National Library of Energy BETA

Sample records for analysis securities corporation

  1. First Analysis Securities Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View New PagesSustainable Urban Transport Jump to: navigation, searchSecurities Corporation Jump

  2. Security Risks and Modern Cyber Security Technologies for Corporate Networks

    E-Print Network [OSTI]

    Gharibi, Wajeb

    2011-01-01

    This article aims to highlight current trends on the market of corporate antivirus solutions. Brief overview of modern security threats that can destroy IT environment is provided as well as a typical structure and features of antivirus suits for corporate users presented on the market. The general requirements for corporate products are determined according to the last report from av-comparatives.org [1]. The detailed analysis of new features is provided based on an overview of products available on the market nowadays. At the end, an enumeration of modern trends in antivirus industry for corporate users completes this article. Finally, the main goal of this article is to stress an attention about new trends suggested by AV vendors in their solutions in order to protect customers against newest security threats.

  3. Corporate Analysis of DOE Safety Performance

    Broader source: Energy.gov [DOE]

    The Office of Environment, Health, Safety and Security (EHSS), Office of Analysis develops analysis tools and performance dashboards, and conducts analysis of DOE safety performance corporately and on a variety of specific environment, safety and health topics.

  4. Corporate Security and Conflict Outcomes 

    E-Print Network [OSTI]

    Tkach, Benjamin K

    2013-10-21

    amongst the ships' owners. 19 The 1990s witnessed expansion in the use of security contractors similar to to other government sectors (Camm 2012). The U.S. government commissioned numerous reports and analysis on the potential of privatization... papers and providing a sympathetic ear for all the toils of a PhD program. The unconditional love of my family, particularly when I was at my worst (which was often), shows the power of love we have for one another. vi TABLE OF CONTENTS Page...

  5. The Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure Computing Corporation

    E-Print Network [OSTI]

    Andersen, Dave

    Computing Corporation Stephen Smalley, Peter Loscocco National Security Agency Mike Hibler, David AndersenThe Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure be flexible in their support for security policies, providing sufficient mechanisms for supporting the wide

  6. A Graphical Approach to Security Risk Analysis

    E-Print Network [OSTI]

    Střlen, Ketil

    A Graphical Approach to Security Risk Analysis Doctoral Dissertation by Ida Hogganvik Submitted to security risk analysis i Acknowledgements First of all, I would like to thank my supervisor Ketil Střlen to security risk analysis #12;A graphical approach to security risk analysis iii List of Original Publications

  7. Corporate decision analysis : an engineering approach

    E-Print Network [OSTI]

    Tang, Victor, Ph.D. Massachusetts Institute of Technology

    2006-01-01

    We explore corporate decisions and their solutions under uncertainty using engineering methods. Corporate decisions tend to be complex; they are interdisciplinary and defy programmable solutions. To address these challenges, ...

  8. FY 2007 Sandia Corporation PER Summary | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia National 1 PAGEAdministration Sandia Corporation PER

  9. Security Risk Analysis of Enterprise Networks Using

    E-Print Network [OSTI]

    Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs AnoopSinghal XimmingOu NIST Interagency Report 7788 #12;Security Risk Analysis of Enterprise Networks Using of Standards and Technology Interagency Report 7788 # pages (August 2011) #12;SECURITY RISK ANALYSIS

  10. FY 2009 Sandia Corporation PER Summary | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia National 1Nuclear SecurityNuclearAdministration

  11. FY 2012 Sandia Corporation PER Summary | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia NationalSecurity

  12. SPECIAL ISSUE PAPER Threat scenariobased security risk analysis using use

    E-Print Network [OSTI]

    SPECIAL ISSUE PAPER Threat scenariobased security risk analysis using use case modeling & Sons, Ltd. KEYWORDS security risk analysis; qualitative risk analysis; scenario method; use case the risks posed by security threats and prevent them effectively. Security Risk Analysis (SRA

  13. IS THE TAIL WAGGING THE DOG? AN EMPIRICAL ANALYSIS OF CORPORATE CARBON FOOTPRINTS AND FINANCIAL PERFORMANCE

    E-Print Network [OSTI]

    Delmas, Magali A; Nairn-Birch, Nicholas S.

    2011-01-01

    The importance of carbon footprint estimation boundaries.ANALYSIS OF CORPORATE CARBON FOOTPRINTS AND FINANCIALANALYSIS OF CORPORATE CARBON FOOTPRINTS AND FINANCIAL

  14. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    SciTech Connect (OSTI)

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01

    Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

  15. Statistical analysis of correlated fossil fuel securities

    E-Print Network [OSTI]

    Li, Derek Z

    2011-01-01

    Forecasting the future prices or returns of a security is extraordinarily difficult if not impossible. However, statistical analysis of a basket of highly correlated securities offering a cross-sectional representation of ...

  16. Risk-driven Security Testing versus Test-driven Security Risk Analysis

    E-Print Network [OSTI]

    Střlen, Ketil

    Risk-driven Security Testing versus Test-driven Security Risk Analysis Gencer Erdogan1 the combinations of se- curity testing and security risk analysis depending on whether it is viewed from a security testing perspective or a security risk analysis perspective. The main focus in the former view is security

  17. Security Analysis of PRINCE Jeremy Jean1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Security Analysis of PRINCE J´er´emy Jean1 , Ivica Nikoli´c2 , Thomas Peyrin2 , Lei Wang2,thomas.peyrin,wang.lei,wushuang}@ntu.edu.sg Abstract. In this article, we provide the first third-party security analysis of the PRINCE lightweight the structural linear relations that exist for PRINCE in order to obtain a key recovery attack that slightly

  18. A structural analysis of vehicle design responses to Corporate Average Fuel Economy policy

    E-Print Network [OSTI]

    Michalek, Jeremy J.

    A structural analysis of vehicle design responses to Corporate Average Fuel Economy policy Ching 2009 Accepted 29 August 2009 Keywords: Corporate Average Fuel Economy Energy policy Oligopolistic market Game theory Vehicle design a b s t r a c t The US Corporate Average Fuel Economy (CAFE

  19. 2011 Corporate Headquarters: An Analysis of Immediate Communities 

    E-Print Network [OSTI]

    Conti, Serena Nicole

    2013-04-25

    While the Bay Area’s history has shaped today’s culture, there is little written about how corporations affect their immediate communities. This thesis focuses on the largest corporations in the Bay Area to determine if ...

  20. Bachelor of Science in Security and Risk Analysis (SRA)

    E-Print Network [OSTI]

    Lee, Dongwon

    Bachelor of Science in Security and Risk Analysis (SRA) Are you ready to become a knowledge leader of science in security and risk analysis (SRA). In the SRA program, you'll learn how to design systems.S. security breaches that are making international news? Can you imagine yourself as a risk analysis leader

  1. Will Cyber-Insurance Improve Network Security? A Market Analysis

    E-Print Network [OSTI]

    , Microsoft, etc.), cyber-insurers (e.g., ISPs, cloud providers, security vendors, etc.), regulatory agenciesWill Cyber-Insurance Improve Network Security? A Market Analysis Ranjan Pal University of Southern--Recent work in security has illustrated that solutions aimed at detection and elimination of security threats

  2. Office of Corporate Security Strategy, Analysis and Special Operations |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuelsof EnergyApril 2014Department ofWindOPENOccurrence Reporting3Department of

  3. A Structural Analysis of Vehicle Design Responses to Corporate Average Fuel Economy Policy

    E-Print Network [OSTI]

    Michalek, Jeremy J.

    09-0588 A Structural Analysis of Vehicle Design Responses to Corporate Average Fuel Economy Policy, Michalek, and Hendrickson 1 ABSTRACT The U.S. Corporate Average Fuel Economy (CAFE) regulations, which aim fuel economy; Energy policy; Oligopolistic market; Mixed logit #12;Shiau, Michalek, and Hendrickson 2 1

  4. Essays on the structural estimation and analysis of corporate and industrial markets

    E-Print Network [OSTI]

    Cohen, Moshe Aharon

    2009-01-01

    The three chapters which comprise my thesis are a collection of essays on the analysis of the corporate governance and airline markets and of the federal appellate structure. In Chapter 1, I use a discrete choice framework ...

  5. Cyber security analysis testbed : combining real, emulation, and simulation.

    SciTech Connect (OSTI)

    Villamarin, Charles H.; Eldridge, John M.; Van Leeuwen, Brian P.; Urias, Vincent E.

    2010-07-01

    Cyber security analysis tools are necessary to evaluate the security, reliability, and resilience of networked information systems against cyber attack. It is common practice in modern cyber security analysis to separately utilize real systems of computers, routers, switches, firewalls, computer emulations (e.g., virtual machines) and simulation models to analyze the interplay between cyber threats and safeguards. In contrast, Sandia National Laboratories has developed novel methods to combine these evaluation platforms into a hybrid testbed that combines real, emulated, and simulated components. The combination of real, emulated, and simulated components enables the analysis of security features and components of a networked information system. When performing cyber security analysis on a system of interest, it is critical to realistically represent the subject security components in high fidelity. In some experiments, the security component may be the actual hardware and software with all the surrounding components represented in simulation or with surrogate devices. Sandia National Laboratories has developed a cyber testbed that combines modeling and simulation capabilities with virtual machines and real devices to represent, in varying fidelity, secure networked information system architectures and devices. Using this capability, secure networked information system architectures can be represented in our testbed on a single, unified computing platform. This provides an 'experiment-in-a-box' capability. The result is rapidly-produced, large-scale, relatively low-cost, multi-fidelity representations of networked information systems. These representations enable analysts to quickly investigate cyber threats and test protection approaches and configurations.

  6. ANALYSIS OF ELECTRIC GRID SECURITY UNDER TERRORIST THREAT Javier Salmeron

    E-Print Network [OSTI]

    Baldick, Ross

    ANALYSIS OF ELECTRIC GRID SECURITY UNDER TERRORIST THREAT Javier Salmeron Kevin Wood Operations techniques for analyzing the security and resilience of electrical power grids against disruptions caused analytical techniques to help mitigate the disruptions to electric power grids caused by terrorist attacks

  7. Security

    Broader source: Energy.gov [DOE]

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  8. Regional Drinking Water Security Action research, policy and analysis

    E-Print Network [OSTI]

    Sohoni, Milind

    electricity, household energy use, small-town planning, post-harvest agriculture, water policy analysisRegional Drinking Water Security Action research, policy and analysis Milind Sohoni Centre, research Companies in development sector, think-tanks and NGOs Current Research Drinking water, grid

  9. Corporate social responsibility (CSR) : responsibility or Innovation? : an analysis of the feedback between CSR activities and the expectations placed upon corporations

    E-Print Network [OSTI]

    Rodriguez, Adrian Xavier

    2010-01-01

    This thesis uses case study and interview data to present a framework for analyzing corporate behavior in order to define corporate social responsibility (CSR). It answers the question: Can corporations tie corporate social ...

  10. Composable Tools For Network Discovery and Security Analysis

    E-Print Network [OSTI]

    Vigna, Giovanni

    Composable Tools For Network Discovery and Security Analysis Giovanni Vigna Fredrik Valeur Jingyu. This knowledge is provided by network mapping tools. These tools rely on models to rep- resent the entities that is pertinent to a specific target network. Un- fortunately, existing tools rely on incomplete data models

  11. Experiences from Using Indicators to Validate Expert Judgments in Security Risk Analysis

    E-Print Network [OSTI]

    Střlen, Ketil

    Experiences from Using Indicators to Validate Expert Judgments in Security Risk Analysis Olav--Expert judgments are often used to estimate likelihood values in a security risk analysis. These judgments report on experiences from a security risk analysis where indicators were used to validate likelihood

  12. Towards a Pattern Language for Security Risk Analysis of Web Applications

    E-Print Network [OSTI]

    Střlen, Ketil

    Towards a Pattern Language for Security Risk Analysis of Web Applications Yan Li, SINTEF ICT This article introduces a pattern language for security risk analysis of web applications in an example driven a security requirements pattern, a web application design pattern and a risk analysis model pattern

  13. Model-based Security Analysis of the German Health Card Architecture

    E-Print Network [OSTI]

    Jurjens, Jan

    information systems, security, German Health Card. 1 #12;1 Introduction The use of health-care information information security that are particularly significant for health-care systems, due both to the inherent these risks and enable secure health-care information systems, the security analysis has to be embedded

  14. Static Security Analysis based on Vulnerability Index (VI) and Network Contribution Factor

    E-Print Network [OSTI]

    1 Static Security Analysis based on Vulnerability Index (VI) and Network Contribution Factor (NCF introduces a new approach of power system static security analysis based on the Vulnerability Index (VI with the full AC power flow method shows that this approach is promising for fast and accurate static security

  15. Climate change and energy security: an analysis of policy research

    SciTech Connect (OSTI)

    King, Marcus Dubois; Gulledge, Jay

    2013-01-01

    The literature on climate change's impacts on energy security is scattered across disparate fields of research and schools of thought. Much of this literature has been produced outside of the academy by scholars and practitioners working in "think tanks," government agencies, and international/multilateral institutions. Here we reviewed a selected set of 58 articles and reports primarily from such sources and performed textual analysis of the arguments. Our review of this literature identifies three potential mechanisms for linking climate change and energy security: Climate change may 1) create second-order effects that may exacerbate social instability and disrupt energy systems; 2) directly impact energy supply and/or systems or 3) influence energy security through the effects of climate-related policies. We identify emerging risks to energy security driven by climate mitigation tech-nology choices but find less evidence of climate change's direct physical impacts. We used both empirical and qualitative selection factors for choosing the grey literature sample. The sources we selected were published in the last 5 years, available through electronic media and were written in language accessible to general policy or academic readers. The organi-zations that published the literature had performed previous research in the general fields of energy and/or climate change with some analytical content and identified themselves as non-partisan. This literature is particularly valuable to scholars because identifies understudied relationships that can be rigorously assessed through academic tools and methodologies and informs a translational research agenda that will allow scholars to engage with practitioners to address challenges that lie at the nexus of climate change and energy security.

  16. Analysis and Enforcement of Web Application Security Policies

    E-Print Network [OSTI]

    Weinberger, Joel Howard Willis

    2012-01-01

    4.2 HTML Security Policies . . . . . . . . . . . .4.5 Towards HTML Security Policies . . . . . . . . . 4.6present in the browser for HTML and its related sub-

  17. Analysis and Enforcement of Web Application Security Policies

    E-Print Network [OSTI]

    Weinberger, Joel Howard Willis

    2012-01-01

    the Application of CSP . . . . . . . . 4.4 Relatedsecurity policy (csp), 2012. http://developer.chrome.com/en-US/ docs/Security/CSP/Introducing_Content_Security_

  18. Identification of chemical hazards for security risk analysis activities.

    SciTech Connect (OSTI)

    Jaeger, Calvin Dell

    2005-01-01

    The presentation outline of this paper is: (1) How identification of chemical hazards fits into a security risk analysis approach; (2) Techniques for target identification; and (3) Identification of chemical hazards by different organizations. The summary is: (1) There are a number of different methodologies used within the chemical industry which identify chemical hazards: (a) Some develop a manual listing of potential targets based on published lists of hazardous chemicals or chemicals of concern, 'expert opinion' or known hazards. (b) Others develop a prioritized list based on chemicals found at a facility and consequence analysis (offsite release affecting population, theft of material, product tampering). (2) Identification of chemical hazards should include not only intrinsic properties of the chemicals but also potential reactive chemical hazards and potential use for activities off-site.

  19. A Formal Approach for Network Security Management Based on Qualitative Risk Analysis

    E-Print Network [OSTI]

    Wang, Yongge

    A Formal Approach for Network Security Management Based on Qualitative Risk Analysis Mohammad Emails: {mrahman4,ealshaer}@uncc.edu Abstract--The risk analysis is an important process for en- forcing security risk low. In this paper, we first present a declarative model for the qualitative risk analysis

  20. Toward a Security Domain Model for Static Analysis and Verification of Information Systems

    E-Print Network [OSTI]

    Toward a Security Domain Model for Static Analysis and Verification of Information Systems Alan Shaffer, Mikhail Auguston, Cynthia Irvine, Tim Levin Computer Science Department Naval Postgraduate School

  1. Analysis of Corporate Average Fuel Economy (CAFE) Standards for Light Trucks and Increased Alternative Fuel Use

    Reports and Publications (EIA)

    2002-01-01

    Sen. Frank Murkowski, the Ranking Minority Member of the Senate Committee on Energy and Natural Resources requested an analysis of selected portions of Senate Bill 1766 (S. 1766, the Energy Policy Act of 2002), House Resolution 4 (the Securing America's Future Energy Act of 2001) and Senate Bill 517 (S. 517, the Energy Policy Act of 2002). In response, the Energy Information Administration (EIA) has prepared a series of analyses showing the impacts of each of the selected provisions of the bills on energy supply, demand, and prices, macroeconomic variables where feasible, import dependence, and emissions.

  2. Security Analysis of an Open Car Immobilizer Protocol Stack

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    --apply the principle of open evaluation. A recent example is the specification of an open security protocol stack in principle be deployed on any suitable type of transponder chip. In this paper we re-evaluate the security] and the KeeLoq algo- rithm used in remote control systems [8] demonstrate the risks of this security

  3. Power System Probabilistic and Security Analysis on Commodity High Performance Computing Systems

    E-Print Network [OSTI]

    Franchetti, Franz

    Power System Probabilistic and Security Analysis on Commodity High Performance Computing Systems approaches for com- prehensive system analysis. The large-varying grid condi- tion on the aging and stressed power system infrastructures also requires merging of offline security analyses into on- line operation

  4. Economics Definitions, Methods, Models, and Analysis Procedures for Homeland Security Applications

    E-Print Network [OSTI]

    Economics Definitions, Methods, Models, and Analysis Procedures for Homeland Security Applications, Programmer Computational Economics Group January 29, 2010 SAND2010-4315 #12;2 This page intentionally blank #12;3 Economics Definitions, Methods, Models, and Analysis Procedures for Homeland Security

  5. Recommended Practice for Securing Control System Modems

    SciTech Connect (OSTI)

    James R. Davidson; Jason L. Wright

    2008-01-01

    This paper addresses an often overlooked “backdoor” into critical infrastructure control systems created by modem connections. A modem’s connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods.

  6. An analysis of structure and process of corporate alliance development using system architecture frameworks

    E-Print Network [OSTI]

    Kim, Gwang Gyu

    2007-01-01

    A strategic alliance has been one of the core methods for expanding the business of many corporations in terms of geographic presence, business domain, and technological scope. The strategic alliance includes many different ...

  7. Corporate social responsibility in Brazil : a comparative analysis of two paper companies

    E-Print Network [OSTI]

    Nascimento, Ana Paula M. do, 1966-

    2004-01-01

    If being socially responsible can result in short or long-term economic benefits, then why do not all companies adopt corporate social responsibility (CSR) practices? This thesis draws on general assumptions from illustrative ...

  8. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear

  9. Analysis and Enforcement of Web Application Security Policies

    E-Print Network [OSTI]

    Weinberger, Joel Howard Willis

    2012-01-01

    community 1 . In modern HTML based web applications, much ofthese HTML security policies explicit in web applications.support in web frameworks for static HTML evalua- tion as

  10. Commercial Aircraft Corporation of China (Comac) attempts to break the Airbus-Boeing duopoly, will it succeed? : an industry analysis framework applied

    E-Print Network [OSTI]

    Fuentes, Jose L., S.M. Massachusetts Institute of Technology

    2011-01-01

    Using an industry analysis framework, this thesis analyzes whether the recently established Commercial Aircraft Corporation of China (Comac) is likely to break the Boeing-Airbus duopoly in the industry of large commercial ...

  11. The Rabbit Stream Cipher Design and Security Analysis Martin Boesgaard, Thomas Pedersen, Mette Vesterager, and Erik Zenner

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    The Rabbit Stream Cipher ­ Design and Security Analysis Martin Boesgaard, Thomas Pedersen, Mette in 2003 [6]. Since then, an IV­setup function has been designed, and additional security analysis has been. The stream cipher Rabbit was first presented at FSE 2003 [6]. In the paper at hand, a full security analysis

  12. Model-based Security Risk Analysis for Networked Embedded Systems

    E-Print Network [OSTI]

    . The Security-Enhanced Embedded system Development (SEED) process has proposed a set of tools that a bridge are illustrated in a smart metering infrastructure scenario. 1 Introduction Meeting the security needs. The forthcoming vehicular networks and smart grid infrastructures are examples of such a technological development

  13. A UNIFIED FRAMEWORK OF INFORMATION ASSURANCE FOR THE DESIGN AND ANALYSIS OF SECURITY ALGORITHMS

    E-Print Network [OSTI]

    Baras, John S.

    A UNIFIED FRAMEWORK OF INFORMATION ASSURANCE FOR THE DESIGN AND ANALYSIS OF SECURITY ALGORITHMS several information security goals, such as authentication, integrity and secrecy, have often been and the Institute for Systems Research, University of Maryland, College Park, MD, 20742 ABSTRACT Most information

  14. Spare the Rod, Spoil the Network Security? Economic Analysis of Sanctions Online

    E-Print Network [OSTI]

    Camp, L. Jean

    Spare the Rod, Spoil the Network Security? Economic Analysis of Sanctions Online Vaibhav Garg that for well known security risks, such as botnets, ex ante sanctions are economically efficient. Systematic of harm is difficult to estimate, should incur ex post sanctions, e.g. information disclosure. Privacy

  15. A quantitative man-machine model for cyber security efficiency analysis 

    E-Print Network [OSTI]

    Jung, Sung-Oh

    2007-04-25

    Quality (TWQ). The machine component is composed of variables such as traffic volume and the amount of downtime. M3 enables the analysis of intrusion detection and incident response process efficiency, i.e., security defense team performance. With data...

  16. Copyright 2011 Northrop Grumman Corporation Northrop Grumman Information Systems (NGIS)

    E-Print Network [OSTI]

    from unattended sensors · Space vulnerabilities and survivability · Cyber security/informationCopyright © 2011 Northrop Grumman Corporation Northrop Grumman Information Systems (NGIS Northrop Grumman Corporation Page 2 1. Overview Information Sponsor ­Northrop Grumman Information Systems

  17. Analysis and Enforcement of Web Application Security Policies

    E-Print Network [OSTI]

    Weinberger, Joel Howard Willis

    2012-01-01

    In International Symposium on Software Testing and Analysis,International symposium on Software testing and analysis,

  18. Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE

    E-Print Network [OSTI]

    's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND 2014-15322PE Impact of PV

  19. The CORAS Tool for Security Risk Analysis Fredrik Vraalsen, Folker den Braber, Mass Soldal Lund, and Ketil Stlen

    E-Print Network [OSTI]

    Střlen, Ketil

    The CORAS Tool for Security Risk Analysis Fredrik Vraalsen, Folker den Braber, Mass Soldal Lund-based security risk analysis sup- ports documentation and reuse of risk analysis results through integra- tion of different risk analysis and software development techniques and tools. Built-in consistency checking

  20. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Energy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security

  1. DOE and Industry Showcase New Control Systems Security Technologies...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and security management to enable energy asset owners to design a secure, networked control systems architecture. The project is led by Siemens Corporate Research in partnership...

  2. IBM Research Zurich 2010 IBM Corporation

    E-Print Network [OSTI]

    & Computational Science: Business Optimization, Computational Sciences, Data Analytics Systems: Server Technology: Semiconductors, Systems, Beyond the Transistor, Nanotechnology, Biotechnology Computer Science: SecurityIBM Research ­ Zurich © 2010 IBM Corporation IBM Research Zurich A Strategy of Open Innovation Dr

  3. DYNAMIC SECURITY ANALYSIS OF ELECTRIC POWER SYSTEMS: PASSIVITY-BASED APPROACH AND POSITIVE INVARIANCE APPROACH

    E-Print Network [OSTI]

    Shen, Jinglai

    DYNAMIC SECURITY ANALYSIS OF ELECTRIC POWER SYSTEMS: PASSIVITY-BASED APPROACH AND POSITIVE power system to supply electricity. By nature, a power system is continually experiencing disturbances through the electric power grid is modeled by a set of nonlinear differential/algebraic equations. These n

  4. Iterative Security Risk Analysis for Network Flows Based on Provenance and Interdependency

    E-Print Network [OSTI]

    New South Wales, University of

    Iterative Security Risk Analysis for Network Flows Based on Provenance and Interdependency Mohsen high risk network flows and hosts in a high throughput network is a challenging task of network malicious and high risk network activities within a huge number of monitored network flows. To address

  5. Scalable, Secure Energy Information Management for Demand-Response Analysis Yogesh Simmhan1,2

    E-Print Network [OSTI]

    Hwang, Kai

    Scalable, Secure Energy Information Management for Demand-Response Analysis Yogesh Simmhan1 and optimize energy usage to meet sustainability goals. Managing the energy information lifecycle ­ from, feedback, and query/response interactions, which are transmitted across a widely distributed infrastructure

  6. Understanding and Improving App Installation Security Mechanisms through Empirical Analysis of Android

    E-Print Network [OSTI]

    Van Oorschot, Paul

    of Android David Barrera Jeremy Clark Daniel McCarney Paul C. van Oorschot School of Computer Science of the security decisions made by the Android op- erating system during the app installation process: update integrity and UID assignment. To inform our analysis, we collect a dataset of Android application metadata

  7. AndroSAT: Security Analysis Tool for Android Applications Saurabh Oberoi, Weilong Song, Amr M. Youssef

    E-Print Network [OSTI]

    Youssef, Amr M.

    AndroSAT: Security Analysis Tool for Android Applications Saurabh Oberoi, Weilong Song, Amr M Abstract--With about 1.5 million Android device activations per day and billions of application installation from Google Play, Android is becoming one of the most widely used operating systems

  8. A Security Framework for the Analysis and Design of Software Attestation

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    A Security Framework for the Analysis and Design of Software Attestation Frederik Armknecht.schulz@intel.com Christian Wachsmann Intel CRI-SC at TU Darmstadt, Germany christian.wachsmann@cased.de ABSTRACT Software with an expected strong impact in practice. It aims at verifying the software integrity of (typically) resource

  9. Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration

    E-Print Network [OSTI]

    Langerhans, Brian

    , for the United States Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL; determining rate of spread and social network for smallpox epidemic in Abakaliki, Nigeria (1972) · Studying

  10. Security Analysis of Selected AMI Failure Scenarios Using Agent Based Game Theoretic Simulation

    SciTech Connect (OSTI)

    Abercrombie, Robert K; Schlicher, Bob G; Sheldon, Frederick T

    2014-01-01

    Information security analysis can be performed using game theory implemented in dynamic Agent Based Game Theoretic (ABGT) simulations. Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. We concentrated our analysis on the Advanced Metering Infrastructure (AMI) functional domain which the National Electric Sector Cyber security Organization Resource (NESCOR) working group has currently documented 29 failure scenarios. The strategy for the game was developed by analyzing five electric sector representative failure scenarios contained in the AMI functional domain. From these five selected scenarios, we characterize them into three specific threat categories affecting confidentiality, integrity and availability (CIA). The analysis using our ABGT simulation demonstrates how to model the AMI functional domain using a set of rationalized game theoretic rules decomposed from the failure scenarios in terms of how those scenarios might impact the AMI network with respect to CIA.

  11. 2002 IBM Corporation IBM Research

    E-Print Network [OSTI]

    1 © 2002 IBM Corporation IBM Research High-performance computing techniques for neuro-image analysis A. Ravishankar Rao IBM T.J. Watson Research Center Yorktown Heights, NY #12;IBM Research © 2008 IBM Corporation 2 Acknowledgements Guillermo Cecchi, IBM Research Marcelo Magnasco, Rockefeller

  12. CS689: Privacy and Security in Data Analysis

    E-Print Network [OSTI]

    Zhang, Jun

    Instructor: Jun Zhang. E-mail: jzhang@cs.uky.edu. Tel: 257­3892. Office: Marksbury 321. Office Hours: MW: 9 is released to public or is subject to computer-based analysis, such as data mining. Prerequisites: Two 500 on Privacy Preserving Data Mining. Topical outline (tentative): · Brief introduction to data mining

  13. Cyber Security | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    System-of-systems analysis Visualization tools for complex information Next-generation smart grid technologies Quantum computing, security, and data fusion For more information,...

  14. Towards secure virtual directories : a risk analysis framework.

    SciTech Connect (OSTI)

    Claycomb, William R.

    2010-07-01

    Directory services are used by almost every enterprise computing environment to provide data concerning users, computers, contacts, and other objects. Virtual directories are components that provide directory services in a highly customized manner. Unfortunately, though the use of virtual directory services are widespread, an analysis of risks posed by their unique position and architecture has not been completed. We present a detailed analysis of six attacks to virtual directory services, including steps for detection and prevention. We also describe various categories of attack risks, and discuss what is necessary to launch an attack on virtual directories. Finally, we present a framework to use in analyzing risks to individual enterprise computing virtual directory instances. We show how to apply this framework to an example implementation, and discuss the benefits of doing so.

  15. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND 2012-1670P Ensuring the Safe Containment

  16. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Energy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W the computational, physics

  17. SSTARS - Safeguards and Security Tracking, Analysis and Reporting -

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput Analysis of Protein1-0845*RV6 Commercial8thUSERS'6/02 RunEnergy

  18. Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration

    E-Print Network [OSTI]

    Siefert, Chris

    , for the United States Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL objects. ­ Application provides simple functions to answer queries. ­ Small extra costs in memory_Set_Fn) COMPUTE Move data (Zoltan_Migrate) Clean up (Zoltan_Destroy) APPLICATION Zoltan_LB_Partition: · Call query

  19. Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration

    E-Print Network [OSTI]

    Sidiropoulos, Nikolaos D.

    , for the United States Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL of Western Ontario TRICAP June 5, 2006 Improvements to 3-way DEDICOM for Applications in Social Network applications - Study asymmetries in telephone calls among cities - Marketing research · car "switching" - car

  20. Electric Power Network Security Analysis via Minimum Cut Relaxation Kin Cheong Sou, Henrik Sandberg and Karl Henrik Johansson

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    ) and ma directed arcs (i.e., transmission lines) on which power flows. The flow can The authorsElectric Power Network Security Analysis via Minimum Cut Relaxation Kin Cheong Sou, Henrik Sandberg the security of power transmission networks is presented. In order to strategically allocate protection devices

  1. Probabilistic risk analysis toward cost-effective 3S (safety, safeguards, security) implementation

    SciTech Connect (OSTI)

    Suzuki, Mitsutoshi; Mochiji, Toshiro

    2014-09-30

    Probabilistic Risk Analysis (PRA) has been introduced for several decades in safety and nuclear advanced countries have already used this methodology in their own regulatory systems. However, PRA has not been developed in safeguards and security so far because of inherent difficulties in intentional and malicious acts. In this paper, probabilistic proliferation and risk analysis based on random process is applied to hypothetical reprocessing process and physical protection system in nuclear reactor with the Markov model that was originally developed by the Proliferation Resistance and Physical Protection Working Group (PRPPWG) in Generation IV International Framework (GIF). Through the challenge to quantify the security risk with a frequency in this model, integrated risk notion among 3S to pursue the cost-effective installation of those countermeasures is discussed in a heroic manner.

  2. Transportation Secure Data Center: Real-World Data for Environmental and Air Quality Analysis (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2013-01-01

    The National Renewable Energy Laboratory (NREL) and the U.S. Department of Transportation (DOT) have launched the free, web-based Transportation Secure Data Center (TSDC). The TSDC (www.nrel.gov/tsdc) preserves respondent anonymity while making vital transportation data available to a broad group of users through secure, online access. The TSDC database provides free-of-charge web-based access to valuable transportation data that can be used for: Emissions and air pollution modeling, Vehicle energy and power analysis, Climate change impact studies, Alternative fuel station planning, and Validating transportation data from other sources. The TSDC's two levels of access make composite data available with simple online registration, and allow researchers to use detailed spatial data after completing a straight forward application process.

  3. Review of inputs provided to Jason Associates Corporation in support of RWEV-REP-001, the Analysis of Postclosure Groundwater Impacts report.

    SciTech Connect (OSTI)

    Bryan, Charles R.; Weck, Philippe F.; Vaughn, Palmer; Arnold, Bill Walter

    2014-04-01

    Report RWEV-REP-001, Analysis of Postclosure Groundwater Impacts for a Geologic Repository for the Disposal of Spent Nuclear Fuel and High Level Radioactive Waste at Yucca Mountain, Nye County, Nevada was issued by the DOE in 2009 and is currently being updated. Sandia National Laboratories (SNL) provided support for the original document, performing calculations and extracting data from the Yucca Mountain Performance Assessment Model that were used as inputs to the contaminant transport and dose calculations by Jason Associates Corporation, the primary developers of the DOE report. The inputs from SNL were documented in LSA-AR-037, Inputs to Jason Associates Corporation in Support of the Postclosure Repository Supplemental Environmental Impact Statement. To support the updating of the original Groundwater Impacts document, SNL has reviewed the inputs provided in LSA-AR-037 to verify that they are current and appropriate for use. The results of that assessment are documented here.

  4. Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy s National Nuclear Security Administration under contract DE-AC04-94AL85000.

    E-Print Network [OSTI]

    Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department Laboratories Albuquerque, NM 87185 Fusion Power Associates Annual Meeting and Symposium Washington, DC

  5. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    for the impacts of climate change on national security. Pagea warming world. Page 11 “Climate change acts as a threatand the Threat of Climate Change,” The CNA Corporation, 2007

  6. Do More Transparent Corporate Actions Following a Restatement Influence the SEC's Decision to Issue an Enforcement Action? 

    E-Print Network [OSTI]

    Files, Rebecca Lynn

    2010-10-12

    This study examines whether corporate transparency about a restatement influences the Securities and Exchange Commission's (SEC) decision to issue an enforcement action. I consider corporate transparency to be higher when firms initiate...

  7. Los Alamos National Security LLC Selected to Manage Los Alamos...

    Energy Savers [EERE]

    be the management and operations contractor for Los Alamos National Laboratory in New Mexico. Los Alamos National Security LLC is a limited liability corporation made up of...

  8. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01

    Analysis of Information Security Games, Proceedings of theon the Economics of Information Security WEIS’, Hanover, NH,on the Economics of Information Security’. Anderson, R. and

  9. Security Science & Technology | Nuclear Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Science & Technology Border Security Comprehensive Vulnerability and Threat Analysis Consequence Management, Safeguards, and Non-Proliferation Tools Export...

  10. Analysis to determine the maximum dimensions of flexible apertures in sensored security netting products.

    SciTech Connect (OSTI)

    Murton, Mark; Bouchier, Francis A.; vanDongen, Dale T.; Mack, Thomas Kimball; Cutler, Robert Paul; Ross, Michael P.

    2013-08-01

    Although technological advances provide new capabilities to increase the robustness of security systems, they also potentially introduce new vulnerabilities. New capability sometimes requires new performance requirements. This paper outlines an approach to establishing a key performance requirement for an emerging intrusion detection sensor: the sensored net. Throughout the security industry, the commonly adopted standard for maximum opening size through barriers is a requirement based on square inches-typically 96 square inches. Unlike standard rigid opening, the dimensions of a flexible aperture are not fixed, but variable and conformable. It is demonstrably simple for a human intruder to move through a 96-square-inch opening that is conformable to the human body. The longstanding 96-square-inch requirement itself, though firmly embedded in policy and best practice, lacks a documented empirical basis. This analysis concluded that the traditional 96-square-inch standard for openings is insufficient for flexible openings that are conformable to the human body. Instead, a circumference standard is recommended for these newer types of sensored barriers. The recommended maximum circumference for a flexible opening should be no more than 26 inches, as measured on the inside of the netting material.

  11. Transportation Secure Data Center: Real-World Data for Planning, Modeling, and Analysis (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2014-01-01

    This fact sheet describes the Transportation Secure Data Center (TSDC) - an NREL-operated resource that provides secure access to detailed GPS travel data for valuable research purposes in a way that protects original participant privacy.

  12. Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000.

    E-Print Network [OSTI]

    Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company Corporation, Albuquerque, NM, USA 15) EG&G, Albuquerque, NM, USA 16) Omicron, Albuquerque, NM, USA 17) Fusion #12;Z-Pinch is the newest of the three major drivers for IFE 1999 Snowmass Fusion Summer Study, IAEA

  13. Dartmouth Computer Science Technical Report TR2011-689 802.15.4/ZigBee Analysis and Security

    E-Print Network [OSTI]

    Dartmouth Computer Science Technical Report TR2011-689 802.15.4/ZigBee Analysis and Security: Tools layers of the 802.15.4 standard will be explored as well. #12;Contents 1 Introduction 1 1.1 What is ZigBee? . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 How is ZigBee used? . . . . . . . . . . . . . . . . . . . . . . . 1 1.3 Problem Statement

  14. Appendix D: Analysis of the Cap and Trade Features of the Lieberman-Warner Climate Security Act (S. 2191)

    E-Print Network [OSTI]

    D1 Appendix D: Analysis of the Cap and Trade Features of the Lieberman-Warner Climate Security Act of the Act's provisions as they relate to key features governing the cap-and-trade system, comparing results.1 A Changing Mix of Free Allocation and Auctioning....................................................... 13 D4

  15. System planning analysis applied to OTEC: initial cases by Florida Power Corporation. Task II report No. FC-5237-2

    SciTech Connect (OSTI)

    None

    1980-03-01

    The objective of the task was to exercise the FPC system planning methodology on: (1) Base Case, 10 year generation expansion plan with coal plants providing base load expansion, and (2) same, but 400 MW of OTEC substituting for coal burning units with equal resultant system reliability. OTEC inputs were based on reasonable economic projections of direct capital cost and O and M costs for first-generation large commercial plants. OTEC inputs discussed in Section 2. The Base Case conditions for FPC system planning methodology involved base load coal fueled additions during the 1980's and early 1990's. The first trial runs of the PROMOD system planning model substituted OTEC for 400 MW purchases of coal generated power during 1988-1989 and then 400 MW coal capacity thereafter. Result showed higher system reliability than Base Case runs. Reruns with greater coal fueled capacity displacement showed that OTEC could substitute for 400 MW purchases in 1988-1989 and replace the 800 MW coal unit scheduled for 1990 to yield equivalent system reliability. However, a 1995 unit would need to be moved to 1994. Production costing computer model runs were used as input to Corporate Model to examine corporate financial impact. Present value of total revenue requirements were primary indication of relative competitiveness between Base Case and OTEC. Results show present value of total revenue requirements unfavorable to OTEC as compared to coal units. The disparity was in excess of the allowable range for possible consideration.

  16. Corporate Headquarters 317 Route 104

    E-Print Network [OSTI]

    Firestone, Jeremy

    utilizing wind industry best practices, setbacks from residential and/or sensitive environmental areas areas to evaluate the shadow flicker impacts from the UD wind turbine. The receptors are representative@sed-net.com Sustainable Energy Developments, Inc. is a New York Corporation Founded April 2002 Shadow Flicker Analysis

  17. Office of Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  18. Corporate Culture | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouthReport for the t-) S/,,5 'a CConversion | National Nuclear

  19. Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy s National Nuclear Security Administration under contract DE-AC04-94AL85000.

    E-Print Network [OSTI]

    Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company85000. Status of Z-Pinch ICF ResearchStatus of Z-Pinch ICF Research Fusion Power Associates Meeting

  20. Are Securities Class Actions “Supplemental” to SEC Enforcement? An Empirical Analysis

    E-Print Network [OSTI]

    Klausner, Michael

    2008-01-01

    sufficient to consider class actions supplemental. FurtherParticipants Michael Klausner Class Action Paper I havewriting on whether securities class actions can be justified

  1. Corporate sustainability assessment methodology

    E-Print Network [OSTI]

    Pinchuk, Natallia

    2011-01-01

    Sustainability is a vague concept specifically in the context of a corporate world. There are numerous definitions for corporate sustainability and just as many ways of evaluating it. This work attempts to define, structure ...

  2. Essays on corporate bonds

    E-Print Network [OSTI]

    Bao, Jack (Jack C.)

    2009-01-01

    This thesis consists of three empirical essays on corporate bonds, examining the role of both credit risk and liquidity. In the first chapter, I test the ability of structural models of default to price corporate bonds in ...

  3. Indianapolis Public Transportation Corporation

    SciTech Connect (OSTI)

    Not Available

    2004-12-01

    Fact sheet describes the National Renewable Energy Laboratory's evaluation of Indianapolis Public Transportation Corporation's (IndyGo's) hybrid electric buses.

  4. CORPORATIONS APAC Tennessee Incorporated

    E-Print Network [OSTI]

    Dasgupta, Dipankar

    Business Resources Breast Cancer Eradication Initiative Incorporated Brother International Corporation Resources Incorporated ETI Corporation Corporate and Foundation Giving The University of Memphis is grateful Family of Companies KPMG Peat Marwick LLP Knox Music Incorporated Frank Ricks/Looney Ricks Kiss Lane

  5. Energy Independence and Security Act of 2007 Select News and Analysis

    E-Print Network [OSTI]

    Collins, Gary S.

    .txt.pdf SUMMARIES AND OVERVIEWS Summary of Major Provisions - Congressional Research Service (CRS) Report://www.eere.energy.gov/afdc/incentives_laws_security.html TESTIMONY, COMMENTS, AND ANALYSES: COALITIONS, TRADE ASSOCIATIONS, SCHOLARS, AND CONSULTANTS The following Independence and Security Act of 2007 - Environmental Protection Agency testimony to House Committee - May 6

  6. Transportation Secure Data Center: Real-world Data for Planning, Modeling, and Analysis (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2015-01-01

    The Transportation Secure Data Center (TSDC) at www.nrel.gov/tsdc provides free, web-based access to detailed transportation data from a variety of travel surveys conducted across the nation. While preserving the privacy of survey participants, this online repository makes vital transportation data broadly available to users from the comfort of their own desks via a secure online connection.

  7. Cyber Security Analysis of State Estimators in Electric Power Systems Andre Teixeira, Saurabh Amin, Henrik Sandberg, Karl H. Johansson, and Shankar S. Sastry

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    Cyber Security Analysis of State Estimators in Electric Power Systems Andr´e Teixeira, Saurabh Amin, Henrik Sandberg, Karl H. Johansson, and Shankar S. Sastry Abstract-- In this paper, we analyze the cyber security of state estimators in Supervisory Control and Data Acquisition (SCADA) systems operating in power

  8. A.O. Smith Corporation Response to Preliminary Plan for Retrospective...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A.O. Smith Corporation Response to Preliminary Plan for Retrospective Analysis of A.O. Smith Corporation Response to Preliminary Plan for Retrospective Analysis of A.O. Smith...

  9. Using Violation and Vulnerability Analysis to Understand the Root-Causes of Complex Security Incidents

    E-Print Network [OSTI]

    Johnson, Chris

    Department of Energy has also established the Information Security Resource Center to coordinate the `root 2003) highlighted several commercial initiatives to understand not simply what went wrong in any single the underlying `systemic' technical, managerial and organizational precursors. Unfortunately

  10. Food Security in Haiti After the 2010 Earthquake: Analysis and Evaluation of NGO Relief Efforts 

    E-Print Network [OSTI]

    McGaughey, Katie

    Haiti suffered an earthquake in January of 2010, bringing instability and widespread hunger. Even after two years, many Haitians lack food security, and one must look at the failings of the Haitian government and those who attempted to provide aid...

  11. Strategic philanthropy for cyber security : an extended cost-benefit analysis framework to study cybersecurity

    E-Print Network [OSTI]

    Cho, Yiseul

    2012-01-01

    The international climate of cyber security is dramatically changing and thus unpredictable. As such, agile yet sustainable solutions are needed, along with an effective and a pragmatic evaluation framework to assess and ...

  12. Security analysis of communication system based on the synchronization of different order chaotic systems

    E-Print Network [OSTI]

    G. Alvarez; L. Hernandez; J. Munoz; F. Montoya; Shujun Li

    2005-06-27

    This work analyzes the security weakness of a recently proposed communication method based on chaotic modulation and masking using synchronization of two chaotic systems with different orders. It is shown that its application to secure communication is unsafe, because it can be broken in two different ways, by high-pass filtering and by reduced order system synchronization, without knowing neither the system parameter values nor the system key.

  13. Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000.

    E-Print Network [OSTI]

    Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company85000. Progress on Z-Pinch Inertial Fusion Energy Craig L. Olson Sandia National Laboratories Albuquerque, NM 87185 USA 20th IAEA Fusion Energy Conference Vilamoura, Portugal 1-6 November 2004 RTL DH

  14. Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy s National Nuclear Security Administration under contract DE-AC04-94AL85000.

    E-Print Network [OSTI]

    Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company85000. Z-Pinch Inertial Fusion Energy Craig L. Olson + Z-IFE Team Sandia National Laboratories Albuquerque, NM 87185 Fusion Power Associates Annual Meeting and Symposium Washington, DC October 11-12, 2005

  15. Data Mining Group VNG Corporation

    E-Print Network [OSTI]

    Shahabi, Cyrus

    Data Mining Group VNG Corporation Data Mining Group_VNG Corporation 1 #12;Data Mining Group_VNG Corporation 2 1 ·Introduction 2 ·Edge Rank 3 ·Parameter Estimate 4 ·Conclusion #12;Data Mining Group_VNG Corporation 3 #12;Data Mining Group_VNG Corporation 4 #12; User's self activity Update status Write blogs

  16. Corporate Headquarters 317 Route 104

    E-Print Network [OSTI]

    Firestone, Jeremy

    Sustainable Energy Developments, Inc. is a New York Corporation Founded April 2002 Visualization Phone: (978) 422 7744 Sustainable Energy Developments, Inc. is a New York Corporation Founded Energy Developments, Inc. is a New York Corporation Founded April 2002

  17. CPSC 601.xx: Information Systems Security Analysis Statement of Ethical Considerations

    E-Print Network [OSTI]

    Locasto, Michael E.

    permission and informed consent of the system's owner. Ethical Hacking Principles Hacking is, unfortunately misuse of the special skills they possess. Similarly, hacking is a special technological skill that can the term "hacking" to refer to the skill to question security and trust assumptions expressed in software

  18. Energy Security Planning for Sustainable Buildings | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    capabilities are sufficient to serve their most critical needs during a prolonged outage. Energy Security Assessments For analysis and planning, see Performing Energy Security...

  19. Security analysis of RSA cryptosystem algorithm and it’s properties

    SciTech Connect (OSTI)

    Liu, Chenglian; Guo, Yongning E-mail: linjuanliucaihong@qq.com; Lin, Juan E-mail: linjuanliucaihong@qq.com

    2014-10-06

    The information technology rapidly development and dramatically changed the life style people, in addition to shortening the distance of communication, but also promote the smooth exchange of information flows. However, derivatives to facilitate the relative safety of these issues, since into the digital information age, the majority of the practitioners of engineering and technical personnel and technical workers in terms of technology, information security is increasingly becoming an important issue. The RSA algorithm was published in 1978. It is a kind of very popular and widely application modem cryptosystem in the world. Even though there are lots of articles to discuss about how to break the RSA, but it is still secure today. In this paper, the authors would like to introduce a variant attack to RSA.

  20. Transportation Secure Data Center: Real-World Data for Planning, Modeling and Analysis (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2013-01-01

    The National Renewable Energy Laboratory (NREL) and the U.S. Department of Transportation (DOT) have launched the free, web-based Transportation Secure Data Center (TSDC). The TSDC (www.nrel.gov/tsdc) preserves respondent anonymity while making vital transportation data available to a broad group of users through secure, online access. The TSDC database gives, metropolitan planning organizations, universities, national laboratories, air quality management districts, disaster planning agencies and auto manufacturers free-of-charge web-based access to valuable transportation data. The TSDC's two levels of access make composite data available with simple online registration, and allow researchers to use detailed spatial data after completing a straight forward application process.

  1. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01

    Analysis of electric grid security under terrorist threat’,and a guideline to smart grid security in NIST-IR 7628. Al-the current security posture of the power grid, (2) develop

  2. Rutgers Business School Corporate Finance

    E-Print Network [OSTI]

    Lin, Xiaodong

    Rutgers Business School Corporate Finance Fall 2014 Instructor: Vikram Nanda Office: 5186 to the basic and current research questions and methods ­ theoretical and empirical ­ in corporate finance areas in corporate finance. Among these: · Tirole, Corporate Finance · Finance Handbooks such as: Jarrow

  3. Antecedents of corporate volunteerism 

    E-Print Network [OSTI]

    Henning, Jaime Blaine

    2009-05-15

    with volunteering in general, few studies have examined variables beyond simple demographics, and fewer still have examined antecedents of corporate volunteering. In the current study, the theory of planned behavior, functional motives for volunteering...

  4. Island Wide Management Corporation

    Office of Legacy Management (LM)

    9 1986 Island Wide Management Corporation 3000 Marcus Avenue Lake Success, New York 11042 Dear Sir or Madam: I am sending you this letter and the enclosed information as you have...

  5. Economics definitions, methods, models, and analysis procedures for Homeland Security applications.

    SciTech Connect (OSTI)

    Ehlen, Mark Andrew; Loose, Verne William; Vargas, Vanessa N.; Smith, Braeton J.; Warren, Drake E.; Downes, Paula Sue; Eidson, Eric D.; Mackey, Greg Edward

    2010-01-01

    This report gives an overview of the types of economic methodologies and models used by Sandia economists in their consequence analysis work for the National Infrastructure Simulation&Analysis Center and other DHS programs. It describes the three primary resolutions at which analysis is conducted (microeconomic, mesoeconomic, and macroeconomic), the tools used at these three levels (from data analysis to internally developed and publicly available tools), and how they are used individually and in concert with each other and other infrastructure tools.

  6. Postal Security Device Security Policy

    E-Print Network [OSTI]

    Postal Security Device Security Policy FRAMA AG PSD - I Version: R01.06 Date: 25.05.2007 Doc.-ID: DE_FNKPSD_510_SPE File name: DE_FNKPSD_510_SPE_R0106_EN.Security Policy PSD Author: Bernd Zinke, Timo » Non-Confidential « #12;Security Policy FRAMA AG CH-3438 LAUPERSWIL / BERN TITLE: POSTAL SECURITY

  7. Implementing a Corporate Energy Management System | Department...

    Office of Environmental Management (EM)

    Implementing a Corporate Energy Management System Implementing a Corporate Energy Management System This presentation discusses 3M's experience with implementing a corporate energy...

  8. information security

    E-Print Network [OSTI]

    Faculty listing for "information security" ... 1167; Phone: +1 765 49-46022; Email: wagstaff@purdue.edu; Research Interests: number theory, information security.

  9. A Modular Security Analysis of the TLS Handshake Protocol P. Morrissey, N.P. Smart and B. Warinschi

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    master keys essentially transforms an arbitrary secure pre-master key agreement protocol into a secure master-key agreement protocol. Similarly, the transforma- tion used to derive application keys works when applied to an arbitrary secure master-key agreement protocol. These results are in the random oracle model

  10. Corporate Social Responsibility Practices and Financial Performance over Time for Selected U.S. Corporations 

    E-Print Network [OSTI]

    Phelan Ribera, Kelli Catherine

    2011-10-21

    .......................................................................................................... 71 5 Descriptive Statistics of CSR Variable, Product, from 1991-2002 ......... 71 6 Descriptive Statistics of CSR Variable, Corporate Governance, from 1991... of Price Volatility Analysis ............................................................ 121 44 Summary of Between Groups Main Effects Analysis for Level of Price Volatility...

  11. Teaching in computer security and privacy The Computer Laboratory's undergraduate and masters programmes

    E-Print Network [OSTI]

    Crowcroft, Jon

    computing security · Economics of cybercrime · Economics of information security · Formal methods · Hardware security · Location and positioning systems · Malware analysis · Medical information security · MobileTeaching in computer security and privacy The Computer Laboratory's undergraduate and masters

  12. Photonic spatial Bell-state analysis for robust quantum secure direct communication using quantum dot-cavity systems

    E-Print Network [OSTI]

    Bao-Cang Ren; Hai-Rui Wei; Ming Hua; Tao Li; Fu-Guo Deng

    2013-03-30

    Recently, experiments showed that the spatial-mode states of entangled photons are more robust than their polarization-mode states in quantum communications. Here we construct a complete and deterministic protocol for analyzing the spatial Bell states using the interaction between a photon and an electron spin in a charged quantum dot inside a one-side micropillar microcavity. A quantum nondemolition detector (QND) for checking the parity of a two-photon system can be constructed with the giant optical Faraday rotation in this solid state system. With this parity-check QND, we present a complete and deterministic proposal for the analysis of the four spatial-mode Bell states. Moreover, we present a robust two-step quantum secure direct communication protocol based on the spatial-mode Bell states and the photonic spatial Bell-state analysis. Our analysis shows that our BSA proposal works in both the strong and the weak coupling regimes if the side leakage and cavity loss rate is small.

  13. An Analysis of Security and Privacy Issues in Smart Grid Software Architectures on Yogesh Simmhan, Alok Gautam Kumbhare, Baohua Cao, and Viktor Prasanna

    E-Print Network [OSTI]

    Hwang, Kai

    An Analysis of Security and Privacy Issues in Smart Grid Software Architectures on Clouds Yogesh are increasingly upgrading to Smart Grids that use bi-directional communication with the consumer to enable an information-driven approach to distributed energy management. Clouds offer features well suited for Smart Grid

  14. 2009 IBM Corporation 2009 IBM Corporation IMS and Java

    E-Print Network [OSTI]

    1 © 2009 IBM Corporation© 2009 IBM Corporation IMS and Java for Application Modernization Barbara November 4-5, 2009 This presentation discusses use of IMS and Java to modernize your applications. #12;2 2 IMS © 2009 IBM Corporation Agenda Java basics IMS Java basics IMS Java Applications IMS Database

  15. 2014 Annual Workforce Analysis and Staffing Plan Report- Office of Environment, Health, Safety and Security

    Broader source: Energy.gov [DOE]

    Managers perform an annual workforce analysis of their organization and develop staffing plans that identify technical capabilities and positions they need to ensure safe operation of defense nuclear facilities.

  16. 2013 Annual Workforce Analysis and Staffing Plan Report- Office of Health, Safety and Security

    Broader source: Energy.gov [DOE]

    Managers perform an annual workforce analysis of their organization and develop staffing plans that identify technical capabilities and positions they need to ensure safe operation of defense nuclear facilities.

  17. Essays in Behavioral Corporate Finance

    E-Print Network [OSTI]

    Zheng, Hui

    2012-01-01

    and practice of corporate finance: evidence from the field,Journal of Applied Corporate Finance 15, 8–23. 18. Graham,governance, Journal of Finance 63, 2737–2784. 21. Hackbarth,

  18. A Framework for Secure Cloud-Empowered Mobile Biometrics

    E-Print Network [OSTI]

    Valenti, Matthew C.

    1 A Framework for Secure Cloud-Empowered Mobile Biometrics A. A framework for secure cloud biometrics 4. System analysis 5. Conclusion #12;3 3 for secure cloud biometrics 4. System analysis 5. Conclusion #12;4 4 Introduc

  19. EEE 4263 & 5263 Corporate Entrepreneurship

    E-Print Network [OSTI]

    5) Innovation at 3M Corporation, HBS 9-699-012 July 2002 6) IDEO Product Development, HBS 2007 9 of the overall corporate strategy to renew a company's product lines or services, or offer totally new products.H, Kuratko, D.F, and Covin, J.G., 2010 Corporate Entrepreneurship & Innovation, 3rd Edition, Cengage Learning

  20. IBM Research 2006 IBM Corporation

    E-Print Network [OSTI]

    Chen, Yuanzhu Peter

    IBM Research © 2006 IBM Corporation Who is the customer? Dinesh Verma IBM Thomas J Watson Research Center #12;IBM Research © 2006 IBM Corporation2 IWQoS 2006 Introduction QoS Research has been going is the customer for QoS? #12;IBM Research © 2006 IBM Corporation3 IWQoS 2006 QoS is the Answer- So What

  1. Security analysis of boolean algebra based on Zhang-Wang digital signature scheme

    SciTech Connect (OSTI)

    Zheng, Jinbin

    2014-10-06

    In 2005, Zhang and Wang proposed an improvement signature scheme without using one-way hash function and message redundancy. In this paper, we show that this scheme exits potential safety concerns through the analysis of boolean algebra, such as bitwise exclusive-or, and point out that mapping is not one to one between assembly instructions and machine code actually by means of the analysis of the result of the assembly program segment, and which possibly causes safety problems unknown to the software.

  2. Press Release Corporate Communications

    E-Print Network [OSTI]

    Reggelin, Michael

    Page: 1/2 Press Release Corporate Communications Karolinenplatz 5 D-64289 Darmstadt Germany Your.ch@pvw.tu- darmstadt.de Internet: http://www.tu- darmstadt.de/presse e-mail: presse@tu-darmstadt.de Winner. Press contact: Dr. Miriam Ronzoni Tel.: +49-(0)152­266­04064 e-mail: ronzoni@soz.uni-frankfurt.de PR

  3. Information Security: Coordination of Federal Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO...

  4. Information Security: Coordination of Federal Cyber Security...

    Office of Environmental Management (EM)

    Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

  5. SUPPLEMENT ANALYSIS DETERMINATION The Department of Energy (DOE), National Nuclear Security Administration (NNSA) Production Office

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterestedReplacement-2-AA-1 SECTION JSTEM-ing the Tide STEM-ingDepartment ofANALYSIS

  6. TRAJECTORY SENSITIVITY ANALYSIS FOR DYNAMIC SECURITY ASSESSMENT AND OTHER APPLICATIONS IN POWER SYSTEMS

    SciTech Connect (OSTI)

    Nguyen, Tony B.; Pai, M. A.

    2014-07-10

    Real time stability evaluation and preventive scheduling in power systems offer many challenges in a stressed power system. Trajectory sensitivity analysis (TSA) is a useful tool for this and other applications in the emerging smart grid area. In this chapter we outline the basic approach of TSA, to extract suitable information from the data and develop reliable metrics or indices to evaluate proximity of the system to an unstable condition. Trajectory sensitivities can be used to compute critical parameters such as clearing time of circuit breakers, tie line flow, etc. in a power system by developing suitable norms for ease of interpretation. The TSA technique has the advantage that model complexity is not a limitation, and the sensitivities can be computed numerically. Suitable metrics are developed from these sensitivities. The TSA technique can be extended to do preventive rescheduling. A brief discussion of other applications of TSA in placement of distributed generation is indicated.

  7. Climate-derived tensions in Arctic security.

    SciTech Connect (OSTI)

    Backus, George A.; Strickland, James Hassler

    2008-09-01

    Globally, there is no lack of security threats. Many of them demand priority engagement and there can never be adequate resources to address all threats. In this context, climate is just another aspect of global security and the Arctic just another region. In light of physical and budgetary constraints, new security needs must be integrated and prioritized with existing ones. This discussion approaches the security impacts of climate from that perspective, starting with the broad security picture and establishing how climate may affect it. This method provides a different view from one that starts with climate and projects it, in isolation, as the source of a hypothetical security burden. That said, the Arctic does appear to present high-priority security challenges. Uncertainty in the timing of an ice-free Arctic affects how quickly it will become a security priority. Uncertainty in the emergent extreme and variable weather conditions will determine the difficulty (cost) of maintaining adequate security (order) in the area. The resolution of sovereignty boundaries affects the ability to enforce security measures, and the U.S. will most probably need a military presence to back-up negotiated sovereignty agreements. Without additional global warming, technology already allows the Arctic to become a strategic link in the global supply chain, possibly with northern Russia as its main hub. Additionally, the multinational corporations reaping the economic bounty may affect security tensions more than nation-states themselves. Countries will depend ever more heavily on the global supply chains. China has particular needs to protect its trade flows. In matters of security, nation-state and multinational-corporate interests will become heavily intertwined.

  8. Benchmarking Corporate Energy Management 

    E-Print Network [OSTI]

    Norland, D. L.

    2001-01-01

    CORPORATE ENERGY MANAGEMENT Dr. Douglas L. Norland Director of Research and Industrial Programs Alliance to Save Energy Washington, DC ABSTRACT There is growing interest among energy managers in finding out how their company's energy management... procedures and perfonnance compare to that of other companies. Energy management involves everything from setting goals and targets to implementing best maintenance practices. This paper, however, discusses benchmarking energy management practices...

  9. Industrial Analytics Corporation

    SciTech Connect (OSTI)

    Industrial Analytics Corporation

    2004-01-30

    The lost foam casting process is sensitive to the properties of the EPS patterns used for the casting operation. In this project Industrial Analytics Corporation (IAC) has developed a new low voltage x-ray instrument for x-ray radiography of very low mass EPS patterns. IAC has also developed a transmitted visible light method for characterizing the properties of EPS patterns. The systems developed are also applicable to other low density materials including graphite foams.

  10. Introducing Abuse Frames for Analysing Security Requirements Luncheng Lin Bashar Nuseibeh Darrel Ince Michael Jackson Jonathan Moffett

    E-Print Network [OSTI]

    Nuseibeh, Bashar

    a focus for early security threat analysis. Traditional information security development methods haveIntroducing Abuse Frames for Analysing Security Requirements Luncheng Lin Bashar Nuseibeh Darrel using Jackson's Problem Frames to analyse security problems in order to determine security

  11. Corporate Environmental Performance and Lobbying

    E-Print Network [OSTI]

    Delmas, Magali A; Lim, Jinghui; Nairn-Birch, Nicholas

    2015-01-01

    Corporate America and environmental policy: How often doesfailure and the environmental policies of firms: Economicexemplified in the environmental policy context, where the

  12. Corporate Environmental Performance and Lobbying

    E-Print Network [OSTI]

    Delmas, Magali A; Lim, Jinghui; Nairn-Birch, Nicholas

    2015-01-01

    Corporate America and environmental policy: How often doesfailure and the environmental policies of firms: EconomicReview of Environmental Economics and Policy, 2: 240–260.

  13. Corporate Environmental Performance and Lobbying

    E-Print Network [OSTI]

    Delmas, Magali A; Lim, Jinghui; Nairn-Birch, Nicholas

    2015-01-01

    political activities on climate change. Business & Society,E. P. 2012. Influencing climate change policy: The effect ofvisibility on corporate climate change disclosure. Journal

  14. THE AEROSPACE CORPORATION

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouth DakotaRobbins and700, 1. .&. ' , c 1 1; -.ll 1 ' 1CORPORATION

  15. THE AEROSPACE CORPORATION

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouth DakotaRobbins and700, 1. .&. ' , c 1 1; -.ll 1 ' 1CORPORATION1

  16. THE AEROSPACE CORPORATION

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouth DakotaRobbins and700, 1. .&. ' , c 1 1; -.ll 1 'CORPORATION

  17. THE AEROSPACE CORPORATION

    Office of Legacy Management (LM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouth DakotaRobbins and700, 1. .&. ' , c 1 1; -.ll 1 'CORPORATION53

  18. Global Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    weapons from the James Martin center for Nonproliferation Studies Homeland Security Digital Library HSDL is the nation's premier research collection of open-source resources...

  19. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  20. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  1. IBM Research 2005 IBM Corporation

    E-Print Network [OSTI]

    Cascaval, Calin

    IBM Research © 2005 IBM Corporation HPC Challenge 2005 Awards Competition: UPC on BlueGene/L C. Cacaval, C. Barton, G. Almási, Y. Zheng, M. Farreras, P. Luk, R. Mak IBM Research and IBM SWG Toronto #12;IBM Research © 2005 IBM Corporation2 HPC Challenge Awards Competition Class 2 Nov. 15, 2005

  2. Policy Name: Information Security Policy Originating/Responsible Departments: Computing and Communication Services (CCS)

    E-Print Network [OSTI]

    Carleton University

    Policy Name: Information Security Policy Originating/Responsible Departments: Computing: Chief Information Officer (CIO) Corporate Archivist and Assistant Privacy Officer Introduction Records in all formats contain information that is vital to ongoing operations - for insuring accountability

  3. Shanghai Aerospace Industrial General Corporation aka Shanghai...

    Open Energy Info (EERE)

    Aerospace Industrial General Corporation aka Shanghai Academy of Spaceflight Technology Jump to: navigation, search Name: Shanghai Aerospace Industrial General Corporation (aka...

  4. LANL named 2010 top corporate volunteer organization

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2010 top corporate volunteer organization LANL named 2010 top corporate volunteer organization The Laboratory ranked ahead of dozens of other qualifying companies with 10,000 or...

  5. AmpluseCorporation.pdf | Department of Energy

    Office of Environmental Management (EM)

    AmpluseCorporation.pdf AmpluseCorporation.pdf More Documents & Publications BattelleVentures.pdf Commercializing Department of Energy Technologies: Success...

  6. Preliminary Notice of Violation, International Technology Corporation...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Technology Corporation - EA-1999-01 Preliminary Notice of Violation, International Technology Corporation - EA-1999-01 February 26, 1999 Issued to International Technology...

  7. Pacific Fuel Cell Corporation | Open Energy Information

    Open Energy Info (EERE)

    Fuel Cell Corporation Jump to: navigation, search Name: Pacific Fuel Cell Corporation Address: 26985 Lakeland Blvd. Place: Euclid, Ohio Zip: 44132 Sector: Buildings, Efficiency,...

  8. PROJECT PROFILE: Vermont Energy Investment Corporation (Solar...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Vermont Energy Investment Corporation (Solar Market Pathways) PROJECT PROFILE: Vermont Energy Investment Corporation (Solar Market Pathways) Title: Vermont Solar Development Plan...

  9. Transportation Secure Data Center: Real-World Data for Transportation Planning and Land Use Analysis (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2013-01-01

    The National Renewable Energy Laboratory (NREL) and the U.S. Department of Transportation (DOT) have launched the free, web-based Transportation Secure Data Center (TSDC). The TSDC (www.nrel.gov/tsdc) preserves respondent anonymity while making vital transportation data available to a broad group of users through secure, online access. The TSDC database provides free-of-charge web-based access to valuable transportation data that can be used for: Transit planning, Travel demand modeling, Homeland Security evacuation planning, Alternative fuel station planning, and Validating transportation data from other sources. The TSDC's two levels of access make composite data available with simple online registration, and allow researchers to use detailed spatial data after completing a straight forward application process.

  10. Safeguards and Security and Cyber Security RM

    Office of Environmental Management (EM)

    using security measures such as badging, pre-employment investigation and fitness for duty, training, and security awareness? Cyber Security CS-1 Has the project...

  11. Security systems engineering overview

    SciTech Connect (OSTI)

    Steele, B.J.

    1996-12-31

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).

  12. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  13. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    Information Security Group IY5512 Computer Security Part 7b: Windows securityPart 7b: Windows security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security Group) of Windows machines. 2 Information Security Group Objectives II · Focus on Active Directory, authentication

  14. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  15. Secure PVM

    SciTech Connect (OSTI)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  16. NNSA Corporate CPEP Process NNSA LOS ALAMOS NATIONAL SECURITY...

    National Nuclear Security Administration (NNSA)

    a positive review of the Lujan Center after a difficult recovery from an off-site contamination issue, and has received four R&D 100 Awards demonstrating the continued vibrancy...

  17. FY 2006 Sandia Corporation PER Summary | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia National 1 PAGE 1National

  18. FY 2008 Sandia Corporation PER Summary | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia National 1

  19. FY 2010 Sandia Corporation PER Summary | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia National 1NuclearNational NuclearNuclearFY

  20. FY 2011 Sandia Corporation PER Summary | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia National 1NuclearNationalNationalAdministration

  1. The Farm and Ranch Corporation

    E-Print Network [OSTI]

    Brints, Norman; Sartin, Marvin

    1980-01-01

    ......................................................... 12 Liquidation ................................................................ 12 The Farm and Ranch Corporation Norman Brints and Marvin Sartin* As the family farm or ranch grows in size and complexity, many farm operators are examining...

  2. Renewable Energy Tax Credit (Corporate)

    Broader source: Energy.gov [DOE]

    In addition, Kentucky corporate taxpayers may take a credit equal to $3 per watt (DC) of rated capacity for the installation of a photovoltaic (PV) system. Solar and wind technologies have a maxi...

  3. Sandia is a multi-program laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000 Microfabricated Surface Electrode Ion Tr

    E-Print Network [OSTI]

    Hensinger, Winfried

    , for the United States Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL

  4. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  5. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  6. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  7. Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D mSecurity Security

  8. AC 2012-4107: USING AMAZON EC2 IN COMPUTER AND NETWORK SECURITY LAB EXERCISES: DESIGN, RESULTS, AND ANALYSIS

    E-Print Network [OSTI]

    Yue, Chuan

    , AND ANALYSIS Dr. Chuan Yue, University of Colorado, Colorado Springs Chuan Yue is an Assistant Professor

  9. Special Analysis of the Area 3 Radioactive Waste Management Site at the Nevada National Security Site, Nye County, Nevada

    SciTech Connect (OSTI)

    National Security Technologies, LLC, Environmental Management

    2012-09-30

    This report describes the methods and results of a special analysis (SA) of the Area 3 Radioactive Waste Management Site (RWMS) on the Nevada National Security Site (NNSS). The purpose of the SA is to determine if the approved performance assessment (PA) and composite analysis (CA) (Shott et al., 2001) remain valid. The Area 3 RWMS PA and CA were prepared as a single document and received conditional approval on October 6, 1999. A conditional Disposal Authorization Statement (DAS) for the Area 3 RWMS was issued on October 20, 1999. Since preparation of the approved PA and CA, new information and additional environmental monitoring data have been used to update the PA and CA. At the same time, continual advancements in computer processors and software have allowed improvement to the PA and CA models. Annual reviews of the PA and CA required by U.S. Department of Energy (DOE) Order DOE O 435.1 have documented multiple changes occurring since preparation of the PA and CA. Potentially important changes include: Development of a new and improved baseline PA and CA model implemented in the probabilistic GoldSim simulation platform. A significant increase in the waste inventory disposed at the site. Revision and updating of model parameters based on additional years of site monitoring data and new research and development results. Although changes have occurred, many important PA/CA issues remain unchanged, including the site conceptual model, important features, events, and processes, and the points of compliance. The SA is performed to document the current status of the PA/CA model and to quantitatively assess the impact of cumulative changes on the PA and CA results. The results of the SA are used to assess the validity of the approved PA/CA and make a determination if revision of the PA or CA is necessary. The SA was performed using the Area 3 RWMS, version 2.102, GoldSim model, the current baseline PA/CA model. Comparison of the maximum SA results with the PA performance objectives indicates that there continues to be a reasonable expectation of compliance. The resident exposure scenario was evaluated for compliance with the air pathway and all-pathways annual total effective dose (TED) performance objectives. The maximum mean air pathway TED, 7E-6 millisievert (mSv) at 1,000 years (y) has decreased relative to the approved PA and is significantly less than the 0.1 mSv limit. The maximum mean all-pathways annual TED, 7E-5 mSv at 1,000 y has increased but remains a small fraction of the 0.25 mSv limit. The SA maximum mean radon-222 (222Rn) flux density, 0.03 becquerel per square meter per second (Bq m-2 s-1), has increased relative to the PA results but is significantly less than the 0.74 Bq m-2 s-1 limit. The SA results continue to support a conclusion that the disposed waste inventory is protective of intruders and groundwater resources. The maximum mean intruder TED, 0.01 mSv for an acute construction scenario at the U-3ah/at disposal unit, was less than the 5 mSv performance measure. Site monitoring data and research results continue to support a conclusion that a groundwater pathway will not exist within the 1,000 y compliance period. Projected releases to the environment are a small fraction of the performance objectives. Cost-effective options for reducing releases further are unlikely to exist. Therefore, releases from the Area 3 RWMS are judged to be as low as reasonably achievable. Comparison of the maximum CA result with the 0.3 mSv CA dose constraint indicates that no action is required to reduce the dose from the Area 3 RWMS and all interacting sources of residual radioactive contamination. The SA maximum mean CA annual TED, 0.02 mSv at 1,000 y, has increased from the approved CA result but remains less than 10% of the dose constraint. The CA TED continues to be due predominantly to inhalation of plutonium-239 resuspended from soils contaminated by nuclear weapons tests conducted near the Area 3 RWMS. The SA results estimated with the Area 3 RWMS version 2.102 model indicate that changes to the PA and CA do not

  10. Karnataka Power Corporation Limited and National Thermal Power...

    Open Energy Info (EERE)

    Karnataka Power Corporation Limited and National Thermal Power Corporation JV Jump to: navigation, search Name: Karnataka Power Corporation Limited and National Thermal Power...

  11. Steffes Corporation Smart Grid RFI: Addressing Policy and Logistical...

    Office of Environmental Management (EM)

    Steffes Corporation Smart Grid RFI: Addressing Policy and Logistical Challenges Steffes Corporation Smart Grid RFI: Addressing Policy and Logistical Challenges Steffes Corporation...

  12. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio August 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Security

  13. INSTITUTE FOR CYBER SECURITY Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio August-world impact #12;INSTITUTE FOR CYBER SECURITY Institute for Cyber Security Founded June 2007: still in start

  14. NSM Secure UI Crypto Module Security Policy

    E-Print Network [OSTI]

    NSM Secure UI Crypto Module Security Policy Version: 1.4 Revision Date: April 1, 2010 This document. #12;McAfee, Inc NSM Secure UI Crypto Module Security Policy Page 2 of 15 CHANGE RECORD Revision Date Module Security Policy Page 3 of 15 Contents 1 Module Overview

  15. Security for grids

    E-Print Network [OSTI]

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-01-01

    differences between Grid security and host or site securityof requirements for Grid security in order to achieve thecompletely. Index Terms — Grid security, authentication,

  16. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  17. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  18. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6. Canceled by Admin Chg 2 dated 5-15-15.

  19. Improving the Security of Android Inter-Component Communication

    E-Print Network [OSTI]

    California at Los Angeles, University of

    Improving the Security of Android Inter-Component Communication Adam Cozzette, Kathryn Lingel 91711 The Aerospace Corporation El Segundo, CA Abstract--In the Android operating system, each undesired behavior. We prevented these exploits by modifying Android's Intent handling behavior to err

  20. Development of the SEA Corporation Powergrid{trademark} photovoltaic concentrator

    SciTech Connect (OSTI)

    Kaminar, N.; Curchod, D.; Daroczi, S.; Walpert, M.; Sahagian, J.; Pepper, J. [Photovoltaics International, LLC, Sunnyvale, CA (United States)

    1998-03-01

    This report covers the three phase effort to bring the SEA Corporation`s Powergrid{trademark} from the concept stage to pilot production. The three phases of this contract covered component development, prototype module development, and pilot line production. The Powergrid is a photovoltaic concentrator that generates direct current electricity directly from sunlight using a linear Fresnel lens. Analysis has shown that the Powergrid has the potential to be very low cost in volume production. Before the start of the project, only proof of concept demonstrations of the components had been completed. During the project, SEA Corporation developed a low cost extruded Fresnel lens, a low cost receiver assembly using one sun type cells, a low cost plastic module housing, a single axis tracking system and frame structure, and pilot production equipment and techniques. In addition, an 800 kW/yr pilot production rate was demonstrated and two 40 kW systems were manufactured and installed.

  1. Essays in Corporate Finance

    E-Print Network [OSTI]

    Syron, Erin Elizabeth

    2010-01-01

    ment,” The Journal of Finance, 42(2), 1097–1102. Dechow, P.Analysis,” Journal of Finance, 53(1), 27–64. Palmrose, Z. -Accounting, Auditing and Finance, Forthcoming. Beneish, M.

  2. Analysis of operations and cyber security policies for a system of cooperating Flexible Alternating Current Transmission System (FACTS) devices.

    SciTech Connect (OSTI)

    Phillips, Laurence R.; Tejani, Bankim; Margulies, Jonathan; Hills, Jason L.; Richardson, Bryan T.; Baca, Micheal J.; Weiland, Laura

    2005-12-01

    Flexible Alternating Current Transmission Systems (FACTS) devices are installed on electric power transmission lines to stabilize and regulate power flow. Power lines protected by FACTS devices can increase power flow and better respond to contingencies. The University of Missouri Rolla (UMR) is currently working on a multi-year project to examine the potential use of multiple FACTS devices distributed over a large power system region in a cooperative arrangement in which the FACTS devices work together to optimize and stabilize the regional power system. The report describes operational and security challenges that need to be addressed to employ FACTS devices in this way and recommends references, processes, technologies, and policies to address these challenges.

  3. The Sealion Corporation- 2011 Project

    Broader source: Energy.gov [DOE]

    The Sea Lion Corporation (SLC), an Alaska Native Claims Settlement Act village corporation, is to conduct an energy efficiency feasibility study with the goal to create jobs by providing funding to train staff to be energy raters as well as weatherization/energy conservation technicians that specialize in building construction and energy savings technologies; and to conduct a feasibility study that demonstrates a 30% reduction in residential/commercial energy usage and identify the economic benefits of implementing energy efficiency measures to the tribe.

  4. Verenium Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to:EA EISTJThin FilmUnitedVairex CorporationVerenium Corporation Jump to:

  5. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  6. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  7. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  8. Faculty Information Security Guide

    E-Print Network [OSTI]

    Faculty Information Security Guide Dartmouth Your information is vitally important to your teaching protect your information. THE DARTMOUTH INFORMATION SECURITY COMMITTEE The Dartmouth Information Security Committee (DISC) meets monthly to assess vulnerabilities of information security, and to develop and revise

  9. SELECTING INFORMATION TECHNOLOGY SECURITY

    E-Print Network [OSTI]

    April 2004 SELECTING INFORMATION TECHNOLOGY SECURITY PRODUCTS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Information technology security prod ucts are essential to better secure infor mation technology (IT) systems

  10. The Market for Borrowing Corporate Bonds

    E-Print Network [OSTI]

    Asquith, Paul

    This paper describes the market for borrowing corporate bonds using a comprehensive data set from a major lender. The cost of borrowing corporate bonds is comparable to the cost of borrowing stock, between 10 and 20 basis ...

  11. Beyond Compliance: Integrating Nonproliferation into Corporate Sustainability

    SciTech Connect (OSTI)

    Hund, Gretchen; Kurzrok, Andrew J.

    2013-06-01

    This paper investigates nonproliferation as a potential corporate sustainability value. It reviews the history of corporate sustainability, builds the case for nonproliferation as a sustainability value, and develops recommendations for the integration of nonproliferation into the frameworks of sustainability.

  12. Developing a Corporate Water Management Strategy 

    E-Print Network [OSTI]

    Tutterow, V.

    2015-01-01

    MANAGEMENT STRATEGY Vestal Tutterow Senior Technical Consultant (o) 703.748.7248 Vestal.tutterow@ppc.com June 4, 2015 PPC | Developing a Corporate Water Management Strategy 1 PRESENTATION OUTLINE PPC | Developing a Corporate Water Management Strategy 2...

  13. Corporate governance : the case for Asian REITs

    E-Print Network [OSTI]

    Tan, Denise, S.M. Massachusetts Institute of Technology

    2009-01-01

    At the entity level, the design of sound corporate governance mechanisms is critical for REITs that are preparing to go public. At the industry level, issues of transparency and corporate governance are consequential to ...

  14. Corporate Real Estate and Facilities Cost Reduction IBM Corporation | December 2, 2009 Page 1 of 7

    E-Print Network [OSTI]

    Corporate Real Estate and Facilities Cost Reduction © IBM Corporation | December 2, 2009 Page 1 of 7 - Internal distribution only Corporate Real Estate and Facilities Cost Reduction Summary By moving and facilities costs by 15-20%, whilst still improving services. Successful cost reduction in corporate real

  15. Energy Conservation in China North Industries Corporation 

    E-Print Network [OSTI]

    You, W. T.; De, C. H.; Chu, J. X.; Fu, L. R.

    1985-01-01

    IN CHINA NORTH INDUSTRIES CORPORATION Wang Tian You, Chen Hua De, Jing Xing Chu, Ling Rui Fu, China North Industries Corporation Beijing, People's Republic of China ABSTRACT This paper describes an overview of the energy conservation in China... North Industries Corporation. It shows how the corporation improves energy effi ciencies and how it changes constitution of fuel-- converting oil consumption to coal. Energy management organization, energy balance in plants and several specific...

  16. Mastermind Session: Wisconsin Energy Conservation Corporation...

    Broader source: Energy.gov (indexed) [DOE]

    Peer Exchange Call: Program Sustainability Mastermind Session, featuring host Brian Driscoll, Wisconsin Energy Conservation Corporation. Call Slides and Discussion Summary,...

  17. Product Information Management 2004 IBM Corporation

    E-Print Network [OSTI]

    Brock, David

    Product Information Management © 2004 IBM Corporation Intelligent Networks MIT Smart World 2004 Center © 2004 IBM Corporation2 Networks are both clusters of computers and clusters of people! We now use © 2004 IBM Corporation3 Three looks into Intelligent Networks Global Data Synchronization Electronic

  18. Hindawi Publishing Corporation Prostate Cancer

    E-Print Network [OSTI]

    Ahn, Hongshik

    Hindawi Publishing Corporation Prostate Cancer Volume 2011, Article ID 176164, 7 pages doi:10.1155/2011/176164 Clinical Study Effect of Zoledronic Acid on Bone Mineral Density in Men with Prostate Cancer Receiving cancer is well recognized. We assessed the effects of quarterly infusion of zoledronic acid on bone

  19. Nuclear security

    SciTech Connect (OSTI)

    Not Available

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected.

  20. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W. (Albuquerque, NM)

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  1. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. (The original DOE O 471.6 canceled DOE M 470.4-4A, except for Section D). Admin Chg 2, dated 5-15-15, supersedes Admin Chg 1. Certified 5-21-2015.

  2. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security's IT Security Procedures require that non-public University information, including social security numbers and professional information in a secure and appropriate manner. #12;

  3. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  4. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  5. Digital Disaster, Cyber Security, and the Copenhagen School

    E-Print Network [OSTI]

    Nissenbaum, Helen

    Digital Disaster, Cyber Security, and the Copenhagen School Lene Hansen University of Copenhagen and Helen Nissenbaum New York University This article is devoted to an analysis of cyber security, a concept is devoted to an analysis of ``cyber security,'' a concept that arrived on the post-Cold War agenda

  6. 2014 Headquarters Facilities Master Security Plan- Chapter 14, Cyber Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security Describes the DOE Headquarters Cyber Security Program.

  7. Sandia Corporate Ombuds Office

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput Analysis ofSample SULI Program StudentSandiaCOMMUNITY MEMBERS Sandia's

  8. Sandia Corporate Ombuds Office

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput Analysis ofSample SULI Program StudentSandiaCOMMUNITY MEMBERS

  9. Sandia Corporate Ombuds Office

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput Analysis ofSample SULI Program StudentSandiaCOMMUNITY MEMBERSWHAT GUIDES

  10. 2014 Headquarters Facilities Master Security Plan- Chapter 3, Personnel Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security Describes DOE Headquarters Personnel Security procedures for acquiring, maintaining, and passing security clearances.

  11. Using Operational Security (OPSEC) to Support a Cyber Security...

    Energy Savers [EERE]

    Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

  12. Sandia Corporation (Albuquerque, NM)

    DOE Patents [OSTI]

    Ewsuk, Kevin G. (Albuquerque, NM); Arguello, Jr., Jose G. (Albuquerque, NM)

    2006-01-31

    A method of designing a primary geometry, such as for a forming die, to be used in a powder pressing application by using a combination of axisymmetric geometric shapes, transition radii, and transition spaces to simulate the geometry where the shapes can be selected from a predetermined list or menu of axisymmetric shapes and then developing a finite element mesh to represent the geometry. This mesh, along with material properties of the component to be designed and powder, is input to a standard deformation finite element code to evaluate the deformation characteristics of the component being designed. The user can develop the geometry interactively with a computer interface in minutes and execute a complete analysis of the deformation characteristics of the simulated component geometry.

  13. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 supersedes DOE O 472.2 Admin Chg 1.

  14. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 cancels DOE O 472.2 Admin Chg 1.

  15. BASF Corporate Energy Management Process 

    E-Print Network [OSTI]

    Geiger, T.

    2014-01-01

    North America 6 ESL-IE-14-05-30 Proceedings of the Thrity-Sixth Industrial Energy Technology Conference New Orleans, LA. May 20-23, 2014 7Management Commitment Assess Performance & Set Goals Implement Action Plan Create Action Plan Recognize... Optimization (EM) 2009 Compressed Air Optimization (EM) 2009 Energy Efficiency Program (EM) Recognition: American Chemistry Council Responsible Care® Energy Efficiency Awards 2009 Corporate Energy Efficiency Improvement Goal 2010 Geismar Ethylene Oxide Plant...

  16. Corporate Exemption | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, Alabama (Utility Company)| Open(Evans,Oregon:Volcano, HawaiiCorporate Depreciation

  17. Software Security Checklist for the Software Life Cycle David P. Gilliam, Thomas L. Wolfe, Josef S. Sherif

    E-Print Network [OSTI]

    Bishop, Matt

    Software Security Checklist for the Software Life Cycle David P. Gilliam, Thomas L. Wolfe, Josef S@cs.ucdavis.edu Abstract A formal approach to security in the software life cycle is essential to protect corporate resources. However, little thought has been given to this aspect of software development. Traditionally

  18. Software Security Checklist for the Software Life Cycle David P. Gilliam, Thomas L. Wolfe, Josef S. Sherif

    E-Print Network [OSTI]

    Bishop, Matt

    Software Security Checklist for the Software Life Cycle David P. Gilliam, Thomas L. Wolfe, Josef S A formal approach to security in the software life cycle is essential to protect corporate resources. However, little thought has been given to this aspect of software development. Traditionally, software

  19. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Infrastructure Demonstration for Energy reliability and Security) (web link) program to demonstrate: · Cyber-securityEnergy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security

  20. A brief history of Sandia's National security missions.

    SciTech Connect (OSTI)

    Drewien, Celeste A.; O'Canna, Myra Lynn; Stikar, John Anthony.

    2014-09-01

    To help members of the workforce understand what factors contribute to Sandia National Laboratories national security mission, the authors describe the evolution of Sandias core mission and its other mission components. The mission of Sandia first as a division of Los Alamos and later as Sandia Corporation underlies our core nuclear weapon mission of today. Sandias mission changed in 1963 and twice more in the 1970s. This report should help staff and management appreciate the need for mission evolution. A clear definition and communication of a consistent corporate mission statement is still needed.

  1. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia, and reactorsystemoverviews. Training in Action: Gulf Nuclear Energy InfrastructureInstitute In2011,SandiateamedwiththeNuclearSecurity energy safety, security,safeguards,andnonproliferation. Training Sandia National Laboratories experts

  2. Designing security into software

    E-Print Network [OSTI]

    Zhang, Chang Tony

    2006-01-01

    When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

  3. Sandia National Laboratories is seeking applicants for the President Harry S. Truman Fellowship (in National Security Science and Engineering). Candidates for this position are expected to have solved a

    E-Print Network [OSTI]

    Siefert, Chris

    National Security Science and Engineering). Candidates for this position are expected to have solved Sandia's national security mission. The appointee is expected to foster creativity and to stimulate Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE

  4. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  5. Security | Department of Energy

    Office of Environmental Management (EM)

    Security Security Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top...

  6. Advancing Global Nuclear Security

    Broader source: Energy.gov [DOE]

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  7. NEC Corporation Volkswagen Group of America

    E-Print Network [OSTI]

    FELLOWS Cisco Intel NEC Corporation Volkswagen Group of America RESEARCH CONTRACTS AND SPECIAL Univision Viacom Volkswagen Group of America, Inc. VSP Global Welspun ENDOWMENT AND NAMING GRANTS Asahi

  8. BARNSTEAD|THERMOLYNE CORPORATION High Temperature

    E-Print Network [OSTI]

    Walker, D. Greg

    1 BARNSTEAD|THERMOLYNE CORPORATION High Temperature Muffle Furnace OPERATION MANUAL AND PARTS LIST ....................................................................................................................................................13 Furnace Connection: .........................................................................................................................13 General Operation of Furnace

  9. Resources, real options, and corporate strategy

    E-Print Network [OSTI]

    Bernardo, Antonio; Chowdhry, Bhagwan

    1998-01-01

    211–234 Resources, real options, and corporate strategy $D83; G30; G31 Keywords: Real options; Valuation; Corporateparticipants at the Real Options Conference at Northwestern

  10. Comments of North American Electric Reliability Corporation ...

    Office of Environmental Management (EM)

    RFI. North American Electric Reliability Corporation (NERC) More Documents & Publications City Utilities of Springfield Missouri Comments on Smart Grid RFI: Addressing Policy and...

  11. Corporate Performance Measures Definitions | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Corporate Performance Measures Plutonium Metal or Oxide packaged for long-term storage (number of containers): Certified DOE storagetreatmentdisposal (STD) 3013 containers (or...

  12. PPP Equipment Corporation | Open Energy Information

    Open Energy Info (EERE)

    PPP Equipment Corporation Sector: Solar Product: PPP-E designs, produces and markets Chemical Vapor Deposition (CVD) reactors and converter systems producing high-purity...

  13. DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY

    SciTech Connect (OSTI)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

  14. A Declarative Framework for Security: Secure Concurrent Constraint Programming

    E-Print Network [OSTI]

    Valencia, Frank D.

    Javeriana Cali {halopez,japerez,crueda}@cic.puj.edu.co 2 INRIA and LIX École Polytechnique catuscia in the analysis of security protocols and one promising approach is the development of formalisms that model and implementations for CCP have been developed: E.g., denotational models [SRP91], specification logics and proof

  15. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput AnalysisSinkholeCapabilities GeneralWake-ImagingNotSecurity Home

  16. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput AnalysisSinkholeCapabilities GeneralWake-ImagingNotSecurity Home

  17. BASF Corporate Energy Management Process 

    E-Print Network [OSTI]

    Geiger, T.

    2015-01-01

    .E.M Vice President, Energy and Verbund Management Industrial Energy Technology Conference June 4, 2015 1 Proceedings of the Thrity-Seventh Industrial Energy Technology Conference New Orleans, LA. June 2-4, 2015 ESL-IE-15-06-42 150 years Corporate Energy... Technology Conference New Orleans, LA. June 2-4, 2015 ESL-IE-15-06-42 150 years • The world’s leading chemical company • Serves all major industries • 380 production facilities including six Verbund sites • World-class, innovative, high-value products...

  18. Terrawatt Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Information Serbia-EnhancingEt Al., 2013) | Opensource HistoryTerraWatt Power JumpCorporation Jump to:

  19. Emcore Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, AlabamaETEC GmbH JumpEllenville, New York: EnergyElyria, Ohio: EnergyEmcore Corporation

  20. Ennovate Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, AlabamaETEC GmbH JumpEllenville, NewLtdEnergypedia JumpEnhancedEnnovate Corporation

  1. Itochu Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas: Energy ResourcesOrder at 8,Open EnergyIssaquah, Washington:Itochu Corporation Jump

  2. Octillion Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History ViewMayo, Maryland:NPI VenturesNewSt. Louis,EnergyOctillion Corporation Jump to: navigation, search

  3. Odyne Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History ViewMayo, Maryland:NPI VenturesNewSt. Louis,EnergyOctillion Corporation Jump to:Odessa,

  4. Pemery Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History ViewMayo, Maryland:NPIProtectio Program |ViewIllinois: EnergyPelham, NewPemery Corporation Jump to:

  5. Ember Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LISTStar2-0057-EA Jump to:of theClimateElgin, Illinois: EnergyEllergreenCorporation

  6. Arzeda Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LISTStar Energy LLC Jump to: navigation,Summaries |AreteArianeEnergyArzeda Corporation

  7. Kirmart Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OFAMERICA'SHeavyAgency (IRENA) Jump to: navigation,WindJustKirmart Corporation

  8. Arete Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LISTStar Energy LLC Jump to: navigation,Summaries |Arete Corporation Jump to:

  9. Liquafaction Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LISTStar2-0057-EAInvervarLeeds, UnitedLiberty PowerLineLiquafaction Corporation Jump

  10. NEO Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop Inc Jump to: navigation,Mereg GmbHMontebalitoMtMxEnergyDatabaseNEO Corporation

  11. Hilti Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LISTStar2-0057-EA JumpDuimen River PowerHeckertHidrotermica JumpPowerHilti Corporation

  12. Ryuseki Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop Inc Jump to:Newberg,EnergyEastCarbon Development | Open EnergyRyuseki Corporation

  13. Tokuyama Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop Inc JumpHeterInformation PolicyTinna Group Jump to:Tokuyama Corporation Place:

  14. Sipex Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to:EA EIS ReportEurope GmbH Jump to:Idaho-Utah |Renovables SCRSipex Corporation

  15. Synapsense Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to:EA EIS ReportEuropeEnergySustainabilitySynapsense Corporation Jump to:

  16. TDK Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to:EA EIS ReportEuropeEnergySustainabilitySynapsenseSyracuse,TDK Corporation

  17. Ultralife Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to:EA EISTJThin Film SolarTown(LECBP)BioGen LLCANDUltimate Best BuyCorporation

  18. Vairex Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmental Jump to:EA EISTJThin FilmUnitedVairex Corporation Jump to: navigation, search Name:

  19. Carbona Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION JEnvironmentalBowerbank,Cammack Village, Arkansas:Fund for Spanish FirmsCarbona Corporation Jump

  20. Corporate Depreciation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, Alabama (Utility Company)| Open(Evans,Oregon:Volcano, HawaiiCorporate Depreciation Jump

  1. ISE Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIXsource History View NewGuam:on Openei | Open Energy2010) |OutlookINDEXISE Corporation

  2. ZTEK Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoop IncIowa (UtilityMichigan) JumpZhuyuan Electric Development Co LtdZZTEK Corporation

  3. CDI Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX ECoopButte County, California: Energy Resources Jump to:Information72CDI Corporation

  4. corporate | netl.doe.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorkingLos AlamosSimulation Initiative7 BoundarycontainersconvertCorporate

  5. Kenetech Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OFAMERICA'SHeavyAgency (IRENA) Jump to: navigation,WindJust WindCorporation Jump

  6. Statement by Harvard Corporation Committee on Shareholder Responsibility (CCSR) Regarding Stock in China Petroleum and Chemical Corporation (Sinopec Corporation)

    E-Print Network [OSTI]

    , Petrodar announced that its first shipment of crude oil would be shipped from Sudan in January 2006Statement by Harvard Corporation Committee on Shareholder Responsibility (CCSR) Regarding Stock the Harvard Corporation's decision to direct Harvard Management Company (HMC) to divest itself of stock held

  7. EA-356 J.P. Morgan Commodities Canada Corporation | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    EA-356 J.P. Morgan Commodities Canada Corporation EA-356 J.P. Morgan Commodities Canada Corporation Order authorizing J.P. Morgan Commodities Canada Corporation to export electric...

  8. Analysis of the optical coupling of wavelength-shifting fibers to organic liquid scintillator filled fluoropolymer tubes for industrial and nuclear security applications

    E-Print Network [OSTI]

    Schools, Chad C

    2014-01-01

    Industrial and nuclear security applications continue to push radiation detection development into new and exciting frontiers. In this work, an innovative detection module is developed and tested for use in a cosmic ray ...

  9. Faculty Information Security Guide

    E-Print Network [OSTI]

    Myers, Lawrence C.

    society. www.ists.dartmouth.edu THE DARTMOUTH CYBER SECURITY INITIATIVE The Dartmouth Cyber Security, TECHNOLOGY, AND SOCIETY THE DARTMOUTH CYBER SECURITY INITIATIVE #12;The number of laptop thefts at Dartmouth, and Society; and the Dartmouth Cyber Security Initiative offer the following solutions: · Whole

  10. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  11. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  12. Is Sustainability Attractive for Corporate Real Estate

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Is Sustainability Attractive for Corporate Real Estate Decisions ? Research Center ESSEC Working Is Sustainability Attractive for Corporate Real Estate Decisions? Ingrid Nappi-Choulet Professor ESSEC BUSINESS SCHOOL Real Estate and Sustainable Development Chair nappi@essec.fr Aurélien Décamps Researcher ESSEC

  13. 2011 IBM Corporation Computer system energy management

    E-Print Network [OSTI]

    Shi, Weisong

    © 2011 IBM Corporation Computer system energy management Charles Lefurgy 28 July 2011 #12;© 2011 IBM Corporation2 Outline A short history of server power management POWER7 EnergyScale AMESTER power management 2010: POWER7 uses DDR3 self-refresh mode POWER7 with Turbo mode Partition-aware power capping 2011

  14. Corporate Training On-Site Online Global

    E-Print Network [OSTI]

    Barrett, Jeffrey A.

    MAKE THE RIGHT MOVE Corporate Training On-Site · Online · Global IMPROVE YOUR COMPETITIVE ADVANTAGE WITH WORLD-CLASS ON-SITE AND ONLINE SOLUTIONS TAILORED TO MEET YOUR BUSINESS AND EMPLOYEE TRAINING NEEDS a competitive advantage depends on how well your staff executes. UCIrvineExtension's Corporate Training helps

  15. The MITRE Corporation 7515 Colshire Drive

    E-Print Network [OSTI]

    Tritium JASON The MITRE Corporation 7515 Colshire Drive McLean, Virginia 22102-7508 (703) 983 ORGANIZATION REPORT NUMBER The MITRE Corporation JASON Program Office 7515 Colshire Drive McLean, Virginia of tritium per year of operation which must be bred as part of the overall reactor cycle. Traditionally

  16. Comments of New England Electric Transmission Corporation on...

    Office of Environmental Management (EM)

    out of time and comments of New England Electric Transmission Corporation, New England Hydro-Transmission Electric Company, Inc. and New England Hydro-Transmission Corporation and...

  17. EA-1631: Beacon Power Corporation Frequency Regulation Facility...

    Office of Environmental Management (EM)

    1: Beacon Power Corporation Frequency Regulation Facility in Stephentown, NY EA-1631: Beacon Power Corporation Frequency Regulation Facility in Stephentown, NY February 2, 2009...

  18. IT Capital Planning Corporate Management Improvement Program (CMIP)

    Broader source: Energy.gov [DOE]

    The Corporate Management Improvement Program (CMIP) was initiated by the Department in recognition of the fact that corporate legacy systems that support administrative functions were nearing the...

  19. Sylvania Corporation, Hicksville, NY and Bayside, NY - Addendum...

    Energy Savers [EERE]

    NY - Addendum to July 8, 2004 Sylvania Corporation, Hicksville, NY and Bayside, NY - Addendum to July 8, 2004 Sylvania Corporation, Hicksville, NY and Bayside, NY - Addendum to...

  20. Trony Solar Corporation formerly Shenzhen Trony Science Technology...

    Open Energy Info (EERE)

    Trony Solar Corporation formerly Shenzhen Trony Science Technology Development Co Ltd Jump to: navigation, search Name: Trony Solar Corporation (formerly Shenzhen Trony Science &...

  1. New York State Electric & Gas Corporation Smart Grid Demonstration...

    Open Energy Info (EERE)

    New York State Electric & Gas Corporation Smart Grid Demonstration Project Jump to: navigation, search Project Lead New York State Electric & Gas Corporation Country United States...

  2. EA-1727: AE Polysilicon Corporation Polysilicon Production Facility...

    Office of Environmental Management (EM)

    7: AE Polysilicon Corporation Polysilicon Production Facility in Fairless Hills, PA EA-1727: AE Polysilicon Corporation Polysilicon Production Facility in Fairless Hills, PA...

  3. Shenyang Huachuang Wind Energy Corporation HCWE aka China Creative...

    Open Energy Info (EERE)

    Shenyang Huachuang Wind Energy Corporation HCWE aka China Creative Wind Energy Co Ltd Jump to: navigation, search Name: Shenyang Huachuang Wind Energy Corporation (HCWE) (aka China...

  4. Special Analysis for the Disposal of the Neutron Products Incorporated Sealed Source Waste Stream at the Area 5 Radioactive Waste Management Site, Nevada National Security Site, Nye County, Nevada

    SciTech Connect (OSTI)

    Shott, Gregory

    2014-08-31

    The purpose of this special analysis (SA) is to determine if the Neutron Products Incorporated (NPI) Sealed Sources waste stream (DRTK000000056, Revision 0) is suitable for disposal by shallow land burial (SLB) at the Area 5 Radioactive Waste Management Site (RWMS). The NPI Sealed Sources waste stream consists of 850 60Co sealed sources (Duratek [DRTK] 2013). The NPI Sealed Sources waste stream requires a special analysis (SA) because the waste stream 60Co activity concentration exceeds the Nevada National Security Site (NNSS) Waste Acceptance Criteria (WAC) Action Levels.

  5. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    management (in yellow). Data and knowledge management is an essential element of any long-term rD&D program National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear

  6. Page 1Securing the Microsoft Cloud Securing the

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Page 1Securing the Microsoft Cloud Securing the Microsoft Cloud #12;Page 2Securing the Microsoft to have confidence in Microsoft as their preferred cloud provider. Our security policies and practices their security and compliance related needs. Securing the Microsoft Cloud #12;Page 3Securing the Microsoft Cloud

  7. Common Cyber Security Vulnerabilities Observed in Control System...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Systems (September 2011) Vulnerability Analysis of Energy Delivery Control Systems - 2011 Lessons Learned from Cyber Security Assessments of SCADA and Energy Management Systems...

  8. Performance Assessment and Recommendations for Rejuvenation of a Permeable Reactive Barrier: Cotter Corporation’s Cańon City, Colorado, Uranium Mill

    Broader source: Energy.gov [DOE]

    Performance Assessment and Recommendations for Rejuvenation of a Permeable Reactive Barrier: Cotter Corporation’s Canon City, Colorado, Uranium Mill (April 2005)

  9. Nuclear Security Summit | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Summit | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  10. Building Extensible and Secure Networks

    E-Print Network [OSTI]

    Popa, Lucian

    2011-01-01

    adoption of cloud computing is security, as customers oftenpreserving security when migrating to the cloud computingto the security principals used in the cloud access control

  11. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    for Environment and National Security Scripps Institution ofMultiplying Threats to National Security Higher temperaturesefforts to protect national security. Page 2 The U.S. Armed

  12. Sandia Energy - Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessment Home Climate & Earth Systems WaterEnergy Nexus Water Monitoring & Treatment Technology Security Risk Assessment Security Risk Assessmentcwdd2015-05-04T21:...

  13. 1 1999 Rational Software Corporation The View from the Front

    E-Print Network [OSTI]

    Demurjian, Steven A.

    1 ©1999 Rational Software Corporation 3/7/99 R UML The View from the Front James Rumbaugh 9 March 1999 Rational Software Corporation #12; 2 ©1999 Rational Software Corporation 3/7/99 R Evolution Start 1/95 UML 1.3 RTF report 4/99 OMG feedback #12; 3 ©1999 Rational Software Corporation 3/7/99 R UML

  14. Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES

    E-Print Network [OSTI]

    Newby, Gregory B.

    Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES Gregory B. Newby School an active role in information security. INTRODUCTION By most accounts, the proliferation of the Internet of information security, making concrete recommendations for safeguarding information and information access

  15. UNIVERSITY OF OKLAHOMA BOND ISSUE TAX CODE AND SECURITIES LAW COMPLIANCE

    E-Print Network [OSTI]

    Oklahoma, University of

    -1- UNIVERSITY OF OKLAHOMA BOND ISSUE TAX CODE AND SECURITIES LAW COMPLIANCE POLICY I. GENERAL The University of Oklahoma, a body corporate and politic, and instrumentality of the State of Oklahoma ("University of Oklahoma") duly created and existing pursuant to [Title 73 O.S. §§151 et seq., / Title 60

  16. UNIVERSITY OF OKLAHOMA BOND ISSUE TAX CODE AND SECURITIES LAW COMPLIANCE

    E-Print Network [OSTI]

    Oklahoma, University of

    UNIVERSITY OF OKLAHOMA BOND ISSUE TAX CODE AND SECURITIES LAW COMPLIANCE POLICY I. GENERAL The University of Oklahoma, a body corporate and politic, and instrumentality of the State of Oklahoma ("University of Oklahoma") duly created and existing pursuant to [Title 73 O.S. §§151 et seq., / Title 60

  17. ORNL/TM-2006/505 The Oil Security Metrics Model

    E-Print Network [OSTI]

    Benefits of DOE's Energy Efficiency and Renewable Energy R&D Programs May 2006 David L. Greene Corporate AND RENEWABLE ENERGY R&D PROGRAMS David L. Greene Oak Ridge National Laboratory National Transportation Research SECURITY AND ENERGY TECHNOLOGY R&D ......................................................13 5. THE COSTS

  18. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  19. INFRASTRUCTURE SECURITY & ENERGY

    E-Print Network [OSTI]

    Schrijver, Karel

    INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Real Time Monitoring of Energy Infrastructure Status Patrick Willging, PE Office of Electricity Delivery and Energy Reliability #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY

  20. nevada national security site

    National Nuclear Security Administration (NNSA)

    7%2A en Nevada National Security Site operator recognized for green fleet http:www.nnsa.energy.govblognevada-national-security-site-operator-recognized-green-fleet

    The...

  1. Refundable Clean Heating Fuel Tax Credit (Corporate)

    Broader source: Energy.gov [DOE]

    The state of New York began offering a corporate income tax credit for biodiesel purchases used for residential space heating and water heating beginning in 2006. The original credit was authorized...

  2. Alternative Energy Development Incentive (Corporate) (Utah)

    Broader source: Energy.gov [DOE]

    The Alternative Energy Development Incentive (AEDI) is a post-performance non-refundable tax credit for 75% of new state tax revenues (including, state, corporate, sales and withholding taxes) over...

  3. Harvard University Corporation Committee on Shareholder Responsibility

    E-Print Network [OSTI]

    Schrag, Daniel

    environmental practices (including company efforts to address global warming); human rights; equal employment shareholders. Shareholder proposals addressing corporate governance matters are decided by the Harvard to issues of social responsibility. New topics addressed in 2011 included the environmental risks

  4. Essays on the Market for Corporate Control 

    E-Print Network [OSTI]

    Kim, Hyunjung

    2011-02-22

    This dissertation examines the relative importance of the information effect on corporate takeover in total takeover gains. It develops the measure of information effect based on the residual income valuation model with ...

  5. ArchRock Corporation | Open Energy Information

    Open Energy Info (EERE)

    Arch Rock is a systems and software company that builds products and technology for wireless sensor networks. References: ArchRock Corporation1 This article is a stub. You can...

  6. 3M's Corporate Approach to Energy Management 

    E-Print Network [OSTI]

    Schultz, S. C.; Bingham, P. R.

    2000-01-01

    number of companies have recognized the benefits of developing structured approaches to improving their energy efficiency through means that are also compatible with being environmentally responsible. 3M has long been recognized as a corporate...

  7. Spreadsheet Programming Robin Abraham, Microsoft Corporation

    E-Print Network [OSTI]

    Erwig, Martin

    Spreadsheet Programming Robin Abraham, Microsoft Corporation Margaret Burnett, Oregon State University Martin Erwig, Oregon State University Spreadsheets are among the most widely used programming first discuss how spreadsheet programs are actually functional programs. We then describe concepts

  8. Essays on consumption cycles and corporate finance

    E-Print Network [OSTI]

    Issler, Paulo Floriano

    2013-01-01

    In: The Journal of Finance 41.1, pp. 19–37. Flannery, Markand practice of corporate finance: evidence from the field”.Issues”. In: Journal of Finance 51.5, pp. 1809–33. Hamilton,

  9. Security system signal supervision

    SciTech Connect (OSTI)

    Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  10. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  11. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    Pew Project on National Security, Energy and Climate http://of climate change, energy security and economic stability.DoD is improving U.S. energy security and national security.

  12. Corporate Reporting of Boiler MACT Energy Assessments 

    E-Print Network [OSTI]

    McClain, C.

    2013-01-01

    , but not recordkeeping and reporting costs. Estimating/projected number of affected units Summary of Total Capital and Annual Cost for the New and Existing Sources for the Final Amended Rule Federal Register Volume 78 No. 21 January 31, 2013 40 CFR Part 63 EPA... Orleans, LA. May 21-24, 2013 What are the benefits of Corporate Management? Benefits of Corporate Management EMRS and Boiler MACT Implementation ? Scarce resource management ? Mill Scheduling ? Uniform implementation ? Uniform reporting ESL-IE-13...

  13. Secure Core Contact Information

    E-Print Network [OSTI]

    Secure Core Contact Information C. E. Irvine irvine@nps.edu 831-656-2461 Department of Computer for the secure management of local and/or remote information in multiple contexts. The SecureCore project Science Graduate School of Operations and Information Sciences www.cisr.nps.edu Project Description

  14. Information Security Guide

    E-Print Network [OSTI]

    Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

  15. cyber security guru

    E-Print Network [OSTI]

    Sandhu, Ravi

    cyber security guru By: Virginia Scott Posted: 4/17/07 UTSA has received a grant from the Texas Emerging Fund to create an institute for cyber security research. According to UTSA industry and educational initiatives in Texas. The creation of UTSA's Institute for Cyber Security Research

  16. Process Security Analysis: -Analysis and -Map

    E-Print Network [OSTI]

    Huang, Yinlun

    Dimitriadis et al., 1996; Dowell, 1998 . Correspondence concerning this article should be addressed to Y. L

  17. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W.

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  18. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  19. Secure sequential transmission of quantum information

    E-Print Network [OSTI]

    Kabgyun Jeong; Jaewan Kim

    2015-01-19

    We propose a quantum communication protocol that can be used to transmit any quantum state, one party to another via several intermediate nodes, securely on quantum communication network. The scheme makes use of the sequentially chained and approximate version of private quantum channels satisfying certain commutation relation of $n$-qubit Pauli operations. In this paper, we study the sequential structure, security analysis, and efficiency of the quantum sequential transmission (QST) protocol in depth.

  20. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security.cuny.edu Published: November 2014 Holiday Season Phishing Scams and Malware Campaigns CUNY/CIS Information Security.cuny.edu under "CUNY Issued Security Advisories" Visit the Federal Trade Commission's Consumer Information page

  1. INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY

    E-Print Network [OSTI]

    Subramanian, Sriram

    - 1 ­ INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable ­ INFORMATION SECURITY POLICY.doc Introduction Why Information Security? The access, availability

  2. Information Security Governance: When Compliance Becomes more Important than Security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Information Security Governance: When Compliance Becomes more Important than Security Terence Tan1 information security must adapt to changing conditions by extending security governance to middle management for implementing information security are more interested in complying with organizational standards and policies

  3. GAANN -Computer Systems Security GAANN Computer Systems Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important is critical October 7, 2009 GAANN ­ Computer Systems Security 1 #12;GAANN - Computer Systems Security

  4. Federated Cloud Security Architecture for Secure and Agile Clouds

    E-Print Network [OSTI]

    Xu, Shouhuai

    Federated Cloud Security Architecture for Secure and Agile Clouds Weiliang Luo, Li Xu, Zhenxin Zhan. This chapter introduces the novel federated cloud security architecture that includes proactive cloud defense technologies for secure and agile cloud development. The federated security architecture consists of a set

  5. Where computer security meets national security1 Helen Nissenbaum

    E-Print Network [OSTI]

    Nissenbaum, Helen

    of International Relations. Key words: cyber-security, computer security, securitization Introduction OverWhere computer security meets national security1 Helen Nissenbaum Department of Culture conceptions of security in contemporary concerns over the vulnerability of computers and networks to hostile

  6. Towards Secure Information Sharing Models for Community Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu, Ram Krishnan and Gregory B. White Institute for Cyber Security University of Texas at San Antonio #12;Secure Information ­ Security mechanisms such as authentication, cryptography, trusted hardware, etc. #12;Community Cyber

  7. Grid Information Security Functional Requirement - Fulfilling Information Security of a Smart Grid System

    E-Print Network [OSTI]

    Ling, Amy Poh Ai; 10.5121/ijgca.2011.2201

    2011-01-01

    This paper describes the background of smart information infrastructure and the needs for smart grid information security. It introduces the conceptual analysis to the methodology with the application of hermeneutic circle and information security functional requirement identification. Information security for the grid market cover matters includes automation and communications industry that affects the operation of electric power systems and the functioning of the utilities that manage them and its awareness of this information infrastructure has become critical to the reliability of the power system. Community benefits from of cost savings, flexibility and deployment along with the establishment of wireless communications. However, concern revolves around the security protections for easily accessible devices such as the smart meter and the related communications hardware. On the other hand, the changing points between traditional versus smart grid networking trend and the information security importance on...

  8. Implementing Advances in Transport Security Technologies | Department...

    Office of Environmental Management (EM)

    Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies More...

  9. Automatic Proofs of Privacy of Secure Multi-Party Computation Protocols Against

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Automatic Proofs of Privacy of Secure Multi-Party Computation Protocols Against Active Adversaries.pettai@ut.ee, peeter.laud@cyber.ee Abstract We describe an automatic analysis to check secure multiparty computation

  10. Fact Sheet on Sandia Corporation PNOV

    Broader source: Energy.gov (indexed) [DOE]

    Preliminary Notice of Violation: Sandia Sled Track Incident June 2010 On June 1, 2010, the National Nuclear Security Administration (NNSA) issued a Preliminary Notice of Violation...

  11. Cyber Security & Smart Grid 

    E-Print Network [OSTI]

    Shapiro, J.

    2011-01-01

    and interoperability ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Vulnerabilities In The Legacy Power Grid ? SCADA Security ? Supervisory Control and Data Acquisition (SCADA) systems are used extensively to control and monitor the national... & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart Grid Networks...

  12. EnerVault Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, AlabamaETEC GmbH JumpEllenville, New York:CorporationEnerGeneticsEnerVault Corporation

  13. Supervisory Industrial Security Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as the Deputy Assistant Manager for Safeguards, Security, and Emergency Management sharing the overall responsibility for execution of the...

  14. Oil Security Metrics Model

    SciTech Connect (OSTI)

    Greene, David L.; Leiby, Paul N.

    2005-03-06

    A presentation to the IWG GPRA USDOE, March 6, 2005, Washington, DC. OSMM estimates oil security benefits of changes in the U.S. oil market.

  15. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  16. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:www.nnsa.energy.govaboutusourprogramsnuclearsecurity

  17. Natlonal Nuclear Security Admlnlstratlon

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Natlonal Nuclear Security Admlnlstratlon Washington, DC 20585 January 18, 2007 OFFICE OF THE ADMINISTRATOR MEMORANDUM FOR The Deputy Secretary FROM: SUBJECT: Linton F. Brooks...

  18. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Washington, DC 20585 MEMORANDUM FOR THE ADMINISTRATOR FROM: THEODORE D. SHERRY II 4 flA. * -. SUBJECT: REFERENCE: NATIONAL SECURITY ENTI's'E FIELD COUNCIL CHAIR ACTION:...

  19. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    30 nonprofit organizations to receive monetary donations from Los Alamos National Security, LLC June 25, 2012 Recognizing employee and retiree volunteer efforts LOS ALAMOS, NEW...

  20. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01

    Information and communication systems’ securityTrust: An Element of Information Security,” in Security andInternational Journal of Information Security, vol. 4, pp.

  1. August 2003 IT SECURITY METRICS

    E-Print Network [OSTI]

    August 2003 IT SECURITY METRICS Elizabeth B. Lennon, Editor Information Technology Laboratory approach to measuring information security. Evaluating security at the sys tem level, IT security metrics and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

  2. Cloud Security by Max Garvey

    E-Print Network [OSTI]

    Tolmach, Andrew

    Cloud Security Survey by Max Garvey #12;Cloudy Cloud is Cloudy What is the cloud? On Demand Service, performance SECaaS - Cloud hosted security measures Certifications - measurements for cloud security. #12;Cloud Questions If you have $0 security budget, could cloud be a security improvement? Who owns the data

  3. Security Division 2007 Annual Report

    E-Print Network [OSTI]

    research programs. These programs, which include Cyber Security, Pervasive Information TechnologiesComputer Security Division 2007 Annual Report #12;TAble of ConTenTS Welcome Division Organization The Computer Security Division Responds to the Federal Information Security Management Act of 2002 Security

  4. Corporate Energy Management: A Survey of Large Manufacturing Companies 

    E-Print Network [OSTI]

    Norland, D. L.; Lind, L.

    2000-01-01

    Corporate practices regarding energy management vary substantially from one company to another. Some companies pay close attention to energy use throughout the corporation while others pay scant attention. This paper first describes what we call...

  5. Corporate Entrepreneurship programs : practices and their implications in developing economies

    E-Print Network [OSTI]

    Teran, Marco (Marco A. Teran Aguilar)

    2012-01-01

    Corporate Entrepreneurship is driven by external demands and internal leadership. However, this process is difficult to implement in firms because it often conflicts with the core of corporate activities and the accumulated ...

  6. THE INTERFACE BETWEEN ENVIRONMENTAL ASSESSMENT AND CORPORATE RESPONSIBILITY: THE

    E-Print Network [OSTI]

    THE INTERFACE BETWEEN ENVIRONMENTAL ASSESSMENT AND CORPORATE RESPONSIBILITY: THE VICTOR DIAMOND Report No: 436 Title of Research Project: The Interface Between Environmental Assessment and Corporate: ___________________________________________ #12;iii ABSTRACT The environmental assessment and sustainable development literature recognizes

  7. 2014 Headquarters Facilities Master Security Plan- Chapter 1, Physical Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security Describes DOE Headquarters Physical Security procedures related to badges, inspections, access controls, visitor controls, and removal of government property.

  8. Headquarters Facilities Master Security Plan - Chapter 10, Security...

    Office of Environmental Management (EM)

    be completed each year by all those who hold a security clearance; and the Security Termination Briefing, which is conducted when a person no longer requires a security clearance....

  9. Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop

    SciTech Connect (OSTI)

    Sheldon, Frederick T; Krings, Axel; Yoo, Seong-Moo; Mili, Ali; Trien, Joseph P

    2006-01-01

    The workshop theme is Cyber Security: Beyond the Maginot Line Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglected or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyberspace including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more . . .

  10. Euroweb 2002 --The Web and the GRID: from e-science to e-business 1 Model based Security Risk Analysis for Web

    E-Print Network [OSTI]

    Střlen, Ketil

    for risk analysis of critical systems and semiformal modelling methods. In this paper we provide to system modelling and risk analysis, where the architecture expressed in the information system model is used to guide the combined application of risk analysis techniques. This need is being addressed

  11. Multi-GPU Computing for Achieving Speedup in Real-time Aggregate Risk Analysis Center for Security, Theory and Algorithmic Research

    E-Print Network [OSTI]

    Rau-Chaplin, Andrew

    Multi-GPU Computing for Achieving Speedup in Real-time Aggregate Risk Analysis A. K. Bahl Center.whiteway@dal.ca Abstract--Stochastic simulation techniques employed for portfolio risk analysis, often referred to as Aggregate Risk Analysis, can benefit from exploiting state-of-the-art high- performance computing platforms

  12. May 21, 2004 2004 IBM Corporation Panel Discussion WWW 2004

    E-Print Network [OSTI]

    May 21, 2004 © 2004 IBM Corporation Panel Discussion WWW 2004 Kamal Bhattacharya IBM T. J. Watson Research Center Yorktown Heights, NY 10598 kamalb@us.ibm.com #12;© 2004 IBM Corporation Some Observations as low a possible #12;© 2004 IBM Corporation Some Observations (cont.) § The business owners define

  13. Standard Performance Evaluation Corporation info@spec.org

    E-Print Network [OSTI]

    Llanos, Diego R.

    ResultCopyright 2006 Standard Performance Evaluation Corporation Sti Tecnologias de la Informacion IntelCopyright 2006 Standard Performance Evaluation Corporation Sti Tecnologias de la Informacion Intel Core 2 Duo Standard Performance Evaluation Corporation Sti Tecnologias de la Informacion Intel Core 2 Duo 6300 SPECfp

  14. Standard Performance Evaluation Corporation info@spec.org

    E-Print Network [OSTI]

    Llanos, Diego R.

    ResultCopyright 2006 Standard Performance Evaluation Corporation Sti Tecnologias de la Informacion IntelCopyright 2006 Standard Performance Evaluation Corporation Sti Tecnologias de la Informacion Intel Core 2 Duo SPEC CINT2006 ResultCopyright 2006 Standard Performance Evaluation Corporation Sti Tecnologias de la

  15. Standard Performance Evaluation Corporation info@spec.org

    E-Print Network [OSTI]

    Llanos, Diego R.

    ResultCopyright 2006 Standard Performance Evaluation Corporation Sti Tecnologias de la Informacion IntelCopyright 2006 Standard Performance Evaluation Corporation Sti Tecnologias de la Informacion Intel Core 2 Duo Performance Evaluation Corporation Sti Tecnologias de la Informacion Intel Core 2 Duo 6300 SPECfp2006

  16. Standard Performance Evaluation Corporation info@spec.org

    E-Print Network [OSTI]

    Llanos, Diego R.

    ResultCopyright 2006 Standard Performance Evaluation Corporation Sti Tecnologias de la Informacion Intel Performance Evaluation Corporation Sti Tecnologias de la Informacion Intel Core 2 Duo 6300 SPECint2006://www.spec.org/ Page 2 SPEC CINT2006 ResultCopyright 2006 Standard Performance Evaluation Corporation Sti Tecnologias

  17. Standard Performance Evaluation Corporation info@spec.org

    E-Print Network [OSTI]

    Llanos, Diego R.

    ResultCopyright 2006 Standard Performance Evaluation Corporation Sti Tecnologias de la Informacion Intel2006 ResultCopyright 2006 Standard Performance Evaluation Corporation Sti Tecnologias de la Informacion Evaluation Corporation Sti Tecnologias de la Informacion Intel Core 2 Duo 6300 SPECfp2006 = Not Run SPECfp

  18. Standard Performance Evaluation Corporation info@spec.org

    E-Print Network [OSTI]

    Llanos, Diego R.

    ResultCopyright 2006 Standard Performance Evaluation Corporation Sti Tecnologias de la Informacion IntelCopyright 2006 Standard Performance Evaluation Corporation Sti Tecnologias de la Informacion Intel Core 2 Duo2006 ResultCopyright 2006 Standard Performance Evaluation Corporation Sti Tecnologias de la Informacion

  19. Standard Performance Evaluation Corporation info@spec.org

    E-Print Network [OSTI]

    Llanos, Diego R.

    ResultCopyright 2006 Standard Performance Evaluation Corporation Sti Tecnologias de la Informacion Intel Performance Evaluation Corporation Sti Tecnologias de la Informacion Intel Core 2 Duo 6300 SPECfp2006://www.spec.org/ Page 3 SPEC CFP2006 ResultCopyright 2006 Standard Performance Evaluation Corporation Sti Tecnologias de

  20. Standard Performance Evaluation Corporation info@spec.org

    E-Print Network [OSTI]

    Llanos, Diego R.

    ResultCopyright 2006 Standard Performance Evaluation Corporation Sti Tecnologias de la Informacion Intel Corporation Sti Tecnologias de la Informacion Intel Core 2 Duo 6300 SPECint2006 = Not Run SPECint_base2006://www.spec.org/ Page 2 SPEC CINT2006 ResultCopyright 2006 Standard Performance Evaluation Corporation Sti Tecnologias

  1. Standard Performance Evaluation Corporation info@spec.org

    E-Print Network [OSTI]

    Llanos, Diego R.

    ResultCopyright 2006 Standard Performance Evaluation Corporation Sti Tecnologias de la Informacion Intel2006 ResultCopyright 2006 Standard Performance Evaluation Corporation Sti Tecnologias de la Informacion Performance Evaluation Corporation Sti Tecnologias de la Informacion Intel Core 2 Duo 6300 SPECfp2006

  2. Standard Performance Evaluation Corporation info@spec.org

    E-Print Network [OSTI]

    Llanos, Diego R.

    ResultCopyright 2006 Standard Performance Evaluation Corporation Sti Tecnologias de la Informacion Intel Evaluation Corporation Sti Tecnologias de la Informacion Intel Core 2 Duo 6300 SPECint2006 = Not Run SPECint SPEC CINT2006 ResultCopyright 2006 Standard Performance Evaluation Corporation Sti Tecnologias de la

  3. Standard Performance Evaluation Corporation info@spec.org

    E-Print Network [OSTI]

    Llanos, Diego R.

    ResultCopyright 2006 Standard Performance Evaluation Corporation Sti Tecnologias de la Informacion Intel Evaluation Corporation Sti Tecnologias de la Informacion Intel Core 2 Duo 6300 SPECint2006 = Not Run SPECint://www.spec.org/ Page 2 SPEC CINT2006 ResultCopyright 2006 Standard Performance Evaluation Corporation Sti Tecnologias

  4. Standard Performance Evaluation Corporation info@spec.org

    E-Print Network [OSTI]

    Llanos, Diego R.

    ResultCopyright 2006 Standard Performance Evaluation Corporation Sti Tecnologias de la Informacion Intel Corporation Sti Tecnologias de la Informacion Intel Core 2 Duo 6300 SPECint2006 = Not Run SPECint_base2006Copyright 2006 Standard Performance Evaluation Corporation Sti Tecnologias de la Informacion Intel Core 2 Duo

  5. Corporate social responsibility and its impact on the corporate decision-making process for university undergraduate research fellows 

    E-Print Network [OSTI]

    Bain, Joseph E

    2013-02-22

    This study seeks to answer the question, "How does corporate social responsibility (CSR) influence corporate decision making?" It does so in two steps. The first step is the building of a theoretical framework in order ...

  6. Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you not findGeoscience/EnvironmentGlobal Security Global Security We

  7. Of Enterprise Principles & Corporate Groups: Does Corporate Law Reach Human Rights?

    E-Print Network [OSTI]

    Harper Ho, Virginia E.

    2013-03-01

    In recent years, a number of international and cross-sectoral initiatives have attempted to respond to the human rights impacts of corporations. Foremost among these is the United Nations’ 2008 “Protect, Respect, and Remedy” ...

  8. M&Ms4Graphs: Multi-scale, Multi-dimensional Graph Analytics Tools for Cyber-Security

    E-Print Network [OSTI]

    M&Ms4Graphs: Multi-scale, Multi-dimensional Graph Analytics Tools for Cyber-Security Objective We-of-Networks Framework for Cyber Security." IEEE Intelligence and Security Informatics, 2013. 2. "Towards a Multiscale. "Statistical and Hierarchical Graph Analysis for Cyber Security." SIAM Conference on Discrete Mathematics

  9. Hindawi Publishing Corporation Comparative and Functional Genomics

    E-Print Network [OSTI]

    Newcastle upon Tyne, University of

    Hindawi Publishing Corporation Comparative and Functional Genomics Volume 2007, Article ID 47304, 7 pages doi:10.1155/2007/47304 Meeting Report eGenomics: Cataloguing Our Complete Genome Collection III, Michigan State University, East Lansing, MI 48824, USA 3 The Institute for Genomic Research, 9712 Medical

  10. Corporate Venture Capital (CVC) Seeking Innovation and

    E-Print Network [OSTI]

    Corporate Venture Capital (CVC) Seeking Innovation and Strategic Growth Recent patterns in CVCRoberts, Professor of Management of Technology, Sloan School of Management, Massachusetts Institute of Technology ValLivada, Research Fellow, Sloan School of Management, Massachusetts Institute of Technology AndrewWang, Economist

  11. Hindawi Publishing Corporation Journal of Nanotechnology

    E-Print Network [OSTI]

    Wang, Yan Alexander

    Hindawi Publishing Corporation Journal of Nanotechnology Volume 2010, Article ID 801789, 42 pages a general interest in both fundamental and practical nanotechnology. Over the past 20 years, research's -orbital axis vector (POAV) #12;2 Journal of Nanotechnology (0,0) (1,0) (2,0) (3,0) (4,0) (5,0) (1,1) (2

  12. Security tasks are highly interdependent.

    E-Print Network [OSTI]

    Exchange of Information Develop security tools that: · Integrate information from different communication channels · Provide flexible reporting (reports adapted to the recipient) · Communicate security information Security practitioners perform many activities: · Information exchanged in different formats across

  13. Security Cases | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Cases Security Cases RSS June 19, 2015 PSH-15-0011 - In the Matter of Personnel Security Hearing On June 19, 2015, an OHA Administrative Judge (AJ) issued a decision in...

  14. Computer Security Incident Handling Guide

    E-Print Network [OSTI]

    Computer Security Incident Handling Guide Recommendationsof the National Institute of Standards Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD Tom Millar United States Computer Emergency Readiness Team National Cyber Security Division

  15. Security Policy: Radio Network Controller

    E-Print Network [OSTI]

    Security Policy: Radio Network Controller Encryption Module Controller (RNC EMC) Cryptographic, 2007 Security Policy: RNC EMC Page 1 of 22 #12;Security Policy: RNC EMC Page 2 of 22 #12;Table...........................................................14 7. IDENTIFICATION AND AUTHENTICATION POLICY

  16. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  17. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  18. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  19. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Supersedes DOE P 470.1.

  20. CIOs Uncensored: Security Smarts.

    SciTech Connect (OSTI)

    Johnson, Gerald R.

    2008-02-25

    This commentary for the CIOs Uncensored section of InformationWeek will discuss PNNL’s “defense in depth” approach to cyber security. It will cover external and internal safeguards, as well as the all-important role of employees in the cyber security equation. For employees are your greatest vulnerability – and your last line of defense.

  1. Engineering secure software 

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01

    -the-fact fixes in the form of software patches. The root causes for security problems in software are explored. A survey of research attempts at engineering secure software is presented. The techniques discussed range from those that are very similar...

  2. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  3. Abstract--On the one hand, the challenge of meeting various security requirements in the mobile and wireless environment is

    E-Print Network [OSTI]

    Kranakis, Evangelos

    and mobile IP tunnels can be reduced so that real-time delay constraints can be meet. Index Terms-- Mobility of optimizing routes taken by virtual private network (VPN) tunnels and avoiding renegotiation of IP security communications can be provided using an IPSec tunnel between MN1, in the corporate network, to MN2

  4. Structural Models and Endogeneity in Corporate Finance: The Link Between Managerial Ownership and Corporate Performance

    E-Print Network [OSTI]

    Coles, Jeffrey L.; Lemmon, Michael L.; Meschke, Felix

    2012-01-01

    Jeffrey L. Coles Arizona State University (ASU) - Finance Department Michael L. Lemmon University of Utah - Department of Finance Felix Meschke University of Kansas - Finance Area This version: April 14, 2011 Paper citation: Jeffrey L.... Coles, Michael L. Lemmon, J. Felix Meschke, Structural models and endogeneity in corporate finance: The link between managerial ownership and corporate performance, Journal of Financial Economics, Volume 103, Issue 1, January 2012, Pages 149-168, ISSN...

  5. International Nuclear Security

    SciTech Connect (OSTI)

    Doyle, James E.

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  6. Special Analysis for the Disposal of the Idaho National Laboratory Unirradiated Light Water Breeder Reactor Rods and Pellets Waste Stream at the Area 5 Radioactive Waste Management Site, Nevada National Security Site, Nye County, Nevada

    SciTech Connect (OSTI)

    Shott, Gregory [NSTec

    2014-08-31

    The purpose of this special analysis (SA) is to determine if the Idaho National Laboratory (INL) Unirradiated Light Water Breeder Reactor (LWBR) Rods and Pellets waste stream (INEL103597TR2, Revision 2) is suitable for disposal by shallow land burial (SLB) at the Area 5 Radioactive Waste Management Site (RWMS). The INL Unirradiated LWBR Rods and Pellets waste stream consists of 24 containers with unirradiated fabricated rods and pellets composed of uranium oxide (UO2) and thorium oxide (ThO2) fuel in zirconium cladding. The INL Unirradiated LWBR Rods and Pellets waste stream requires an SA because the 229Th, 230Th, 232U, 233U, and 234U activity concentrations exceed the Nevada National Security Site (NNSS) Waste Acceptance Criteria (WAC) Action Levels.

  7. Global Biofuel Production and Food Security: Implications for Asia Pacific

    E-Print Network [OSTI]

    Global Biofuel Production and Food Security: Implications for Asia Pacific 56th AARES Annual Conference Fremantle, Western Australia 7-10 February 2012 William T. Coyle #12;Global Biofuel Production and Food Security: Making the Connection --Past analysis and the evidence about biofuels and spiking

  8. Smart-Grid Security Issues

    SciTech Connect (OSTI)

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  9. Secure Virtualization with Formal Methods

    E-Print Network [OSTI]

    Sturton, Cynthia

    2013-01-01

    cloud computing, virtualization software has a variety of security-cloud computing, researchers have proposed using system virtualization software as a platform to increase the security

  10. Program Areas | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Organizations National Security Home | Science & Discovery | National Security | Program Areas SHARE Program Areas image Oak Ridge National Laboratory (ORNL) has a robust...

  11. Office of Secure Transportation Activities

    Office of Environmental Management (EM)

    6th, 2012 WIPP Knoxville, TN OFFICE OF SECURE TRANSPORTATION Agency Integration Briefing Our Mission To provide safe and secure ground and air transportation of nuclear weapons,...

  12. Security Rulemaking | Department of Energy

    Office of Environmental Management (EM)

    Activities Transportation Security Rulemaking Activities at the U.S. Nuclear Regulatory Commission NRC Transportation Security (Part 73 SNF Update and Part 37 Category 1...

  13. National Nuclear Security Administration Overview

    Office of Environmental Management (EM)

    May 11, 2011 Ahmad Al-Daouk Manager, National Security Department (NSD) National Nuclear Security Administration (NNSA) Service Center - Albuquerque, NM May 11, 2011 - Page 2...

  14. Sandia Corporate Overview - Core group

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput Analysis ofSample SULI Program StudentSandiaCOMMUNITY MEMBERSWHAT GUIDES

  15. Sandia Corporate Overview - Core group

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput Analysis ofSample SULI Program StudentSandiaCOMMUNITY MEMBERSWHAT GUIDES

  16. Sandia Corporate Overview - ERN SMU

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput Analysis ofSample SULI Program StudentSandiaCOMMUNITY MEMBERSWHAT

  17. Sandia Corporate Overview - ERN SMU

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-Throughput Analysis ofSample SULI Program StudentSandiaCOMMUNITY MEMBERSWHAT8/2011,

  18. Risk Analysis, Vol. 30, No. 4, 2010 DOI: 10.1111/j.1539-6924.2010.01370.x Deceptive Detection Methods for Effective Security with

    E-Print Network [OSTI]

    Risk Analysis, Vol. 30, No. 4, 2010 DOI: 10.1111/j.1539-6924.2010.01370.x Deceptive Detection of developing a testing strategy 663 0272-4332/10/0100-0663$22.00/1 C 2010 Society for Risk Analysis #12

  19. On Building Secure SCADA Systems using Security Eduardo B. Fernandez

    E-Print Network [OSTI]

    Wu, Jie

    On Building Secure SCADA Systems using Security Patterns Eduardo B. Fernandez Dept. of Comp. Sci, also known as the supervisory, control, and data acquisition (SCADA) system. On the other hand systems. This paper aims to propose methods to build a secure SCADA system using security patterns

  20. INSTITUTE FOR CYBER SECURITY Application-Centric Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Dr. Robert W. Gracy Vice President

  1. INSTITUTE FOR CYBER SECURITY Application-Centric Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

  2. Towards Secure Information Sharing Models for Community Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu Dept. of Computer Science Institute for Cyber Security University of Texas at San Antonio Email: ravi.sandhu@utsa.edu Ram Krishnan Dept. of Electrical and Computer Engineering Institute for Cyber Security University

  3. INSTITUTE FOR CYBER SECURITY Application-Centric Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio June 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Dr. Robert W. Gracy Vice President

  4. 1Computer Security Shambhu Upadhyaya Cyber Security @CEISARE

    E-Print Network [OSTI]

    Upadhyaya, Shambhu

    , there are 100+ centers ­ Based on curriculum mapping to CNSS (committee of National Security Standards) 4011 at Google (2010) · Threats to national security ­ Insider attacks ­ Examples: Bradley Manning leaked1Computer Security Shambhu Upadhyaya Cyber Security @CEISARE Professor S. Upadhyaya Department

  5. A SECURE EUROPE IN A BETTER WORLD EUROPEAN SECURITY STRATEGY

    E-Print Network [OSTI]

    Sussex, University of

    EN A SECURE EUROPE IN A BETTER WORLD EUROPEAN SECURITY STRATEGY Brussels, 12 December 2003 #12;1 EN's complex problems on its own Introduction Europe has never been so prosperous, so secure nor so free problems on its own. Europe still faces security threats and challenges. The outbreak of conflict

  6. SecuritySmart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D mSecurity SecuritySecuritySmart

  7. CYBER/PHYSICAL SECURITY VULNERABILITY ASSESSMENT INTEGRATION

    SciTech Connect (OSTI)

    MacDonald, Douglas G.; Key, Brad; Clements, Samuel L.; Hutton, William J.; Craig, Philip A.; Patrick, Scott W.; Crawford, Cary E.

    2011-07-17

    This internally funded Laboratory-Directed R&D project by the Pacific Northwest National Laboratory, in conjunction with QinetiQ North America, is intended to identify and properly assess areas of overlap (and interaction) in the vulnerability assessment process between cyber security and physical protection. Existing vulnerability analysis (VA) processes and software tools exist, and these are heavily utilized in the determination of predicted vulnerability within the physical and cyber security domains. These determinations are normally performed independently of one another, and only interact on a superficial level. Both physical and cyber security subject matter experts have come to realize that though the various interactive elements exist, they are not currently quantified in most periodic security assessments. This endeavor aims to evaluate both physical and cyber VA techniques and provide a strategic approach to integrate the interdependent relationships of each into a single VA capability. This effort will also transform the existing suite of software currently utilized in the physical protection world to more accurately quantify the risk associated with a blended attack scenario. Performance databases will be created to support the characterization of the cyber security elements, and roll them into prototype software tools. This new methodology and software capability will enable analysts to better identify and assess the overall risk during a vulnerability analysis.

  8. Homeland Security: What Can Data Science Do?

    E-Print Network [OSTI]

    , Control and Interoperability Center for Advanced Data Analysis A Department of Homeland Security "halves" of the DHS Center for Visual and Data Analytics (CVADA), founded as the CCI Center by DHS in 2009.g.: ŘAssessing risks in waterways (NJ DOT) ŘPlanning for evacuations during heat events from climate change (CDC

  9. 2014 Headquarters Facilities Master Security Plan- Chapter 8, Operations Security Program

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program Describes the DOE Headquarters Operations Security (OPSEC) Program.

  10. 2014 Headquarters Facilities Master Security Plan- Chapter 10, Security Awareness Program

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program Describes the DOE Headquarters Security Awareness Program

  11. 2 Int. J. Security and Networks, Vol. Towards modelling the impact of cyber attacks

    E-Print Network [OSTI]

    Kundur, Deepa

    2 Int. J. Security and Networks, Vol. Towards modelling the impact of cyber attacks on a smart grid. Keywords: smart grid cyber security; cyber attack impact analysis; graph-based dynamical systems; smart and Computer Engineering at Texas A&M University. Her research interests include cyber security of the smart

  12. BROADER National Security Missions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Metal Chips (U) Uranium Trioxide (UO 3 ) UO 2 (NO 3 ) 2 Ur anyl Nitrate Ammonium Uranyl Carbonate (NH 4 ) 2 UO 2 (CO 3 ) 4 DEVELOP NEW NATIONAL SECURITY MISSIONS Y-12 has...

  13. AMALGAMATED SECURITY COMMUNITIES

    E-Print Network [OSTI]

    Harvey, Andrew Stephen

    2011-08-31

    This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

  14. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-25

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  15. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-01-22

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  16. Operations Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-04-30

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  17. Limited Liability Companies and Corporate Business Structures 

    E-Print Network [OSTI]

    Thompson, Bill; Polk, Wade; Hayenga, Wayne

    2009-01-07

    is also a key ad- vantage of incorporating. One disadvantage to incorporation is the potential for double taxation. Earnings that are taxed at the corporate level will be taxed a second time if disbursed as dividends or upon liquida- tion.... St. Louis, Missouri: Doanes Agricultural Services Co. Kole, Glenn A. and Sherrill B. Nott. 2001. Farm Organization Options. Staff Paper, pp. 2001- 43. Department of Agricultural Economics, Michigan State University, East Lansing. Thompson, William...

  18. The Corporate Headquarters for Alabama Power Company 

    E-Print Network [OSTI]

    Reardon, J. G.; Penuel, K. M.

    1987-01-01

    management systems are a prime objective f the company. Considerable attention has been give to the public information aspects during the desi n phase. The original equipment room layout and floor 478 ESL-IE-87-09-75 Proceedings from the Ninth Annual... tech nologies which are of mutual benefit to customer and utility. INTRODUCTION In order to consolidate all corporate head quarters personnel into a single facility, Alabama Power Company management initiated the design and construction of a...

  19. Financing energy efficiency via the Mortgage Corporation

    SciTech Connect (OSTI)

    Schaefer, M.L.

    1980-07-01

    Residential housing in the United States consumes more than 20% of all the energy used nationally each year. Home-mortgage lenders are in a position to assist homeowners in reducing this high level of energy consumption by taking advantage of a variety of financing methods now available to them. The Federal Home Loan Mortgage Corporation has taken several innovative steps to help support lenders' efforts to aid the homeowners of America in their quest to make their properties more energy-efficient.

  20. Sekisui Jushi Corporation SJC | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onRAPID/Geothermal/Exploration/ColoradoRemsenburg-Speonk,SageScheucoSedco Hills, California:Sekisui Jushi Corporation SJC

  1. Siemens Corporate Technology CT | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Information Serbia-Enhancing Capacity for LowInformationShoshone County,SiCorporate Technology CT

  2. PowerSat Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History ViewMayo, Maryland:NPIProtectio1975) |Texas:PottawattamiePowerSat Corporation Jump to: navigation,

  3. Colusa Biomass Energy Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, Alabama (Utility Company)| Open EnergyColoradoBiomass Energy Corporation Jump to:

  4. Corporate International Operations | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, Alabama (Utility Company)| Open(Evans,Oregon:Volcano, HawaiiCorporate

  5. Corporate Operating Experience Program | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuels Data Center HomeVehicleDepartment of EnergyContacts for ServicesCorporate

  6. ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1

    E-Print Network [OSTI]

    Su, Xiao

    ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1 Information................................................................................................................................................................................3 Information Security Policy...............................................................................................................................................4 Information Security Policy Management

  7. Policy Paper 35: Energy and Security in Northeast Asia: Fueling Security

    E-Print Network [OSTI]

    Calder, Kent; Fesharaki, Fereidun; Shirk, Susan L.; Stankiewicz, Michael

    1998-01-01

    Deese (editors). Energy and Security. 3. Fereidun Fesharaki,Energy and Security in Northeast Asia: Fueling Security Anrising energy demand. Energy and Security in Northeast Asia

  8. Computing Legacy Software Behavior to Understand Functionality and Security Properties: An IBM/370 Demonstration

    SciTech Connect (OSTI)

    Linger, Richard C [ORNL; Pleszkoch, Mark G [ORNL; Prowell, Stacy J [ORNL; Sayre, Kirk D [ORNL; Ankrum, Scott [MITRE Corporation

    2013-01-01

    Organizations maintaining mainframe legacy software can benefit from code modernization and incorporation of security capabilities to address the current threat environment. Oak Ridge National Laboratory is developing the Hyperion system to compute the behavior of software as a means to gain understanding of software functionality and security properties. Computation of functionality is critical to revealing security attributes, which are in fact specialized functional behaviors of software. Oak Ridge is collaborating with MITRE Corporation to conduct a demonstration project to compute behavior of legacy IBM Assembly Language code for a federal agency. The ultimate goal is to understand functionality and security vulnerabilities as a basis for code modernization. This paper reports on the first phase, to define functional semantics for IBM Assembly instructions and conduct behavior computation experiments.

  9. Secure Quantum Key Distribution

    E-Print Network [OSTI]

    Hoi-Kwong Lo; Marcos Curty; Kiyoshi Tamaki

    2015-05-20

    Secure communication plays a crucial role in the Internet Age. Quantum mechanics may revolutionise cryptography as we know it today. In this Review Article, we introduce the motivation and the current state of the art of research in quantum cryptography. In particular, we discuss the present security model together with its assumptions, strengths and weaknesses. After a brief introduction to recent experimental progress and challenges, we survey the latest developments in quantum hacking and counter-measures against it.

  10. Incidents of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-17

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  11. Data port security lock

    DOE Patents [OSTI]

    Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

    2008-06-24

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  12. Social Impact Management Plans: Innovation in corporate and public policy

    SciTech Connect (OSTI)

    Franks, Daniel M.; Vanclay, Frank

    2013-11-15

    Social Impact Assessment (SIA) has traditionally been practiced as a predictive study for the regulatory approval of major projects, however, in recent years the drivers and domain of focus for SIA have shifted. This paper details the emergence of Social Impact Management Plans (SIMPs) and undertakes an analysis of innovations in corporate and public policy that have put in place ongoing processes – assessment, management and monitoring – to better identify the nature and scope of the social impacts that might occur during implementation and to proactively respond to change across the lifecycle of developments. Four leading practice examples are analyzed. The International Finance Corporation (IFC) Performance Standards require the preparation of Environmental and Social Management Plans for all projects financed by the IFC identified as having significant environmental and social risks. Anglo American, a major resources company, has introduced a Socio-Economic Assessment Toolbox, which requires mine sites to undertake regular assessments and link these assessments with their internal management systems, monitoring activities and a Social Management Plan. In South Africa, Social and Labour Plans are submitted with an application for a mining or production right. In Queensland, Australia, Social Impact Management Plans were developed as part of an Environmental Impact Statement, which included assessment of social impacts. Collectively these initiatives, and others, are a practical realization of theoretical conceptions of SIA that include management and monitoring as core components of SIA. The paper concludes with an analysis of the implications for the practice of impact assessment including a summary of key criteria for the design and implementation of effective SIMPs. -- Highlights: • Social impact management plans are effective strategies to manage social issues. • They are developed in partnership with regulatory agencies, investors and community. • SIMPs link assessment to ongoing management and address social and community issues. • SIMPs clarify responsibilities in the management of impacts, opportunities and risks. • SIMPs demonstrate a shift to include management as a core component of SIA practice.

  13. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or â?? tunnelsâ?ť, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

  14. Sandia Energy - Analysis

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Climate Change Is the Subject of a New Book Analysis, Climate, Global Climate & Energy, Monitoring, News, News & Events, Sensing, Sensing & Monitoring, Water Security Climate...

  15. Inducing Corporate Compliance: A Law and Economics Analysis of Corporate Liability Regimes

    E-Print Network [OSTI]

    Oded, Sharon

    2010-01-01

    include somewhat mitigated sanctions which are imposed onby adjusting the actual sanction to offset the increase inD. 1984. Prices and sanctions. Columbia Law Review 84, :

  16. Global Security Analysis and Training Program | Y-12 National Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (Journalvivo Low-Dose Low LETUseful LinksGlass StrongerGlobalOn The

  17. The climate change and energy security nexus

    SciTech Connect (OSTI)

    King, Marcus Dubois; Gulledge, Jay

    2013-01-01

    The study of the impacts of climate change on national and interna-tional security has grown as a research field, particularly in the last five years. Within this broad field, academic scholarship has concentrated primarily on whether climate change is, or may become, a driver of violent conflict. This relationship remains highly contested. However, national security policy and many non-governmental organizations have identified climate change as a threat multiplier in conflict situations. The U.S. Department of Defense and the United Kingdom's Ministry of Defense have incorporated these findings into strategic planning documents such as the Quadrennial Defense Review and the Strategic Defence and Security Review. In contrast to the climate-conflict nexus, our analysis found that academic scholarship on the climate change and energy security nexus is small and more disciplinarily focused. In fact, a search of social science litera-ture found few sources, with a significant percentage of these works attribut-able to a single journal. Assuming that policymakers are more likely to rely on broader social science literature than technical or scientific journals, this leaves a limited foundation. This then begged the question: what are these sources? We identified a body of grey literature on the nexus of climate change and energy security of a greater size than the body of peer-reviewed social science literature. We reviewed fifty-eight recent reports, issue briefs, and transcripts to better understand the nexus of climate change and energy security, as well as to gain insight about the questions policymakers need answered by those undertaking the research. In this article, we describe the nature of the sources reviewed, highlight possible climate change and energy security linkages found within those sources, identify emerging risks, and offer conclusions that can guide further research.

  18. IY5512: Part 1 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    IY5512: Part 1 1 Information Security Group IY5512 Computer Security Part 1: Introduction to computer security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security) ... 2 Information Security Group Agenda · Overview · Security goals · Security approaches ­ prevention

  19. How Big a Problem is U.S. Corporate Governance?

    E-Print Network [OSTI]

    Kaplan, Steve

    2007-01-01

    securities and asset management divisions. This implies that10-Ks for Calamos Asset Management, Eaton Vance, and JanusInstitutional Securities Asset Management J.P. Morgan Chase

  20. Unconditionally Secure Quantum Signatures

    E-Print Network [OSTI]

    Ryan Amiri; Erika Andersson

    2015-08-08

    Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern communications. They allow for the exchange of messages from one sender to multiple recipients, with the guarantees that messages cannot be forged or tampered with and that messages also can be forwarded from one recipient to another without compromising their validity. Signatures are different from, but no less important than encryption, which ensures the privacy of a message. Commonly used signature protocols - signatures based on the Rivest-Adleman-Shamir (RSA) algorithm, the digital signature algorithm (DSA), and the elliptic curve digital signature algorithm (ECDSA) - are only computationally secure, similar to public key encryption methods. In fact, since these rely on the difficulty of finding discrete logarithms or factoring large primes, it is known that they will become completely insecure with the emergence of quantum computers. We may therefore see a shift towards signature protocols that will remain secure even in a post-quantum world. Ideally, such schemes would provide unconditional or information-theoretic security. In this paper, we aim to provide an accessible and comprehensive review of existing unconditionally secure signature schemes for signing classical messages, with a focus on unconditionally secure quantum signature schemes.

  1. Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDidDevelopment Top Scientific Impact Since its SearchSecurity

  2. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D m r345 UnlimitedSecure

  3. national security campus | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouthReporteeo | National Nuclear Securityhr | Nationalnational security

  4. Tag: security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorking With U.S. Coal StocksSuppliers Tag: Supplierssecurity Tag: security

  5. physical security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorkingLosThe 26thI D- 6 0 4 2 r m m m m port m fm f mphysical security |

  6. EA-296-B Rainbow Energy Marketing Corporation | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Marketing Corporation Order authorizing Rainbow Energy to export electric energy to Canada. EA-296-B Rainbow Energy (CN).pdf More Documents & Publications RECORD of Categorical...

  7. Citizens Electric Corporation- Residential Energy Efficiency Rebate Program

    Broader source: Energy.gov [DOE]

    Citizens Electric Corporation offers rebates and price reductions to its residential customers for purchasing and installing energy efficient equipment. Eligible equipment and measures include a...

  8. Ambient Corporation's Reply comments to DOE RFI: Addressing Policy...

    Broader source: Energy.gov (indexed) [DOE]

    communications will play ineneabling utilities to deploy cost-effective long-term smart grid benefits. Ambient Corporation's Reply comments to DOE RFI: Addressing Policy and...

  9. PRELIMINARY SURVEY OF SYLVANIA-CORNING NUCLEAR CORPORATION METALLURGIC...

    Office of Legacy Management (LM)

    Corporaion Metallurgical Laboratory in Bayside, New York THE FORMER SYLVANIA-CORNING NUCLEAR CORPORATION, INC. METALLURGICAL LABORATORY Bayside, New York Site Function late...

  10. High-Level Waste Corporate Board Presentation Archive | Department...

    Broader source: Energy.gov (indexed) [DOE]

    Triay High-Level Waste Corporate Board, Mark Gilbertson EM Engineering & Technology Roadmap and Major Technology Demonstrations Office of River Protection Idaho National...

  11. Federal Power Act section 202(c) - Mirant Corporation, August...

    Broader source: Energy.gov (indexed) [DOE]

    On August 24, 2005 in response to a decision by Mirant Corporation to cease generation of electricity at its Potomac River generating station, the District of Columbia Public...

  12. Testimonials- Partnerships in Battery Technologies- Capstone Turbine Corporation

    Broader source: Energy.gov [DOE]

    Robert Gleason, Senior Vice President of Product Development for Capstone Turbine Corporation describes the benefits of a strategic partnership with the U.S. Department of Energy.

  13. Testimonials- Partnerships in R&D- Capstone Turbine Corporation

    Broader source: Energy.gov [DOE]

    Darren Jamison, President and CEO of Capstone Turbine Corporation, shares his experience of partnering with the U.S. Department of Energy.

  14. Sandia Energy - ECIS-Automotive Fuel Cell Corporation: Hydrocarbon...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ECIS-Automotive Fuel Cell Corporation: Hydrocarbon Membrane Fuels the Success of Future Generation Vehicles Home Energy Transportation Energy CRF Partnership Energy Efficiency...

  15. Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

    Office of Environmental Management (EM)

    4, Cyber Security Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2015 2015 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security...

  16. Some Thoughts on Teaching Secure Programming

    E-Print Network [OSTI]

    Bishop, Matt

    2013-01-01

    Teaching Context in Information Security,” ACM Journal onWorld Conference on Information Security Education pp. 23–Colloquium on Information Systems Security Education (CISSE)

  17. Securities Class Actions and Bankrupt Companies

    E-Print Network [OSTI]

    Park, James J.

    2014-01-01

    the utility of securities class actions. Certainly, contextthe merit of securities class actions. UCLA | SCHOOL OF LAWof James J. Park, Securities Class Actions and Bankrupt

  18. Security enhanced with increased vehicle inspections

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security enhanced with increased vehicle inspections Security measures increase as of March: vehicle inspections won't delay traffic New increased security procedures meet LANL's...

  19. Review of digital image security in Dermatology

    E-Print Network [OSTI]

    Nielson, Colton; West, Cameron; Shimizu, Ikue

    2015-01-01

    encrypted communications, cloud security breaches, and phonebreaches in security demonstrate, such cloud storage ofand security rules 22 Audits of CSP data center operations and cloud

  20. Integrated Security System | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems architecture Integrated...

  1. Data security on the national fusion grid

    E-Print Network [OSTI]

    Burruss, Justine R.; Fredian, Tom W.; Thompson, Mary R.

    2005-01-01

    of any computational grid is security. Effective sharing oflike ITER. Keywords: security, FusionGrid, grid computing 1.A Security Architecture for Computational Grids,” Proc. 5th

  2. Security on the US Fusion Grid

    E-Print Network [OSTI]

    Burruss, Justin R.; Fredian, Tom W.; Thompson, Mary R.

    2005-01-01

    of any computational grid is security. Effective sharing oflike ITER. Keywords: security, FusionGrid, grid computing 1.A Security Architecture for Computational Grids,” Proc. 5th

  3. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01

    CERT. (2010, Dec) Technical Cyber Security Alerts. [Online].a broad overview of cyber security incidents in the laststrategic war and viable cyber security solutions should be

  4. Mathematical and Statistical Opportunities in Cyber Security

    E-Print Network [OSTI]

    Meza, Juan

    2009-01-01

    development approach to cyber security. Report submitted to2007. Committee on Improving Cyber- security Research in theOpportunities in Cyber Security ? Juan Meza † Scott

  5. Security and United States Immigration Policy

    E-Print Network [OSTI]

    Totten, Robbie James

    2012-01-01

    2009 [1981]. American National Security, 6th ed. Baltimore,1977. Economic Issues and National Security. Lawrence, KS:Immigration and National Security. Westport, CT: Praeger

  6. Office of Security Assessments | Department of Energy

    Energy Savers [EERE]

    Security Assessments Office of Security Assessments MISSION The Office of Security Assessments is responsible for the independent evaluation of the effectiveness of safeguards and...

  7. Utica Corporation Plant-Wide Energy Assessment Report Final Summary (Entrance to Utica Corporation's Whitesboro Plant)

    SciTech Connect (OSTI)

    2002-03-01

    Utica Corporation conducted a plant-wide energy assessment of the manufacturing processes and utilities at its facility in Whiteboro, NY. As a result of the assessment, the company is now implementing six energy conservation projects that will result in significant cost savings and efficiency improvements.

  8. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Broader source: Energy.gov (indexed) [DOE]

    A vulnerability was reported in Cisco Secure Access Control System. A remote user can change the passwords of arbitrary users. PLATFORM: Cisco Secure ACS versions 5.1 patch 3, 4,...

  9. AUDIT REPORT Security at the Nevada National Security Site

    Broader source: Energy.gov (indexed) [DOE]

    Security at the Nevada National Security Site OAS-L-15-06 May 2015 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections . Department of Energy...

  10. Security Requirements Engineering Support for Security-Annotated Business Processes

    E-Print Network [OSTI]

    Security Requirements Engineering Support for Security-Annotated Business Processes Elda Paja1 that business analysts are not secu- rity experts and assume that this will be bolted on later. Fortunately

  11. Trexa Motor Corporation TMC | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Information Serbia-EnhancingEt Al., 2013)OpenEnergyTrail CanyonsourceRiver Solar |Trexa Motor Corporation

  12. SunLink Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Information Serbia-Enhancing CapacityVectren)Model for theSunLan Solar Co Ltd Jump to:SunLink Corporation

  13. Hydra Fuel Cell Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas: Energy Resources JumpNewTexas: EnergyHunterdonHutto,Fuel Cell Corporation Jump to:

  14. GreenShift Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View New PagesSustainableGlynn County, Georgia:Oregon:Corp JumpGreen2V JumpGreenShift Corporation

  15. Global Electric Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View New PagesSustainable UrbanKentucky:BoreOpenGilliamOhio:Change | Open EnergyChange:Corporation

  16. Empire Natural Gas Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, AlabamaETEC GmbH JumpEllenville, New York:Corporation Jump to: navigation, search Name:

  17. EnerTeck Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTIONRobertsdale, AlabamaETEC GmbH JumpEllenville, New York:CorporationEnerGenetics

  18. Sierra Energy Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Information Serbia-Enhancing Capacity for LowInformationShoshone County,SiCorporateSiemensNewEnergy

  19. MSC Power Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas:Montezuma,Information MHKMHK5 < MHKKemblaSolar Jump to: navigation,Corporation

  20. Intan Carbon Corporation | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History View NewTexas: Energy ResourcesOrder at 8, 13 (Vt.InfinifuelInova EnergyIntan Carbon Corporation