The Econometrics of Corporate Governance Studies, Cambridge,Firm Value and Corporate Governance: How the FormerAbstract A model of corporate governance must explain (i)

  3. Changes in Japanese Corporate Law and Governance: Revisiting the Convergence Debate

    E-Print Network [OSTI]

    Shishido, Zenichi

    2004-01-01T23:59:59.000Z

    of Path Dependence in Corporate Governance and Ownership.Convergence in Corporate Governance and Its Implicatins.2001). Globalizing Corporate Governance: Convergence of Form

  4. Imitate or Differentiate? Evaluating the validity of corporate social responsibility ratings

    E-Print Network [OSTI]

    Chatterji, Aaron K; Levine, David I. I.

    2008-01-01T23:59:59.000Z

    and A. Metrick “Corporate Governance and Equity Prices. ”investors on corporate governance and social http://it focuses directly on corporate governance and is much more

  5. Corporate Governance from a Comparative Perspective: Specific Applications of the Duty of Loyalty in Korea

    E-Print Network [OSTI]

    Kwon, Jae Yeol

    2004-01-01T23:59:59.000Z

    transaction. Kon S. Kim, Corporate Governance in Korea, 8 J.ARTICLES CORPORATE GOVERNANCE FROM A COMPARATIVEof Care Standard in Corporate Governance, 75 IOWA L. REV. 1,

  6. The Role of Boards of Directors in Corporate Governance: A Conceptual Framework & Survey

    E-Print Network [OSTI]

    Adams, Renee; Hermalin, Benjamin E.; Weisbach, Michael S.

    2008-01-01T23:59:59.000Z

    Era of Heightened Corporate Governance,” New York UniversityThe Emergence of Corporate Governance from Wall St. to MainAnna, ed. , Corporate Governance and Firm Organization,

  7. Enhance your Cyber Security Knowledge

    E-Print Network [OSTI]

    Enhance your Cyber Security Knowledge About NPS CS FUNDAMENTALS: Create a strong foundational by increasing the effectiveness of the armed forces of the United States and its allies. Cyber Security-4015 About CISR #12;Cyber Security Adversarial Techniques Cyber Security Defense Cyber Security Fundamentals

  8. Annual Security Report October 2013

    E-Print Network [OSTI]

    Goddard III, William A.

    1 Annual Security Report October 2013 Mission Statement The Campus Security and Parking Services Department ("Security") exists to provide a secure and welcoming research, educational, and work environment in which security concerns are balanced with freedom of movement in an open campus atmosphere while

  9. Dumb Ideas in Computer Security

    E-Print Network [OSTI]

    Dumb Ideas in Computer Security Dr Charles P Pfleeger Pfleeger Consulting Group 19 July 2011 chuck Security" (2005) http://www.ranum.com/security/computer_security/editorials/dumb/ Default permit Ideas in Computer Security 219 Jul 2011 #12;Struck a Nerve Results 1-10 of about 2,030,000 for dumb

  10. Security Division 2007 Annual Report

    E-Print Network [OSTI]

    Computer Security Division 2007 Annual Report #12;TAble of ConTenTS Welcome Division Organization The Computer Security Division Responds to the Federal Information Security Management Act of 2002 Security Information Technology 15 Security Testing and Metrics 17 Validation Programs and Laboratory Accreditation 17

  11. August 2003 IT SECURITY METRICS

    E-Print Network [OSTI]

    August 2003 IT SECURITY METRICS Elizabeth B. Lennon, Editor Information Technology Laboratory approach to measuring information security. Evaluating security at the sys tem level, IT security metrics and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

  12. Energy Security Initiatives Update

    Broader source: Energy.gov [DOE]

    Presentation—given at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meeting—lists Federal government energy security initiatives.

  13. TEC Information Security

    Broader source: Energy.gov (indexed) [DOE]

    External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

  14. NNSA orders security enhancements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    badge or valid driver's license) before proceeding, and will be asked to vouch for other vehicle occupants. LOS ALAMOS, N. M., Dec. 21, 2012-The National Nuclear Security...

  15. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08T23:59:59.000Z

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  16. Hazardous Material Security (Maryland)

    Broader source: Energy.gov [DOE]

    All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

  17. National Nuclear Security Administration

    Broader source: Energy.gov (indexed) [DOE]

    and Related Structures within TA-3 at Los Alamos National Laboratory, Los Alamos, New Mexico U. S. Department of Energy National Nuclear Security Administration Los Alamos Area...

  18. Office of Departmental Personnel Security

    Broader source: Energy.gov [DOE]

    The Office of Departmental Personnel Security serves as the central leader and advocate vested with the authority to ensure consistent and effective implementation of personnel security programs Department-wide (including for the National Nuclear Security Administration (NNSA).

  19. UC SECURITY FRAMEWORK 2011 -2012

    E-Print Network [OSTI]

    Hickman, Mark

    1 UC SECURITY FRAMEWORK 2011 - 2012 #12;2 Contents Background..................................................................................................................................4 About UC Security & Campus Community Support .................................................................5 Security Service Authority and Relationship with NZ Police and Emergency Services ...........5

  20. The security of machine learning

    E-Print Network [OSTI]

    Barreno, Marco; Nelson, Blaine; Joseph, Anthony D.; Tygar, J. D.

    2010-01-01T23:59:59.000Z

    of the IEEE symposium on security and privacy (pp. 188–201).and communications security (CCS) (pp. 59–68). Globerson,detection. In USENIX security symposium. Klimt, B. , & Yang,

  1. January 2005 INTEGRATING IT SECURITY

    E-Print Network [OSTI]

    January 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS By Joan S. Hash, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Introduction To assist federal agencies with effec tively integrating security

  2. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08T23:59:59.000Z

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  3. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27T23:59:59.000Z

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  4. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01T23:59:59.000Z

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  5. Social Networking? Secure Networking?

    E-Print Network [OSTI]

    Chapman, Michael S.

    Social Networking? Secure Networking? Teaching & Learning Technology Roundtable February 2010 #12 ­ The intent behind the current security measures in place at OHSU ­ The OHSU Social Networking Guidelines 2. To begin a campus wide dialogue exploring the changing world of online social networking and it

  6. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19T23:59:59.000Z

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  7. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29T23:59:59.000Z

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Cancels DOE P 470.1.

  8. December 2007 SECURING EXTERNAL

    E-Print Network [OSTI]

    devices such as desktop and laptop computers, personal digital assistants (PDAs), and cell phones. These teleworkers use devices such as desktop and laptop computers, personal digital assistants (PDAs), and cellDecember 2007 SECURING EXTERNAL COMPUTERS AND OTHER DEVICES USED BY TELEWORKERS SECURING EXTERNAL

  9. Global Material Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTuba City, Arizona,SiteNational Nuclear SecuritySecurity

  10. Army Energy Security and Independence

    Broader source: Energy.gov (indexed) [DOE]

    ARMY ENERGY SECURITY AND INDEPENDENCE Leadership Ownership Partnership 19 NOV 2008 Don Juhasz, PE, CEM CHIEF ARMY ENERGY POLICY Army Energy Security - "The Way Ahead" 2 ARMY ENERGY...

  11. Headquarters Facilities Master Security Plan

    Office of Environmental Management (EM)

    It implements the requirements of: Title 32, CFR, Part 2001, Classified National Security Information Executive Order 13526, Classified National Security Information...

  12. Sandia Energy - Water Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Infrastructure Security Home Climate & Earth Systems WaterEnergy Nexus Decision Models for Integrating EnergyWater Water Infrastructure Security Water Infrastructure...

  13. Smart-Grid Security Issues

    SciTech Connect (OSTI)

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29T23:59:59.000Z

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  14. International Nuclear Security

    SciTech Connect (OSTI)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14T23:59:59.000Z

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  15. Global Biofuel Production and Food Security: Implications for Asia Pacific

    E-Print Network [OSTI]

    Global Biofuel Production and Food Security: Implications for Asia Pacific 56th AARES Annual Conference Fremantle, Western Australia 7-10 February 2012 William T. Coyle #12;Global Biofuel Production and Food Security: Making the Connection --Past analysis and the evidence about biofuels and spiking

  16. Sandia National Laboratories: Systems Analysis

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Grid Integration, Infrastructure Security, Microgrid, News, News & Events, Renewable Energy, Systems Analysis, Systems Engineering, Transmission Grid Integration A lot that...

  17. Hydra Fuel Cell Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdfGetecGtel JumpCounty, Texas: EnergyHy9 CorporationHydra Fuel Cell Corporation

  18. Fact #624: May 24, 2010 Corporate Average Fuel Economy Standards...

    Energy Savers [EERE]

    4: May 24, 2010 Corporate Average Fuel Economy Standards, Model Years 2012-2016 Fact 624: May 24, 2010 Corporate Average Fuel Economy Standards, Model Years 2012-2016 The final...

  19. Fact #870: April 27, 2015 Corporate Average Fuel Economy Progress...

    Energy Savers [EERE]

    70: April 27, 2015 Corporate Average Fuel Economy Progress, 1978-2014 - Dataset Fact 870: April 27, 2015 Corporate Average Fuel Economy Progress, 1978-2014 - Dataset Excel file...

  20. Corporate Energy Management: A Survey of Large Manufacturing Companies

    E-Print Network [OSTI]

    Norland, D. L.; Lind, L.

    Corporate practices regarding energy management vary substantially from one company to another. Some companies pay close attention to energy use throughout the corporation while others pay scant attention. This paper first describes what we call...

  1. DOE and Calpine Corporation Tap Geothermal Energy from Abandoned...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    DOE and Calpine Corporation Tap Geothermal Energy from Abandoned Steam Wells DOE and Calpine Corporation Tap Geothermal Energy from Abandoned Steam Wells April 9, 2015 - 3:48pm...

  2. THE INTERFACE BETWEEN ENVIRONMENTAL ASSESSMENT AND CORPORATE RESPONSIBILITY: THE

    E-Print Network [OSTI]

    THE INTERFACE BETWEEN ENVIRONMENTAL ASSESSMENT AND CORPORATE RESPONSIBILITY: THE VICTOR DIAMOND Report No: 436 Title of Research Project: The Interface Between Environmental Assessment and Corporate: ___________________________________________ #12;iii ABSTRACT The environmental assessment and sustainable development literature recognizes

  3. Fitting In: Extreme Corporate Wellness and Organizational Communication

    E-Print Network [OSTI]

    James, Eric Preston

    2014-07-31T23:59:59.000Z

    In this dissertation I examine the intersection of organizational communication and what I name extreme corporate wellness. I define extreme corporate wellness as the push towards more radical fitness and workplace health promotion via the exercise...

  4. Extracting Security Control Requirements University of Tulsa

    E-Print Network [OSTI]

    Gamble, R. F.

    , Requirements, Security Policy Modeling. 1. INTRODUCTION Networks and information systems have grown. Security has become a larger issue with the democratization of technology and information. Security accepted security controls for "Federal Information Systems and Organizations" [8]. NIST defines security

  5. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    collision, an explosion near a nuclear reactor and its impact on the plant, and how burning rocket fuel. R., & Murphy, A. J. (2008). Recent assessments in USA of spent fuel packages exposed to severe National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly

  6. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    , environmental management, and the nuclear energy industry, this element serves as an inextricable component (above) and a simulation of a train striking a spent fuel cask (upper right) Transportation National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly

  7. Securing Financial Incentives for Energy Efficiency Projects: How to Create

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory Board FollowSectionSecuringCorporate

  8. FY 2012 National Security Technologies, LLC, PER Summary | National Nuclear

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved:Administration Sandia Corporation PERSecurityNationalSecurity

  9. Final Request for Proposal | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved:Administration Sandia CorporationNuclear Security21698

  10. INSTITUTE FOR CYBER SECURITY Application-Centric Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

  11. March 24, 2008 Databases: Security 1 Database Security and Authorization

    E-Print Network [OSTI]

    Adam, Salah

    to control login process by the DBMS Inference control The countermeasures to statistical database security database #12;March 24, 2008 Databases: Security 3 Chapter Outline Introduction Access Control Methods Policy System-related Security levels and categories Security Threats Loss of integrity Loss

  12. Safety and Security What do Safety/Security work with?

    E-Print Network [OSTI]

    Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with; · Security revolving work environment · Handle locks, keys, alarms, surveillance · Responsible

  13. Urban Commerce and Security Study Urban Commerce and Security Study

    E-Print Network [OSTI]

    Urban Commerce and Security Study Urban Commerce and Security Study Contact Information Fred S. Roberts Research Sponsor: Department of Homeland Security Rutgers University/CCICADA Center Professor.S. Department of Homeland Security, under Agreement 2009-ST-061-CCI002-02. Any opinions, findings

  14. SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card

    E-Print Network [OSTI]

    Li, Mo

    SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card Applying for a Social Security Card is easy AND it is FREE! If you DO NOT follow these instructions, we CANNOT process your and evidence to any Social Security office. Follow instructions below. HOW TO COMPLETE THE APPLICATION Most

  15. Wireless Security: Secure and Public Networks Villanova University

    E-Print Network [OSTI]

    36 Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer wireless access points. Security protocols exist for wireless networks; however, all widely implemented at implementing a protocol which allows public access to a secure wireless network have been made. In this report

  16. Rutgers Business School Professor Simi Kedia Corporate Finance

    E-Print Network [OSTI]

    Lin, Xiaodong

    Rutgers Business School Professor Simi Kedia Corporate Finance Office: WP - 1132 26:390:572 Phone Objectives: The objective of this course is to introduce doctoral students to research in corporate finance of capital, corporation finance and the theory of investment, American Economic Review. ***S. Myers and N

  17. Security Games and Risk Minimization for Automatic Generation Control in Smart Grid

    E-Print Network [OSTI]

    Alpcan, Tansu

    risk analysis can be defined as "the process of identifying the risks to system security and deSecurity Games and Risk Minimization for Automatic Generation Control in Smart Grid Yee Wei Law control, security games 1 Introduction A power grid is a critical infrastucture that must be protected

  18. ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1

    E-Print Network [OSTI]

    Su, Xiao

    ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1 Information................................................................................................................................................................................3 Information Security Policy...............................................................................................................................................4 Information Security Policy Management

  19. CORPORATE: RECORDING Moderator: N/A

    E-Print Network [OSTI]

    US Army Corps of Engineers

    Dredging Program Regulations Webinar, Mr. Joe Wilson. CORPORATE: RECORDING May 29, 2013 Julie Marcy: Okay to the first in our Dredging Operations Technical Support or DOTS Summer Webinar Meeting Series. This series of meetings is intended to share topics of concern about the National Dredging Program. And the meetings

  20. Hindawi Publishing Corporation International Journal of Hypertension

    E-Print Network [OSTI]

    Gleeson, Joseph G.

    Hindawi Publishing Corporation International Journal of Hypertension Volume 2012, Article ID 405892 of Hypertension: The Experience of the Cardiovascular Health Program in Chilean Primary Health Care Centers. To assess the blood pressure control and cardiovascular risk factors (CVRFs) in a population of hypertensive

  1. SUMMER PLACEMENT REPORT International Corporate Leadership Programme

    E-Print Network [OSTI]

    Berzins, M.

    SUMMER PLACEMENT REPORT International Corporate Leadership Programme Name: Faisal M. Khan Year lime product suitable for flue gas treatment. 2. Methods and Results Analytical Methods Used: Research:\\Faculty-of-Engineering\\Keyworth\\Projects\\ICLP\\Private\\2007\\Case Studies\\Faisal Khan - Singleton Birch.doc #12;Business Case: The potential market

  2. DOW CORNING CORPORATION Material Safety Data Sheet

    E-Print Network [OSTI]

    Garmestani, Hamid

    -88-3 Toluene The above components are hazardous as defined in 29 CFR 1910.1200. 3. HAZARDS or water spray. Water can be used to cool fire exposed containers. Fire Fighting Measures: Self to keep fire exposed containers cool. #12;DOW CORNING CORPORATION Material Safety Data Sheet Page: 3 of 8

  3. Senior projectS corporate Sponsored

    E-Print Network [OSTI]

    Stuart, Josh

    --Professor, Computer Engineering | http://users.soe.ucsc. edu/~larrabee/Site/Professor_Tracy_Larrabee.html Charlie McSenior projectS program corporate Sponsored Partner's Day May 31, 2012 Baskin School of Engineering earning their engineering degree and fulfilling this capstone design sequence. Our students who have

  4. Hindawi Publishing Corporation Advances in Multimedia

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Hindawi Publishing Corporation Advances in Multimedia Volume 2010, Article ID 386035, 17 pages doi:10.1155/2010/386035 Research Article MMSA: Metamodel Multimedia Software Architecture Makhlouf with heterogeneous multimedia components. It enables the description of the software architectures as a collection

  5. Hindawi Publishing Corporation Advances in Multimedia

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Hindawi Publishing Corporation Advances in Multimedia Volume 2013, Article ID 175064, 22 pages http camera is a challenge that multimedia community is facing with the proliferation of such sensors posed to the Multimedia research community earlier. For instance, visual lifelogs can record daily

  6. Hindawi Publishing Corporation Comparative and Functional Genomics

    E-Print Network [OSTI]

    Newcastle upon Tyne, University of

    Hindawi Publishing Corporation Comparative and Functional Genomics Volume 2007, Article ID 47304, 7 pages doi:10.1155/2007/47304 Meeting Report eGenomics: Cataloguing Our Complete Genome Collection III, Michigan State University, East Lansing, MI 48824, USA 3 The Institute for Genomic Research, 9712 Medical

  7. Libraries Reference Copyright 1996 -2003 Intel Corporation

    E-Print Network [OSTI]

    Fossati, Giovanni

    Intel® Fortran Libraries Reference Copyright © 1996 - 2003 Intel Corporation All Rights Reserved PROPERTY RIGHT. Intel products are not intended for use in medical, life saving, or life sustain- ing applications. This Intel® Fortran Libraries Reference as well as the software described in it is furnished

  8. Hindawi Publishing Corporation Journal of Sensors

    E-Print Network [OSTI]

    Calgary, University of

    Hindawi Publishing Corporation Journal of Sensors Volume 2010, Article ID 967245, 10 pages doi:10 artificial magnetic perturbations introduced close to the sensor on the host platform and without additional landmarks, like mountains or stones that early men could easily recognize and remember during their travels

  9. Hindawi Publishing Corporation Advances in Artificial Intelligence

    E-Print Network [OSTI]

    Hexmoor, Henry

    Coulomb's Law Pejman Kamkarian1 and Henry Hexmoor2 1 Electrical and Computer Engineering Department, supervisors can guide people to safety. In this paper, we combine Coulomb's electrical law, graph theoryHindawi Publishing Corporation Advances in Artificial Intelligence Volume 2012, Article ID 340615

  10. Hindawi Publishing Corporation International Journal of Ecology

    E-Print Network [OSTI]

    Rieseberg, Loren

    Hindawi Publishing Corporation International Journal of Ecology Volume 2012, Article ID 939862, 17 pages doi:10.1155/2012/939862 Review Article Parallel Ecological Speciation in Plants? Katherine L speciation, known as parallel ecological speciation, is one of several forms of evidence for ecology's role

  11. URANIUM MILLING ACTIVITIES AT SEQUOYAH FUELS CORPORATION

    E-Print Network [OSTI]

    unknown authors

    Sequoyah Fuels Corporation (SFC) describes previous operations at its Gore, Oklahoma, uranium conversion facility as: (1) the recovery of uranium by concentration and purification processes; and (2) the conversion of concentrated and purified uranium ore into uranium hexafluoride (UF 6), or the reduction of depleted uranium tetrafluoride (UF 4) to UF 6. SFC contends that these

  12. Researcher at Cerner Corporation Cerner Overview

    E-Print Network [OSTI]

    Jornsten, Rebecka

    Researcher at Cerner Corporation Cerner Overview Cerner is the leading U.S. supplier of healthcare Qualifications Minimum Qualifications: · Master's degree in biostatistics, epidemiology, MIS or related field. Preferred Qualifications: · Intermediate knowledge of both traditional statistical methods and modern

  13. Hindawi Publishing Corporation Journal of Nanotechnology

    E-Print Network [OSTI]

    Wang, Yan Alexander

    Hindawi Publishing Corporation Journal of Nanotechnology Volume 2010, Article ID 801789, 42 pages a general interest in both fundamental and practical nanotechnology. Over the past 20 years, research's -orbital axis vector (POAV) #12;2 Journal of Nanotechnology (0,0) (1,0) (2,0) (3,0) (4,0) (5,0) (1,1) (2

  14. PRIVACY AND SECURITY OF PERSONAL INFORMATION

    E-Print Network [OSTI]

    Sadeh, Norman M.

    Chapter 1 PRIVACY AND SECURITY OF PERSONAL INFORMATION Economic Incentives and Technological for many, the economic #12;2 incentives have not generated widespread adoption, and government in University acquisti@andrew.cmu.edu Abstract I discuss the evolution of the economic analysis of privacy

  15. The Effects of the Political-Legal Environment and Corporate Characteristics on Mergers and Acquisitions in India, 1991-2005

    E-Print Network [OSTI]

    Ranganathan, Shilpa

    2012-07-16T23:59:59.000Z

    an analysis of the transition in public policy governing corporations between 1991 and 2005. The second part tests hypotheses derived from resource dependence theory relating to a firm’s decision to acquire. The analysis explores the factors that explain why...

  16. SECURING RADIO FREQUENCY IDENTIFICATION (RFID)

    E-Print Network [OSTI]

    business process for an organization; as a result, the security risks for RFID systems and the controls for an organization; as a result, the security risks for RFID systems and the controls available to address themMay 2007 SECURING RADIO FREQUENCY IDENTIFICATION (RFID) SYSTEMS SECURING RADIO FREQUENCY

  17. UNCG Security Awareness Training & Instructions

    E-Print Network [OSTI]

    Saidak, Filip

    UNCG Security Awareness Training & Instructions 02.09.2010 Page 1 of 4 Educating UNCG faculty and staff with respect to security best practices is essential in securing the University's information University employee that works with restricted or financial data. UNCG engaged Fishnet Security, a nationally

  18. ANNUAL SECURITY & FIRE SAFETY REPORT

    E-Print Network [OSTI]

    Maxwell, Bruce D.

    ANNUAL SECURITY & FIRE SAFETY REPORT 2014 A guide to policies, procedures, practices, and programs implemented to keep students, faculty, and staff safe and facilities secure. www.montana.edu/reports/security.pdf #12;Inside this Report 2014 Annual Security and Fire Safety Report for Reporting Year 2013

  19. Operations Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-04-30T23:59:59.000Z

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  20. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-25T23:59:59.000Z

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  1. AMALGAMATED SECURITY COMMUNITIES

    E-Print Network [OSTI]

    Harvey, Andrew Stephen

    2011-08-31T23:59:59.000Z

    This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

  2. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-01-22T23:59:59.000Z

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  3. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Administration FY 2011 - FY 2015 Budget Outlook Managing the NNSA 4.0% Science, Technology & Engineering 14.5% Stockpile Support 17.9% Preventing the Spread of...

  4. Special Analysis for the Disposal of the Idaho National Laboratory Unirradiated Light Water Breeder Reactor Rods and Pellets Waste Stream at the Area 5 Radioactive Waste Management Site, Nevada National Security Site, Nye County, Nevada

    SciTech Connect (OSTI)

    Shott, Gregory [NSTec

    2014-08-31T23:59:59.000Z

    The purpose of this special analysis (SA) is to determine if the Idaho National Laboratory (INL) Unirradiated Light Water Breeder Reactor (LWBR) Rods and Pellets waste stream (INEL103597TR2, Revision 2) is suitable for disposal by shallow land burial (SLB) at the Area 5 Radioactive Waste Management Site (RWMS). The INL Unirradiated LWBR Rods and Pellets waste stream consists of 24 containers with unirradiated fabricated rods and pellets composed of uranium oxide (UO2) and thorium oxide (ThO2) fuel in zirconium cladding. The INL Unirradiated LWBR Rods and Pellets waste stream requires an SA because the 229Th, 230Th, 232U, 233U, and 234U activity concentrations exceed the Nevada National Security Site (NNSS) Waste Acceptance Criteria (WAC) Action Levels.

  5. Data port security lock

    DOE Patents [OSTI]

    Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

    2008-06-24T23:59:59.000Z

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  6. Engineering secure software 

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01T23:59:59.000Z

    breaches in the operating environment. Security breaches resulting from misuse or tnisconfiguration of the program should not be blamed on the software. T'his is a debatable position. A security breach that results from an unintentional enor... units with public key algorithms, private keys, and certificates. Any attempt to access or modify the data in these devices will render them unusable. The device contains software tools. These devices use the computer they reside on as a general...

  7. Incidents of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-17T23:59:59.000Z

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  8. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

    2012-01-31T23:59:59.000Z

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or â?? tunnelsâ?, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

  9. Corporate Deduction | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand JumpConceptual Model, clickInformationNew|Core Analysis At Geysers|Cornwall,

  10. IY5512: Part 1 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    IY5512: Part 1 1 Information Security Group IY5512 Computer Security Part 1: Introduction to computer security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security) ... 2 Information Security Group Agenda · Overview · Security goals · Security approaches ­ prevention

  11. The climate change and energy security nexus

    SciTech Connect (OSTI)

    King, Marcus Dubois [George Washington University; Gulledge, Jay [ORNL

    2013-01-01T23:59:59.000Z

    The study of the impacts of climate change on national and interna-tional security has grown as a research field, particularly in the last five years. Within this broad field, academic scholarship has concentrated primarily on whether climate change is, or may become, a driver of violent conflict. This relationship remains highly contested. However, national security policy and many non-governmental organizations have identified climate change as a threat multiplier in conflict situations. The U.S. Department of Defense and the United Kingdom's Ministry of Defense have incorporated these findings into strategic planning documents such as the Quadrennial Defense Review and the Strategic Defence and Security Review. In contrast to the climate-conflict nexus, our analysis found that academic scholarship on the climate change and energy security nexus is small and more disciplinarily focused. In fact, a search of social science litera-ture found few sources, with a significant percentage of these works attribut-able to a single journal. Assuming that policymakers are more likely to rely on broader social science literature than technical or scientific journals, this leaves a limited foundation. This then begged the question: what are these sources? We identified a body of grey literature on the nexus of climate change and energy security of a greater size than the body of peer-reviewed social science literature. We reviewed fifty-eight recent reports, issue briefs, and transcripts to better understand the nexus of climate change and energy security, as well as to gain insight about the questions policymakers need answered by those undertaking the research. In this article, we describe the nature of the sources reviewed, highlight possible climate change and energy security linkages found within those sources, identify emerging risks, and offer conclusions that can guide further research.

  12. ata security feature: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing...

  13. Sandia National Laboratories: Modeling & Analysis

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sandia Study Shows Large LNG Fires Hotter but Smaller Than Expected On December 6, 2011, in Analysis, Energy Assurance, Infrastructure Security, Modeling, Modeling & Analysis,...

  14. Security enhanced with increased vehicle inspections

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security enhanced with increased vehicle inspections Security measures increase as of March: vehicle inspections won't delay traffic New increased security procedures meet LANL's...

  15. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    her students on security of process control systems. I amcyber-security tools for process control systems. In theon the security mechanisms of process control systems, few

  16. Global Environmental Change and Human Security

    E-Print Network [OSTI]

    Kunnas, Jan

    2011-01-01T23:59:59.000Z

    with human rights, human security or environmental change ifEnvironmental Change and Human Security By Matthew, RichardChange and Human Security. Cambridge, Massachusetts &

  17. Security and United States Immigration Policy

    E-Print Network [OSTI]

    Totten, Robbie James

    2012-01-01T23:59:59.000Z

    Change and European Security. London: Brassey's. Furer,1981]. American National Security, 6th ed. Baltimore, MD:J. Wheeler. 2008. The Security Dilemma: Fear, Cooperation

  18. Energy and Security in Northeast Asia

    E-Print Network [OSTI]

    May, Michael; Johnson, Celeste; Fei, Edward; Suzuki, Tatsujiro

    1996-01-01T23:59:59.000Z

    regional cooperation on energy and security issues in Asia.Energy and Security in Northeast Asia An IGCC studycan be drawn. The energy security situation and outlook are

  19. Sandia Energy - Cyber Security for Electric Infrastructure

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber Security for Electric Infrastructure Home Stationary Power Grid Modernization Cyber Security for Electric Infrastructure Cyber Security for Electric Infrastructureashoter2015...

  20. Preliminary Notice of Violation, National Security Technologies...

    Office of Environmental Management (EM)

    National Security Technologies, LLC - September 26, 2014 Preliminary Notice of Violation, National Security Technologies, LLC - September 26, 2014 September 26, 2014 Security...

  1. Personnel Security - DOE Directives, Delegations, and Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    72.2 Chg 1, Personnel Security by Mark Pekrul Functional areas: Personnel Security, Security, Human Capital The order establishes requirements that will enable DOE to operate a...

  2. Some Thoughts on Teaching Secure Programming

    E-Print Network [OSTI]

    Bishop, Matt

    2013-01-01T23:59:59.000Z

    Teaching Context in Information Security,” ACM Journal onWorld Conference on Information Security Education pp. 23–Colloquium on Information Systems Security Education (CISSE)

  3. HTS wire development at Intermagnetic General Corporation

    SciTech Connect (OSTI)

    Haldar, P. [Intermagnetics General Corp., Latham, NY (United States)

    1994-07-29T23:59:59.000Z

    The HTS wire development program at Intermagnetics General Corporation is outlined. Technical achievements in the Bi-2223, Tl-1223 and Tl-based conductor program are summarized. Long lengths of Tl-based HTS tapes with uniform transport properties have been fabricated. Multifilament samples of Tl-based HTS tapes have been fabricated for the first time. Optimization of thermomechanical processing is ongoing and weak links is still a major problem in P-I-T tapes. Future work is summarized.

  4. Corporate Information Systems | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative FuelsNovember 13, 2014Contributing Data Contributing DataCorporate Information Systems

  5. The Olympus Scandal and Corporate Governance Reform: Can Japan Find a Middle Ground between the Board Monitoring Model and Management Model

    E-Print Network [OSTI]

    Aronson, Bruce E.

    2012-01-01T23:59:59.000Z

    OLYMPUS SCANDAL AND CORPORATE GOVERNANCE REFORM: CAN JAPANScandal and Corporate Governance Issues A. Background of theunder Japan's Corporate Governance System ..

  6. Social Impact Management Plans: Innovation in corporate and public policy

    SciTech Connect (OSTI)

    Franks, Daniel M., E-mail: d.franks@uq.edu.au [Centre for Social Responsibility in Mining, The University of Queensland, Sustainable Minerals Institute, St Lucia, Brisbane, Queensland 4072 (Australia); Vanclay, Frank, E-mail: frank.vanclay@rug.nl [Department of Cultural Geography, Faculty of Spatial Sciences, The University of Groningen, P.O. Box 800, 9700 AV Groningen (Netherlands)] [Department of Cultural Geography, Faculty of Spatial Sciences, The University of Groningen, P.O. Box 800, 9700 AV Groningen (Netherlands)

    2013-11-15T23:59:59.000Z

    Social Impact Assessment (SIA) has traditionally been practiced as a predictive study for the regulatory approval of major projects, however, in recent years the drivers and domain of focus for SIA have shifted. This paper details the emergence of Social Impact Management Plans (SIMPs) and undertakes an analysis of innovations in corporate and public policy that have put in place ongoing processes – assessment, management and monitoring – to better identify the nature and scope of the social impacts that might occur during implementation and to proactively respond to change across the lifecycle of developments. Four leading practice examples are analyzed. The International Finance Corporation (IFC) Performance Standards require the preparation of Environmental and Social Management Plans for all projects financed by the IFC identified as having significant environmental and social risks. Anglo American, a major resources company, has introduced a Socio-Economic Assessment Toolbox, which requires mine sites to undertake regular assessments and link these assessments with their internal management systems, monitoring activities and a Social Management Plan. In South Africa, Social and Labour Plans are submitted with an application for a mining or production right. In Queensland, Australia, Social Impact Management Plans were developed as part of an Environmental Impact Statement, which included assessment of social impacts. Collectively these initiatives, and others, are a practical realization of theoretical conceptions of SIA that include management and monitoring as core components of SIA. The paper concludes with an analysis of the implications for the practice of impact assessment including a summary of key criteria for the design and implementation of effective SIMPs. -- Highlights: • Social impact management plans are effective strategies to manage social issues. • They are developed in partnership with regulatory agencies, investors and community. • SIMPs link assessment to ongoing management and address social and community issues. • SIMPs clarify responsibilities in the management of impacts, opportunities and risks. • SIMPs demonstrate a shift to include management as a core component of SIA practice.

  7. Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMFormsGasReleaseSpeechesHallNot Logged In You must createSecurity Global

  8. physical security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron4 Self-Scrubbing:,, ,Development of NovelHigh( ( ( ( (physical security |

  9. Radiological Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTuba City,Enriched UraniumPhysical Security Systems(PA)About| National

  10. Security Commodity Team | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol HomeFacebook TwitterSearch-Comments Sign InNuclear Security

  11. Security Notice | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch > TheNuclearHomeland ScienceInnovationScience andbarrierSecurity

  12. Tag: security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our InstagramStructureProposedPAGESafety Tag: Safety Displaying 1security Tag:

  13. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our Instagram Secretary Moniz is Taking OverEvaluating ' M M t345 UnlimitedSecure

  14. Secure Storage | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our Instagram Secretary Moniz is Taking OverEvaluating ' M M t345Secure Storage

  15. Mass and Elite Views on Nuclear Security: US National Security Surveys 1993-1999

    SciTech Connect (OSTI)

    HERRON,KERRY G.; JENKINS-SMITH,HANK C.; HUGHES,SCOTT D.

    2000-06-01T23:59:59.000Z

    This is the fourth report in an ongoing series of studies examining how US perspectives about nuclear security are evolving in the post-Cold War era. In Volume 1 the authors present findings from a nationwide telephone survey of randomly selected members of the US general public conducted from 13 September to 14 October 1999. Results are compared to findings from previous surveys in this series conducted in 1993, 1995, and 1997, and trends are analyzed. Key areas of investigation reported in Volume 1 include evolving perceptions of nuclear weapons risks and benefits, preferences for related policy and spending issues, and views about three emerging issue areas: deterrent utility of precision guided munitions; response options to attacks in which mass casualty weapons are used; and expectations about national missile defenses. In this volume they relate respondent beliefs about nuclear security to perceptions of nuclear risks and benefits and to policy preferences. They develop causal models to partially explain key preferences, and they employ cluster analysis to group respondents into four policy relevant clusters characterized by similar views and preferences about nuclear security within each cluster. Systematic links are found among respondent demographic characteristics, perceptions of nuclear risks and benefits, policy beliefs, and security policy and spending preferences. In Volume 2 they provide analysis of in-depth interviews with fifty members of the US security policy community.

  16. Engineering secure software

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01T23:59:59.000Z

    the vulnerabilities based on their coverage and cost. The above modeling approach is also known as thc onion peel model due to its nature of dividing the problem space into zones of similar security. These zones represent the peels of the onion. Each zone is also... into peels based on the security considerations of the entities of the system. The model describes minimum interaction among components across peels and maximum within peels. The onion diagram includes the physical entities of the systems and not just...

  17. GAANN -Computer Systems Security GAANN Computer Systems Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important? ­ Computing devices have a large impact on our daily life ­ Guaranteeing that the devices perform as desired

  18. Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability

    E-Print Network [OSTI]

    Ragsdale, G.

    -25, 2010 Implementing TCG Standards Within Systems ? Trusted Platform Module (TPM) ? Provides root of trust ? Secure storage ? Signing & hashing functions ? Tamper detection ? Accelerates cryptography ? TPM software stack ? Implements TCG stack... Update Session Security (symmetric key) Code and Data Integrity (memory hash) ?Secure secret storage ?TPM chip root trust secret ?Owner root trust secret ?Memory hash signature ?Standard encryption algorithm ?Standard hashing algorithm ?Tamper detection...

  19. SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011

    E-Print Network [OSTI]

    SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011 Choose brands and models of mobile devices that have the options referenced below. Use all available security options that your or sensitive university information in un-approved off-campus services, such as public cloud based services

  20. Security Patterns: Comparing Modeling Approaches Armstrong NHLABATSI

    E-Print Network [OSTI]

    Jurjens, Jan

    Security Patterns: Comparing Modeling Approaches Armstrong NHLABATSI ** , Arosha BANDARA the challenges of developing secure software systems remains an active research area in software engineering. Current research efforts have resulted in the documentation of recurring security problems as security