Powered by Deep Web Technologies
Note: This page contains sample records for the topic "anyconnect secure mobility" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users...  

Office of Environmental Management (EM)

next-generation VPN client, which provides remote users with secure IPsec (IKEv2) or SSL Virtual Private Network (VPN) connections to Cisco 5500 Series Adaptive Security...

2

V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access08:Energy 94: IBM

3

T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-Up from the GridwiseSiteDepartmentChallengeCompliance7/109 TORNADO *Arbitrary Code

4

Security in 3rd Generation Mobile Networks  

E-Print Network [OSTI]

-based transport technology to the core of 3G mobile networks brings along new vulnerabilities and potentialSecurity in 3rd Generation Mobile Networks Christos Xenakis and Lazaros Merakos Communication by the proliferation of mobile/wireless networks, the fixed- mobile network convergence, and the emergence of new

Stavrakakis, Ioannis

5

Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept  

E-Print Network [OSTI]

for the safe management of mobile agents they deploy onto the Internet. Our in- frastructural approach is basedMacro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Security Research Centre Queensland University of Technology Brisbane, Queensland, Australia and Dept

Roth, Volker

6

A SECURE AUTHENTICATION INFRASTRUCTURE FOR MOBILE  

E-Print Network [OSTI]

. In this paper, we propose to secure an infrastructure providing telecommunication services on the Internet- bile Internet Telecommunication services (MobInTel). We present this infrastructure in detailsA SECURE AUTHENTICATION INFRASTRUCTURE FOR MOBILE COMMUNICATION SERVICES OVER THE INTERNET Ir

von Bochmann, Gregor

7

An integrated mobile system for port security  

SciTech Connect (OSTI)

An integrated mobile system for port security is presented. The system is designed to perform active investigations, by using the tagged neutron inspection technique, of suspect dangerous materials as well as passive measurements of neutrons and gamma rays to search and identify radioactive and special nuclear materials. (authors)

Cester, D. [Dipartimento di Fisica, Universita di Padova, Via F. Marzolo 8, Padova I-35131 (Italy); Fabris, D. [INFN Sezione di Padova, Via F. Marzolo 8, Padova I-35131 (Italy); Lunardon, M.; Moretto, S. [Dipartimento di Fisica, Universita di Padova, Via F. Marzolo 8, Padova I-35131 (Italy); Nebbia, G. [INFN Sezione di Padova, Via F. Marzolo 8, Padova I-35131 (Italy); Pesente, S.; Stevanato, L.; Viesti, G. [Dipartimento di Fisica, Universita di Padova, Via F. Marzolo 8, Padova I-35131 (Italy); Neri, F.; Petrucci, S.; Selmi, S.; Tintori, C. [CAEN S.p.A., Via Vetraia 11, I-55049, Viareggio LU (Italy)

2011-07-01T23:59:59.000Z

8

Mobile RFID Security Issues -ICU 1 SCIS 2006: The 2006 Symposium on Cryptography and Information Security  

E-Print Network [OSTI]

Mobile RFID Security Issues - ICU 1 SCIS 2006: The 2006 Symposium on Cryptography and Information Engineers Mobile RFID Security Issues Divyan M. Konidala, Kwangjo Kim Cryptology and Information Security #12;Mobile RFID Security Issues - ICU 2 RFID Technology (1/2) Radio Frequency Identification (RFID

Kim, Kwangjo

9

Mobile Device Security Policy 1.0 Purpose  

E-Print Network [OSTI]

Mobile Device Security Policy COE­MDS­01 1.0 Purpose The purpose of this policy is to establish security requirements for mobile devices to prevent sensitive or confidential data from being lost or compromised. A wide variety of mobile devices contain electronically stored data including, but not limited to

Demirel, Melik C.

10

Mobile RFID Applications and Security Konidala M. Divyan, Kwangjo Kim  

E-Print Network [OSTI]

information about RFID tagged items. As RFID tags, mobile phones can quickly identify them- selves in order, human-error prone, and time consuming inventory check, and also causes customers in a store to waitMobile RFID Applications and Security Challenges Konidala M. Divyan, Kwangjo Kim Information

Kim, Kwangjo

11

SECURE AUTHENTICATION FOR MOBILE COMMUNICATION OVER THE INTERNET1  

E-Print Network [OSTI]

, including mobile devices. In this paper, we propose to secure an infrastructure for telecommunication Internet Telecommunication services (MobInTel). We present this infrastructure in details and illustrate traditional mobile networks, such as GSM. The network infrastructure registration process should give

von Bochmann, Gregor

12

Asbestos : operating system security for mobile devices  

E-Print Network [OSTI]

This thesis presents the design and implementation of a port of the Asbestos operating system to the ARM processor. The port to the ARM allows Asbestos to run on mobile devices such as cell phones and personal digital ...

Stevenson, Martijn

2006-01-01T23:59:59.000Z

13

Authentication : can mobile environments be secured?  

E-Print Network [OSTI]

The Data Encryption Standard (DES) created the public realm of encryption in the mid-1970's when it was fully specified and released into the public domain. The Data Encryption Standard was adopted as a federal standard on November 23, 1976 and authorized... and service provider. TABLE OF CONTENTS CHAPTER Page I INTRODUCTION. A, Statement of the Problem. B. Definitions of Terms, II REVIEW OF THE LITERATURE A. Issues Rehtted to Mobile Environments: An Overview . . . . . B. Sectility Goals and Threats C...

Cropper, Charles Austin

2013-02-22T23:59:59.000Z

14

A network-assisted mobile VPN for securing users data in UMTS Christos Xenakis1  

E-Print Network [OSTI]

of the UMTS technology in protecting users' data and satisfies the security requirements of the mobile users continuously while the mobile user moves and roams as it binds the UMTS mobility management with the VPNA network-assisted mobile VPN for securing users data in UMTS Christos Xenakis1 , Christoforos

Stavrakakis, Ioannis

15

DNS Name Service based on Secure Multicast DNS for IPv6 Mobile Ad Hoc Networks  

E-Print Network [OSTI]

DNS Name Service based on Secure Multicast DNS for IPv6 Mobile Ad Hoc Networks Jaehoon Jeong which can provide mobile nodes in IPv6 mobile ad hoc network with secure name-to-address resolution and service discovery. Because mobile ad hoc network has dynamic topology, the current DNS is inappropriate

Jeong, Jaehoon "Paul"

16

A Secure Mobile VPN Scheme for UMTS Christos Xenakis, Nikos Loukas and Lazaros Merakos  

E-Print Network [OSTI]

A Secure Mobile VPN Scheme for UMTS Christos Xenakis, Nikos Loukas and Lazaros Merakos {xenakis, loukas, merakos}@di.uoa.gr Abstract - In this paper, a mobile Virtual Private Network (VPN) scheme for the Universal Mobile Telecommunication System (UMTS) is proposed and analyzed from a security

Stavrakakis, Ioannis

17

Quality of Service (QoS) security in mobile ad hoc networks  

E-Print Network [OSTI]

With the rapid proliferation of wireless networks and mobile computing applications, Quality of Service (QoS) for mobile ad hoc networks (MANETs) has received increased attention. Security is a critical aspect of QoS provisioning in the MANET...

Lu, Bin

2006-10-30T23:59:59.000Z

18

IBM recently unveiled MobileFirst, a major initiative to develop mobile-related technologies and products that include security, analytics, mobile app development, and cloud-based backend services. MobileFirst  

E-Print Network [OSTI]

IBM recently unveiled MobileFirst, a major initiative to develop mobile-related technologies and products that include security, analytics, mobile app development, and cloud-based backend services. Mobile lab has been asked to lead key portions of IBM's mobile research agenda. IBM Research-Austin has

Plotkin, Joshua B.

19

The Quest for Security in Mobile Ad Hoc Networks \\Lambda JeanPierre Hubaux  

E-Print Network [OSTI]

network to work without any external management or configuration. Although not all mobile ad hoc networksThe Quest for Security in Mobile Ad Hoc Networks \\Lambda JeanPierre Hubaux Institute for Computer Communications and Applications Swiss Federal Institute of Technology -- Lausanne CH1015, Switzerland Jean

Bencsth, Boldizsr

20

The Quest for Security in Mobile Ad Hoc Networks Jean-Pierre Hubaux  

E-Print Network [OSTI]

management or con guration. Although not all mobile ad hoc networks are self-organized, this propertyThe Quest for Security in Mobile Ad Hoc Networks Jean-Pierre Hubaux Institute for Computer Communications and Applications Swiss Federal Institute of Technology Lausanne CH-1015, Switzerland Jean

Capkun, Srdjan

Note: This page contains sample records for the topic "anyconnect secure mobility" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Security Requirements for Management Systems using Mobile Agents H. Reiser G. Vogt  

E-Print Network [OSTI]

Security Requirements for Management Systems using Mobile Agents H. Reiser G. Vogt Munich Network Management Team Munich Network Management Team University of Munich, Germany Munich University of Technology and distributed management systems based on mobile agents have certain advantages over centralized and static

22

Challenges in Security and Privacy for Mobile Edge-Clouds  

E-Print Network [OSTI]

of mobile personal devices such as smartphones and tablets today, with their growing com- putational and privacy of users' mobile devices and their personal data on these devices presents a significant obstacle-3890 Abstract Mobile devices such as smartphones and tablets are ubiquitous today, and many of them possess

23

Security Schemes for Wireless Sensor Networks with Mobile Sink  

E-Print Network [OSTI]

........................ 35 10 Wireless sensor network with mobile sinks and sensor nodes using two separate key pools for key pre-distribution ......................................... 39 11 (a) Direct key discovery, (b) Indirect key discovery through interrmedi... Protocol parameter values .......................................................................... 108 1 CHAPTER I INTRODUCTION Mobility is exploited in the field of wireless sensor network [1], [2], [3], [4] to circum- vent multi...

Rasheed, Amar Adnan

2011-08-08T23:59:59.000Z

24

Mobile and Ubiquitous Compu3ng Privacy, Security and Trust  

E-Print Network [OSTI]

g.roussos@dcs.bbk.ac.uk #12;· Security of RFID · Privacy and UUIIDs in RFID issues · Major privacy concerns #12;RFID Constella3ons Juels, 2005 Tag Constellations Uniquely Identify an Individual #12;Privacy debate · RSA CEO "would be very worried

Roussos, George

25

SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks  

E-Print Network [OSTI]

SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks Yih-Chun Hu a University, Houston, TX 77005, USA Abstract An ad hoc network is a collection of wireless computers (nodes stations or access points. Although many previous ad hoc network routing protocols have been based in part

Ramkumar, Mahalingam

26

Security  

Broader source: Energy.gov [DOE]

Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

27

Security and User Privacy for Mobile-RFID Applications in Public Zone Divyan M. Konidala, Hyunrok Lee, Dang Nguyen Duc, Kwangjo Kim  

E-Print Network [OSTI]

Security and User Privacy for Mobile-RFID Applications in Public Zone Divyan M. Konidala, Hyunrok and privacy threats. We propose a security framework, which addresses issues such as: identifying cloned fake. {divyan, tank, nguyenduc, kkj}@icu.ac.kr Abstract To make RFID technology assist people in their daily

Kim, Kwangjo

28

A SECURITY TUNNEL FOR CONDUCTING MOBILE BUSINESS OVER THE TCP PROTOCOL  

E-Print Network [OSTI]

Telecommunication Networks and Wireless LANS, as well as appropriate Information Technology Infrastructure. What with emphasis on the significance of mobile commerce and provides a framework to address and analyse common to conclude that m-Business is any business operation that is conducted via a mobile telecommunications

Pitsillides, Andreas

29

Leveraging Trusted Network Connect for Secure Connection of Mobile Devices to Corporate Networks  

E-Print Network [OSTI]

for Secure Information Technology, Rheinstrasse 75, 64295 Darmstadt, Germany, hervais and systems pose specific requirements and because of the diversity of network access technologies of user identities and rights are not compatible. Especially for SMEs identity management and access

Paris-Sud XI, Université de

30

The Role of the National Institute of Standards and Technology in Mobile Security This paper will present an overview of the work of the National Institute of Standards and  

E-Print Network [OSTI]

The Role of the National Institute of Standards and Technology in Mobile Security This paper and privacy for mobile technology as well as an overview on how NIST standards and guidelines can be applied will present an overview of the work of the National Institute of Standards and Technology (NIST) in security

31

Mobile Technology Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The directive will ensure that federal organizations and employees within the Department can use mobile technology to support mission requirements in a safe and secure manner.

2013-11-21T23:59:59.000Z

32

Abstract--Securing multicast communications in Mobile Ad Hoc Networks (MANET) is considered among the most challenging  

E-Print Network [OSTI]

with the requirement to design secure KM schemes that achieve better performance than existing ones (either for wire-line difficulties in establishing a secure framework suitable for such services. The design of efficient key no nodes with special capabilities exist, b) produce considerably lower overhead for the network nodes

Baras, John S.

33

Mobile Technology Management - DOE Directives, Delegations, and...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

203.2, Mobile Technology Management by Denise Hill Functional areas: Mobile Technology, Information Technology, Information Security The order establishes requirements, assigns...

34

T-611: Cisco IOS OCSP Revoked Certificate Security Issue | Department...  

Broader source: Energy.gov (indexed) [DOE]

Addthis Related Articles U-138: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability V-080: Apple iOS Multiple Vulnerabilities U-196: Cisco AnyConnect VPN Client Two...

35

National Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Mobile Applications StreamingReal-time Data Data System Architectures for National Security Sensor Networks Visual Analytics Risk Analysis Systems Modeling Engineering Analysis...

36

MOBILE SENSING 1 MOBILE SENSING  

E-Print Network [OSTI]

MOBILE SENSING 1 MOBILE SENSING ! ! Parham Aarabi #12;MOBILE SENSING 2 20 years of sensing research #12;MOBILE SENSING 3 Low Likelihood High Likelihood #12;MOBILE SENSING 4 Image Courtesy of Apple Inc. #12;MOBILE SENSING 5 What can we do with all the sensors on our mobile devices? #12;MOBILE SENSING 6

Prodiæ, Aleksandar

37

Combining Mobility and Heterogeneous Networking for Emergency Management: a PMIPv6 and HIP-based  

E-Print Network [OSTI]

management of Proxy Mobile IPv6 (PMIPv6) with macro-mobility management, security, inter-technology handoverCombining Mobility and Heterogeneous Networking for Emergency Management: a PMIPv6 and HIP. General Terms Design, Performance, Security. Keywords Mobility Management, Proxy Mobile IPv6

Gesbert, David

38

Case School of Engineering San Diego Programs MOBILITY-DRIVEN EMBEDDED  

E-Print Network [OSTI]

480Y COURSE DESCRIPTION: Foundations of reliable, energy-efficient and secure design of embedded. Fundamentals of mobility in embedded systems 2. Mobility Constraints: energy-efficiency

Rollins, Andrew M.

39

Enterprise Security Planning (ESP) L. Ertaul T. Braithwaite  

E-Print Network [OSTI]

143 Enterprise Security Planning (ESP) L. Ertaul T. Braithwaite California State University://www.feacinstitute.org Abstract: Enterprise security planning (ESP) is the aligning of information security policies and practices itself. Keywords: Enterprise Security Planning, Zachman Framework, Network Security, Mobile Agents

Ertaull, Levent

40

Security Policy  

Broader source: Energy.gov [DOE]

The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

Note: This page contains sample records for the topic "anyconnect secure mobility" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

SYSTEM FRAMEWORK AND ITS APPLICATION IN MOBILE RFID SERVICE NETWORK  

E-Print Network [OSTI]

@security.re.kr + dhwon@security.re.kr Mobile RFID (Radio Frequency Identification) is a newly emerging technology which uses the mobile phone as an RFID reader with a wireless technology and provides new valuable services and wireless internet. UHF Mobile RFID technology is based on ISO/IEC 18000-6C can share UHF RFID tags used

California at Los Angeles, University of

42

Mobile Computing/Mobile Computing/Mobile Computing/Mobile Computing/ Mobile NetworksMobile NetworksMobile NetworksMobile Networks  

E-Print Network [OSTI]

Mobile Computing/Mobile Computing/Mobile Computing/Mobile Computing/ Mobile NetworksMobile NetworksMobile NetworksMobile Networks Mobile IP Prof. Chansu Yu 2 Contents IP for Wired Network Mobile IP Overview Basic Mobile IP Agent Discovery Registration Tunneling Route Optimization Current Topics #12;3 Simplified

Yu, Chansu

43

Intrusion detection in mobile ad hoc networks  

E-Print Network [OSTI]

Most existent protocols, applications and services for Mobile Ad Hoc NET-works (MANETs) assume a cooperative and friendly network environment and do not accommodate security. Therefore, Intrusion Detection Systems (IDSs), serving as the second line...

Sun, Bo

2005-08-29T23:59:59.000Z

44

Hadoop MapReduce for Mobile Cloud  

E-Print Network [OSTI]

severe energy and reliability constraints (e.g., caused by unexpected device failures or topology changes in a dynamic network). As mobile devices are more susceptible to unauthorized access when compared to traditional servers, security is also a concern...

George, Johnu

2014-04-17T23:59:59.000Z

45

Securing Ad Hoc Networks Lidong Zhou  

E-Print Network [OSTI]

Securing Ad Hoc Networks Lidong Zhou Department of Computer Science Zygmunt J. Haas School of Electrical Engineering Cornell University Ithaca, NY 14853 Abstract Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do

Schneider, Fred B.

46

UIA: A Global Connectivity Architecture for Mobile Personal Devices  

E-Print Network [OSTI]

UIA: A Global Connectivity Architecture for Mobile Personal Devices by Bryan Alexander Ford B Architecture for Mobile Personal Devices by Bryan Alexander Ford Submitted to the Department of Electrical multiple personal devices, many of them mobile, and need to share information securely among them using

Ford, Bryan

47

Transportation Security  

Broader source: Energy.gov (indexed) [DOE]

Preliminary Draft - For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work...

48

Security Specialist  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve as a Security Specialist with responsibility as the performance monitor for protective force operations conducts line management oversight of the...

49

Global security  

ScienceCinema (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-15T23:59:59.000Z

50

Global security  

SciTech Connect (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-14T23:59:59.000Z

51

Cyber Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyber Security Previous cybersecurity evaluations and designs were often dependent upon personal experience and limited empirical evidence. An LDRD project focused on cybersecurity...

52

Mobile IPMobile IP Mobile IPMobile IP  

E-Print Network [OSTI]

Mobile IPMobile IP #12;2 Mobile IPMobile IP · How do we support mobile users whose point of attachment to the network changes dynamically? #12;3 Mobile IPMobile IP · The goal of Mobile IP is to allow connectivity automatically, despite the change. · While Mobile IP can work with wired connections, where you

Yeom, Ikjun

53

Abstract--A mobile ad hoc network is a wireless communication network which does not rely on a fixed  

E-Print Network [OSTI]

Abstract--A mobile ad hoc network is a wireless communication network which does not rely protecting the security of the network is essential. Like many distributed systems, security in ad hoc. The experimental results indicate clear advantages of our approach in providing effective security in mobile ad hoc

Lyu, Michael R.

54

Security Conditions  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

2004-07-08T23:59:59.000Z

55

Security In Information Systems  

E-Print Network [OSTI]

rights, and they are proposing security policies, security planning, personal data protection laws, etc

Candan, Selçuk

56

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

2005-08-26T23:59:59.000Z

57

T-670: Skype Input Validation Flaw in 'mobile phone' Profile...  

Broader source: Energy.gov (indexed) [DOE]

The software does not properly filter HTML code from user-supplied input in the The "mobile phone" profile entry before displaying the input. reference LINKS: SecurityTracker...

58

Mobile robotics research at Sandia National Laboratories  

SciTech Connect (OSTI)

Sandia is a National Security Laboratory providing scientific and engineering solutions to meet national needs for both government and industry. As part of this mission, the Intelligent Systems and Robotics Center conducts research and development in robotics and intelligent machine technologies. An overview of Sandia`s mobile robotics research is provided. Recent achievements and future directions in the areas of coordinated mobile manipulation, small smart machines, world modeling, and special application robots are presented.

Morse, W.D.

1998-09-01T23:59:59.000Z

59

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

2011-06-20T23:59:59.000Z

60

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

Note: This page contains sample records for the topic "anyconnect secure mobility" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Transportation Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

62

Anchored Mobilities: Mobile Technology and Transnational Migration  

E-Print Network [OSTI]

Anchored Mobilities: Mobile Technology and Transnational Migration Amanda Williams Donald Bren Irvine, CA 92697-3440, USA jpd@ics.uci.edu ABSTRACT Mobile technologies are deployed into diverse social mobility. We present an ethnography of transnational Thai retirees and their uses of mobile technology

Dourish,Paul

63

Mobile Media Poetics  

E-Print Network [OSTI]

Cell Phone Culture: Mobile Technology in Everyday Life.as well as mobile communication technologies. In turn, wefor distribution via mobile communication technologies. Such

Raley, Rita

2009-01-01T23:59:59.000Z

64

Mobile OFDM communications  

E-Print Network [OSTI]

G. L. Stuber, Principles of Mobile Communications, Kluweranalysis of OFDM in a mobile environment, VehicularA statistical theory of mobile radio reception, Bell Syst.

Wang, Tiejun

2006-01-01T23:59:59.000Z

65

Approved Module Information for EE4016, 2014/5 Module Title/Name: Mobile Data Networks Module Code: EE4016  

E-Print Network [OSTI]

: Network planning. Cell fundamentals. Mobility management. Radio resources and power management. Security in wireless networks. Wireless WANs: GSM and TDMA technology. Mechanisms to support a mobile environment. CDMA technology. Mobile data networks. Mobile application protocols. Local Broadband and Ad Hoc Networks: Wireless

Neirotti, Juan Pablo

66

A Generic Approach to Simplification of Geodata for Mobile Applications  

E-Print Network [OSTI]

, tourism, security and disaster management. All mobile applications have characteristics in commonA Generic Approach to Simplification of Geodata for Mobile Applications Theodor Foerster, Jantien,stoter,kobben}@itc.nl Delft University of Technology, OTB, Section GIS-technology P.O. Box 5030, 2600 GA Delft

Kbben, Barend

67

Dynamic Analysis of Mobile Device Applications  

SciTech Connect (OSTI)

The On-Device Dynamic Analysis of Mobile Applications (ODAMA) project was started in an effort to protect mobile devices used in Industrial Control Systems (ICS) from cyber attack. Because mobile devices hide as much of the computer as possible, the users ability to assess the software running on their system is limited. The research team chose Googles Android platform for this initial research because it is open source and it would give us freedom in our approach, including the ability to modify the mobile devices operating system itself. The research team concluded that a Privileged Application was the right approach, and the result was ODAMA. This project is an important piece of the work to secure the expanding use of mobile devices with our nations critical infrastructure.

Corey Thuen

2013-01-01T23:59:59.000Z

68

FOILFEST :community enabled security.  

SciTech Connect (OSTI)

The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

2005-09-01T23:59:59.000Z

69

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6.

2011-06-20T23:59:59.000Z

70

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

2005-08-26T23:59:59.000Z

71

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

2007-06-29T23:59:59.000Z

72

Security Conditions  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

2000-09-18T23:59:59.000Z

73

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

74

SECURITY HANDBOOK 2 UH IT SECURITY HANDBOOK  

E-Print Network [OSTI]

Administration · 2-Factor Authentication Administration for PCI compliance · Web Site Security Scanning, please contact security@uh.edu. · Web Site Security Scanning · 2-Factor Authentication Administration

Azevedo, Ricardo

75

MobiTrust: Trust Management System in Mobile Social Computing Computer Science Department  

E-Print Network [OSTI]

MobiTrust: Trust Management System in Mobile Social Computing Juan Li Computer Science Department technology and social network service, mobile social network emerges as a new network paradigm, which characteristics. This paper presents a novel trust management system, termed MobileTrust, to establish secure

Li, Juan "Jen"

76

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

FROM: SUBJECT: USIUK Memorandum of Understanding between National Nuclear Security Administration's (NNSA) Associate Administrator for Defense Nuclear Security (AADNS)...

77

Security seal  

DOE Patents [OSTI]

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, Garth W. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

78

Mobile Resources  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challenge fundProject8Mistakes to Avoid Mistakes to AvoidMo YearMobile

79

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 cancels DOE O 472.2 Admin Chg 1.

2011-07-21T23:59:59.000Z

80

Mobile Media Poetics  

E-Print Network [OSTI]

J.L. and Sey, A. 2007. Mobile Communication and Society: AG. 2006. Cell Phone Culture: Mobile Technology in EverydayPortable, Pedestrian: Mobile Phones in Japanese Life, Ito,

Raley, Rita

2009-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "anyconnect secure mobility" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Border Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

82

Designing security into software  

E-Print Network [OSTI]

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

83

Security guide for subcontractors  

SciTech Connect (OSTI)

This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

Adams, R.C.

1991-01-01T23:59:59.000Z

84

Personnel Security Activities  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

2003-03-25T23:59:59.000Z

85

Global Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Global Nuclear Security Both DOE and the National Nuclear Security Administration are working to reduce the risk of nuclear proliferation and provide technologies to improve...

86

Security guide for subcontractors  

SciTech Connect (OSTI)

This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

Adams, R.C.

1993-06-01T23:59:59.000Z

87

Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop  

SciTech Connect (OSTI)

The workshop theme is Cyber Security: Beyond the Maginot Line Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglected or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyberspace including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more . . .

Sheldon, Frederick T [ORNL; Krings, Axel [ORNL; Yoo, Seong-Moo [ORNL; Mili, Ali [ORNL; Trien, Joseph P [ORNL

2006-01-01T23:59:59.000Z

88

PRECISIONTM The Dell PrecisionTM M4400 Mobile Workstation, a  

E-Print Network [OSTI]

THE DELL PRECISIONTM M4400 The Dell PrecisionTM M4400 Mobile Workstation, a powerhouse-Core Processors Up to 8GB1 of high bandwidth dual-channel 800MHz memory Data security options with Intel

Fiebig, Peter

89

A survey of results on mobile phone datasets analysis  

E-Print Network [OSTI]

In this paper, we review some advances made recently in the study of mobile phone datasets. This area of research has emerged a decade ago, with the increasing availability of large-scale anonymized datasets, and has grown into a stand-alone topic. We will survey the contributions made so far on the social networks that can be constructed with such data, the study of personal mobility, geographical partitioning, urban planning, and help towards development as well as security and privacy issues.

Blondel, Vincent D; Krings, Gautier

2015-01-01T23:59:59.000Z

90

Personnel Security Program Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

2000-11-16T23:59:59.000Z

91

Personnel Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

1998-05-22T23:59:59.000Z

92

Office of Security Assistance  

Broader source: Energy.gov [DOE]

The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

93

Cyber Security & Smart Grid  

E-Print Network [OSTI]

Cyber Security & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart... and communication protocols. ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Smart Grid Systems ?Current Cyber Security Issues ? Advanced Metering Infrastructure (AMI) Security ? The wireless devices are used in the smart meters located...

Shapiro, J.

2011-01-01T23:59:59.000Z

94

Using Operational Security (OPSEC) to Support a Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security: Defense in Depth Strategies The Chief Information Officer (CIO) at the U 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program...

95

Information Security: Coordination of Federal Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue...

96

Paradigms for Mobile Agent-Based Active Monitoring of Network Systems  

E-Print Network [OSTI]

Paradigms for Mobile Agent-Based Active Monitoring of Network Systems Anand Tripathi, Tanvir a framework together with a set of paradigms for mobile agent based active monitoring of network systems system policies. A system administrator can securely modify the monitor- ing policies and information

Tripathi, Anand

97

Coverage Control for A Mobile Robot Patrolling A Dynamic and Uncertain Environment  

E-Print Network [OSTI]

Coverage Control for A Mobile Robot Patrolling A Dynamic and Uncertain Environment Yi Guo and Zhihua Qu Abstract-- In mobile robot applications such as cleaning and security patrolling, a fundamentally important problem is to design feasible trajectories and steering control so that the robot moves

Guo, Yi

98

Tandem mobile robot system  

DOE Patents [OSTI]

A robotic vehicle system for terrain navigation mobility provides a way to climb stairs, cross crevices, and navigate across difficult terrain by coupling two or more mobile robots with a coupling device and controlling the robots cooperatively in tandem.

Buttz, James H. (Albuquerque, NM); Shirey, David L. (Albuquerque, NM); Hayward, David R. (Albuquerque, NM)

2003-01-01T23:59:59.000Z

99

Ion mobility sensor system  

DOE Patents [OSTI]

An ion mobility sensor system including an ion mobility spectrometer and a differential mobility spectrometer coupled to the ion mobility spectrometer. The ion mobility spectrometer has a first chamber having first end and a second end extending along a first direction, and a first electrode system that generates a constant electric field parallel to the first direction. The differential mobility spectrometer includes a second chamber having a third end and a fourth end configured such that a fluid may flow in a second direction from the third end to the fourth end, and a second electrode system that generates an asymmetric electric field within an interior of the second chamber. Additionally, the ion mobility spectrometer and the differential mobility spectrometer form an interface region. Also, the first end and the third end are positioned facing one another so that the constant electric field enters the third end and overlaps the fluid flowing in the second direction.

Xu, Jun; Watson, David B.; Whitten, William B.

2013-01-22T23:59:59.000Z

100

Autonomous Virtual Mobile Nodes  

E-Print Network [OSTI]

This paper presents a new abstraction for virtual infrastructure in mobile ad hoc networks. An AutonomousVirtual Mobile Node (AVMN) is a robust and reliable entity that is designed to cope with theinherent difficulties ...

Dolev, Shlomi

2005-06-15T23:59:59.000Z

Note: This page contains sample records for the topic "anyconnect secure mobility" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Mobile Museum Tours 1 RUNNING HEAD: MOBILE MUSEUM TOURS  

E-Print Network [OSTI]

Mobile Museum Tours 1 RUNNING HEAD: MOBILE MUSEUM TOURS Using mobile technologies for multimedia MUSEUM TOURS Abstract Mobile technology was used to deliver learner-centred experiences to visitors: Across generations and cultures, Banff : Canada (2006)" #12;Mobile Museum Tours 2 RUNNING HEAD: MOBILE

Paris-Sud XI, Universit de

102

Investigating Energy and Security Trade-offs in the Classroom With the Atom LEAP Testbed  

E-Print Network [OSTI]

Investigating Energy and Security Trade-offs in the Classroom With the Atom LEAP Testbed Peter A. H seminar investi- gating potential trade-offs between security and energy consumption. Twenty tool for energy research and education. 1 Introduction Mobile and embedded devices face difficult trade

California at Los Angeles, University of

103

Mobile Conference Connection Conferencing  

E-Print Network [OSTI]

Mobile Conference Connection Conferencing · Help increase productivity while out of the office-mail meeting invitations from your mobile device · Access to "Click to Join" features · Initiate an Instant or other mobile devices can provide a quick and efficient means to respond to work demands. But, what

104

Mobile Technology Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes requirements, assigns responsibilities, and provides guidance for federal mobile technology management and employee use of both government furnished and personally-owned mobile devices within DOE and NNSA. Establishes requirements for use of User Agreements to govern mobile devices used for official duties. Does not cancel other directives.

2014-05-15T23:59:59.000Z

105

Information Security Group IY5512 Computer Security  

E-Print Network [OSTI]

for process that controls interactions between users and resources. · Access control system implements Information Security Group Agenda · Access control basics · ACLs and capabilities · Information flow policies· Information flow policies · Bell-LaPadula Model · Role-Based Access Control · Resources 3 Information Security

Mitchell, Chris

106

INFRASTRUCTURE SECURITY & ENERGY  

E-Print Network [OSTI]

price monitoring #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERYINFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Real Time Monitoring of Energy Infrastructure Status Patrick Willging, PE Office of Electricity

Schrijver, Karel

107

Office of Security Policy  

Broader source: Energy.gov [DOE]

The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

108

Data Security ROCKVILLE, MD  

E-Print Network [OSTI]

by respondent identification. Thus, data security plans must be tailored to the unique needs and concerns of each data set: a "one-security-plan-fits-all" approach is neither feasible nor desirable. Nevertheless

Rau, Don C.

109

Mobile Geographic Information Systems (GIS) for Humanitarian Demining  

E-Print Network [OSTI]

this goal, surveys of hazardous areas, describing their location and contents, are used to produce threat maps for a given location and secure adequate funding from donor organizations for clearance operations. The focus of this study is a mobile GIS system...

Dunbar, Matthew D.

2010-04-27T23:59:59.000Z

110

Finance, IT Operations& InformationSecurity Dear Colleagues,  

E-Print Network [OSTI]

-examine collectively the customer service aspect of our grant and contract management. A dozen SEAS members, including, is Information Technology. While Indir has stepped into the role of Interim IT Director to keep the proverbial and to check out interesting tips about securing mobile devices and avoiding phishing scams. Harry Dumay, Ph

111

Experiences from a Transportation Security Sensor Network Field Trial  

E-Print Network [OSTI]

(TSSN), which is based on open software systems and Service Oriented Architecture (SOA) principles, has Security Sensor Network (TSSN), based on Service Oriented Architecture (SOA) [3] principles, for monitoring oriented architecture, Mobile Rail Net- work, Trade Data Exchange, Virtual Network Operations Center I

Kansas, University of

112

Quantifying Security in Hybrid Cellular Markus Jakobsson1  

E-Print Network [OSTI]

Quantifying Security in Hybrid Cellular Networks Markus Jakobsson1 and Liu Yang2 1 School and recipients to provide auditing information. Our scheme is an exten- sion of [6], where the authors addressed be expected from the use of this approach. For one thing, the energy consumption of the mobile device can

113

Security Provisioning in Pervasive Environments Using Multi-objective Optimization  

E-Print Network [OSTI]

Security Provisioning in Pervasive Environments Using Multi-objective Optimization Rinku Dewri {rinku,iray,indrajit,whitley}@cs.colostate.edu Abstract. Pervasive computing applications involve applications. For example, if a communication is between a mobile de- vice and a base station

Ray, Indrakshi

114

Wormhole-Resilient Secure Neighbor Discovery in Underwater Acoustic Networks  

E-Print Network [OSTI]

), Unmanned Underwater Vehicles (UUV), and surface stations, and nearby nodes communicate via acoustic ratherWormhole-Resilient Secure Neighbor Discovery in Underwater Acoustic Networks Rui Zhang and Yanchao in underwater acoustic networks (UANs) with floating node mobility. In hostile environments, neighbor discovery

Zhang, Rui

115

Towards the Secure Initialisation of a Personal Distributed Environment  

E-Print Network [OSTI]

network that takes a user-centric view of per- sonal devices to create a purely virtual personal network, their home, office, car, or personal surround- ings. These devices may be fixed or mobile, and mayTowards the Secure Initialisation of a Personal Distributed Environment Scarlet Schwiderski

Tomlinson, Allan

116

Personnel Security Program Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

2001-07-12T23:59:59.000Z

117

Security system signal supervision  

SciTech Connect (OSTI)

This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

1991-09-01T23:59:59.000Z

118

Lemnos interoperable security project.  

SciTech Connect (OSTI)

With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

Halbgewachs, Ronald D.

2010-03-01T23:59:59.000Z

119

Tag: Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR TableE9. TotalNumberSecurity Tag: Security

120

Tag: security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR TableE9.security Tag: security Displaying 1 -

Note: This page contains sample records for the topic "anyconnect secure mobility" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Secure Storage | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 % bP.SecureSecure Storage

122

What is Security? A perspective on achieving security  

SciTech Connect (OSTI)

This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

Atencio, Julian J.

2014-05-05T23:59:59.000Z

123

Ad Hoc Mobile Networking and General Mobility Issues Ramon Lawrence  

E-Print Network [OSTI]

Ad Hoc Mobile Networking and General Mobility Issues Ramon Lawrence Department of Computer Science of networking and mobility come many interesting opportunities and difficult problems. Mobile computing allows around in the environment. Unfortunately, to support this mobility places several restrictive restraints

Lawrence, Ramon

124

Securing Internet Routing Securing Internet Routing  

E-Print Network [OSTI]

Plane (Routing protocols): S h b d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc Set up paths between nodes [Kent Lynn Seo 00] Listen-Whisper, etc., Data Plane: Given d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc Set up paths

Goldberg, Sharon

125

Mobile Ice Nucleus Spectrometer  

SciTech Connect (OSTI)

This first year report presents results from a computational fluid dynamics (CFD) study to assess the flow and temperature profiles within the mobile ice nucleus spectrometer.

Kulkarni, Gourihar R.; Kok, G. L.

2012-05-07T23:59:59.000Z

126

ARM Mobile Facilities  

ScienceCinema (OSTI)

This video provides an overview of the ARM Mobile Facilities, two portable climate laboratories that can deploy anywhere in the world for campaigns of at least six months.

Orr, Brad; Coulter, Rich

2014-09-15T23:59:59.000Z

127

BUILDING MOBILE EXPERIENCES Frank Bentley  

E-Print Network [OSTI]

BUILDING MOBILE EXPERIENCES Frank Bentley Principal Staff Research Scientist Motorola Mobility of teaching mobile apps class at MIT ! Strong believer in user-inspired innovation ! Have brought several new? ! Investigating the interaction between people and mobile computing devices ! Creating compelling mobile

Glinz, Martin

128

NetInf Mobile Node Architecture and Mobility Management based on LISP Mobile Node  

E-Print Network [OSTI]

NetInf Mobile Node Architecture and Mobility Management based on LISP Mobile Node Muhammad Shoaib an architecture for Network of Information mobile node (NetInf MN). It bears characteristics and features of basic a virtual node layer for mobility management in the Network of Information. Therefore, by adopting

Paris-Sud XI, Université de

129

Jebeile. The Mobile Subject Assistant THE MOBILE SUBJECT ASSISTANT: A MOBILE COURSE TOOL  

E-Print Network [OSTI]

Jebeile. The Mobile Subject Assistant THE MOBILE SUBJECT ASSISTANT: A MOBILE COURSE TOOL of Wollongong ABSTRACT: The rapid adoption rate of mobile phones coupled with advancements in supporting technologies suggests mobile phones may now be a viable tool for classroom use. In this paper we introduce

Rubinstein, Benjamin

130

Energy Security Initiatives Update  

Broader source: Energy.gov (indexed) [DOE]

-- Aurora Electrical System Vulnerability Assessment and Mitigation Actions FUPWG-EEI CA Net Zero Energy Initiative (Vandenberg AFB, CA) Energy Security Tiger Team Visit (Ft...

131

Energy Security Initiatives Update  

Broader source: Energy.gov [DOE]

Presentationgiven at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meetinglists Federal government energy security initiatives.

132

Control Systems Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

systems within the nation's critical infrastructure. The CSSP assists control systems vendors and asset ownersoperators in identifying security vulnerabilities and developing...

133

Industrial Security Specialst  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve in a developmental capacity assisting senior specialists in carrying out a variety of industrial security and oversight functions.

134

Nevada National Security Site  

Broader source: Energy.gov [DOE]

HISTORYIn 1950, President Truman established what is now known as the Nevada National Security Site (NNSS) to perform nuclear weapons testing activities. In support of national defense initiatives...

135

Securing Cloud Storage Service.  

E-Print Network [OSTI]

?? Cloud computing brought flexibility, scalability, and capital cost savings to the IT industry. As more companies turn to cloud solutions, securing cloud based services (more)

Zapolskas, Vytautas

2012-01-01T23:59:59.000Z

136

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

the safety, security and effectiveness of the nuclear deterrent without underground nuclear testing, consistent with the principles of the Stockpile Management Program...

137

TEC Information Security  

Broader source: Energy.gov (indexed) [DOE]

External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

138

Cyber Security Architecture Guidelines  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

2001-03-08T23:59:59.000Z

139

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Project Reviews, etc., except those specifically reserved for the Administrator for the National Nuclear Security Administration and the Deputy Secretary. cc: Mike Hickman. NA-Stl...

140

NNSA orders security enhancements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

badge or valid driver's license) before proceeding, and will be asked to vouch for other vehicle occupants. LOS ALAMOS, N. M., Dec. 21, 2012-The National Nuclear Security...

Note: This page contains sample records for the topic "anyconnect secure mobility" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Hazardous Material Security (Maryland)  

Broader source: Energy.gov [DOE]

All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

142

National Nuclear Security Administration  

Broader source: Energy.gov (indexed) [DOE]

and Related Structures within TA-3 at Los Alamos National Laboratory, Los Alamos, New Mexico U. S. Department of Energy National Nuclear Security Administration Los Alamos Area...

143

National Security Initiatives | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Our Primary Thrusts A science-based approach to cyber security Develop breakthrough nuclear forensic science Expand bioinformatics program to address critical biosurveillance gaps...

144

Benefits of Using Mobile Transformers and Mobile Substations...  

Broader source: Energy.gov (indexed) [DOE]

Benefits of Using Mobile Transformers and Mobile Substations for Rapidly Restoring Electrical Service: a Report to the United States Congress Pursuant to Section 1816 of the Energy...

145

Enhancing mobile browsing and reading  

E-Print Network [OSTI]

Although the web browser has become a standard interface for information access on the Web, the mobile web browser on the smartphone does not hold the same interest to mobile users. A survey with 11 mobile users shows that ...

Yu, Chen-Hsiang

146

Mobile Malware Propagation and Defense  

E-Print Network [OSTI]

5.2 Scanner errors in mobile data . . . . . . . . 5.2.113th ACM International Conference on Mobile Computing andGao. An Epidemic Model of Mobile Phone Virus. In Proceedings

Zyba, Gjergji

147

Smart Mobility Dutch Automotive  

E-Print Network [OSTI]

Smart Mobility #12;Dutch Automotive Industry 300 companies 45k employees 17B revenue #12;Dutch Automotive Industry Focus area's: · Vehicle efficiency · Cooperative Mobility #12;Freedom, prosperity, fun;Automotive Technology Car as sustainable zero emission vehicles #12;Automotive Technology Electromagnetic car

Franssen, Michael

148

"Mobile money" services permit  

E-Print Network [OSTI]

"Mobile money" services permit cell phone users to send small amounts of money via text message to their friends and relatives. There are over 90 mobile money services in the world today, mainly in emergingTure oF Money october 2012 - April 2013 Muriel Ansley reynolds exhibit GAllery For the full exhibit checklist

Loudon, Catherine

149

NISTIR 7617 Mobile Forensic  

E-Print Network [OSTI]

NISTIR 7617 Mobile Forensic Reference Materials: AMethodologyandReification WayneJansen AurélienDelaitre i #12;Mobile Forensic Reference Materials: A Methodology and Reification Wayne Jansen Aurélien of forensic tools. It describes an application and data set developed to populate identity modules

150

Enhance your Cyber Security Knowledge  

E-Print Network [OSTI]

Enhance your Cyber Security Knowledge About NPS CS FUNDAMENTALS: Create a strong foundational by increasing the effectiveness of the armed forces of the United States and its allies. Cyber Security-4015 About CISR #12;Cyber Security Adversarial Techniques Cyber Security Defense Cyber Security Fundamentals

151

Operational Security (OPSEC) Reminder | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Operational Security (OPSEC) Reminder Operational Security (OPSEC) Reminder June 3, 2014 - 1:24pm Addthis Operational Security (OPSEC) Reminder Operational Security (OPSEC)...

152

Secure Manufacturing | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 % bP.Secure Manufacturing

153

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

1997-03-27T23:59:59.000Z

154

December 2003 SECURITY CONSIDERATIONS  

E-Print Network [OSTI]

December 2003 SECURITY CONSIDERATIONS IN THE INFORMATION SYSTEM DEVELOPMENT LIFE CYCLE Shirley security early in the information system development life cycle (SDLC), you may be able to avoid higher and a generic system development life cycle for illustrative purposes, the basic con cepts can be applied

Perkins, Richard A.

155

DATABASE SECURITY APPLICATIONS  

E-Print Network [OSTI]

DATABASE SECURITY #12;APPLICATIONS #12;Polyinstantiation for Cover Stories Ravi S. Sandhu and Sushil Jajodia* Center for Secure Information Systems & Department of Information and Software Systems Engineering George Mason University Falffax, VA 22030, USA emaih {sandhu, jajodia}Qsitevax.gmu.edu Abstract

Sandhu, Ravi

156

Incidents of Security Concern  

SciTech Connect (OSTI)

This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

Atencio, Julian J.

2014-05-01T23:59:59.000Z

157

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

1992-10-19T23:59:59.000Z

158

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Cancels DOE P 470.1.

2010-12-29T23:59:59.000Z

159

SELECTING INFORMATION TECHNOLOGY SECURITY  

E-Print Network [OSTI]

be selected and used within the organization's overall program to man age the design, development, and maintenance of its IT security infra structure, and to protect the confiden tiality, integrity objectives and to protect information. Guide to Selecting Information Technology Security Products NIST

160

December 2007 SECURING EXTERNAL  

E-Print Network [OSTI]

devices such as desktop and laptop computers, personal digital assistants (PDAs), and cell phones. These teleworkers use devices such as desktop and laptop computers, personal digital assistants (PDAs), and cellDecember 2007 SECURING EXTERNAL COMPUTERS AND OTHER DEVICES USED BY TELEWORKERS SECURING EXTERNAL

Note: This page contains sample records for the topic "anyconnect secure mobility" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Locative Life: Geocaching, Mobile Gaming, and Embodiment  

E-Print Network [OSTI]

Gaming, Geocaching, Mobile Technologies, GPS, Embodiment 1.activity for many mobile technology users. While Manovich

Farman, Jason

2009-01-01T23:59:59.000Z

162

Update on mobile applications in dermatology  

E-Print Network [OSTI]

mobile application devices surpassed personal computers foruse of mobile devices surpasses that of personal computers,

Patel, Shivani; Eluri, Madhu; Boyers, Lindsay N; Karimkhani, Chante; Dellavalle, Robert

2015-01-01T23:59:59.000Z

163

Indirection and computer security.  

SciTech Connect (OSTI)

The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

Berg, Michael J.

2011-09-01T23:59:59.000Z

164

International Nuclear Security  

SciTech Connect (OSTI)

This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

Doyle, James E. [Los Alamos National Laboratory

2012-08-14T23:59:59.000Z

165

Office of Departmental Personnel Security  

Broader source: Energy.gov [DOE]

The Office of Departmental Personnel Security serves as the central leader and advocate vested with the authority to ensure consistent and effective implementation of personnel security programs Department-wide (including for the National Nuclear Security Administration (NNSA).

166

Departmental Cyber Security Management Policy  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

2001-05-08T23:59:59.000Z

167

Mobile Learning Initiative (MLI) Spring 2012 Mobile Learning Campus Climate  

E-Print Network [OSTI]

Page | 1 Mobile Learning Initiative (MLI) Spring 2012 Mobile Learning Campus Climate Assessment.............................................................................................................................. 30 A. Demographics of 2012 Faculty Mobile Computing Survey Respondents B. Demographics of 2011 and 2012 Student Mobile Computing Survey Respondents C. Example Faculty Comments from Open-Ended Feedback D

Barrash, Warren

168

Headquarters Facilities Master Security Plan  

Energy Savers [EERE]

Security Briefing. Failure of any employee to complete the SF-312 results in the termination of hisher security clearance and denial of access to classified matter. The badge...

169

Energy Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Security SHARE Energy Security ORNL has supported the DOE Cybersecurity for Energy Delivery Systems (CEDS) program in making advances in cybersecurity capabilities for...

170

Smart-Grid Security Issues  

SciTech Connect (OSTI)

TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

2010-01-29T23:59:59.000Z

171

ANNUAL SECURITY FIRE SAFETY REPORT  

E-Print Network [OSTI]

ANNUAL SECURITY AND FIRE SAFETY REPORT OCTOBER 1, 2013 DARTMOUTH COLLEGE http................................................................................................................................................................... 7 ANNUAL SECURITY REPORT........................................................................................................................9 PREPARATION OF THE REPORT AND DISCLOSURE OF CRIME STATISTICS

172

PROTECT: Proximity-based Trust-advisor using Encounters for Mobile Societies  

E-Print Network [OSTI]

Many interactions between network users rely on trust, which is becoming particularly important given the security breaches in the Internet today. These problems are further exacerbated by the dynamics in wireless mobile networks. In this paper we address the issue of trust advisory and establishment in mobile networks, with application to ad hoc networks, including DTNs. We utilize encounters in mobile societies in novel ways, noticing that mobility provides opportunities to build proximity, location and similarity based trust. Four new trust advisor filters are introduced - including encounter frequency, duration, behavior vectors and behavior matrices - and evaluated over an extensive set of real-world traces collected from a major university. Two sets of statistical analyses are performed; the first examines the underlying encounter relationships in mobile societies, and the second evaluates DTN routing in mobile peer-to-peer networks using trust and selfishness models. We find that for the analyzed trace...

Kumar, Udayan; Helmy, Ahmed

2010-01-01T23:59:59.000Z

173

MASS POLITICAL MOBILIZATION  

E-Print Network [OSTI]

................................................................................................................................................... MASS POLITICAL MOBILIZATION ................................................................................................................................................... Boix & Stokes: The Oxford Handbook of Comparative Politics Boixandstokes-chap21 Revise Proof page 497 20.4.2007 12:41pm #12;Boix & Stokes: The Oxford Handbook of Comparative Politics Boixandstokes-chap21

174

Contextualizing urban mobile fabrics  

E-Print Network [OSTI]

This thesis is focus on the urban fabric issues. To be more specific, I will focus on the "Mobile Fabrics" within the larger Asian urban context. Instead of working with a specific geographical site; I will focus on the ...

Lin, Michael Chia-Liang

2007-01-01T23:59:59.000Z

175

l ProteinDF : account / password  

E-Print Network [OSTI]

#12;FOCUS 3 #12;FOCUS l SSL-VPN : account / password l sshssh.j-focus.jp : account / password 4 SSL-VPN ssh batch ssh.j-focus.jp E #12;SSL-VPN l : http://www.j-focus.jp/sslvpn/ Cisco AnyConnect Secure

Fukai, Tomoki

176

National Security Science  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy LoginofNational SecuritySecurity

177

March 24, 2008 Databases: Security 1 Database Security and Authorization  

E-Print Network [OSTI]

to control login process by the DBMS Inference control The countermeasures to statistical database security database #12;March 24, 2008 Databases: Security 3 Chapter Outline Introduction Access Control Methods Policy System-related Security levels and categories Security Threats Loss of integrity Loss

Adam, Salah

178

INSTITUTE FOR CYBER SECURITY Application-Centric Security  

E-Print Network [OSTI]

INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

Sandhu, Ravi

179

Support Mobile and Distributed Applications with Named Data Networking  

E-Print Network [OSTI]

Mobile IP and itsproblem . . . . . . . . . . . . . . . . . . .Mobile IP: anSupport of mobile data consumers . . . . . . . . . . . . . .

Zhu, Zhenkai

2013-01-01T23:59:59.000Z

180

Quantum random number generation on a mobile phone  

E-Print Network [OSTI]

Quantum random number generators (QRNGs) can significantly improve the security of cryptographic protocols, by ensuring that generated keys cannot be predicted. However, the cost, size, and power requirements of current QRNGs has prevented them from becoming widespread. In the meantime, the quality of the cameras integrated in mobile telephones has improved significantly, so that now they are sensitive to light at the few-photon level. We demonstrate how these can be used to generate random numbers of a quantum origin.

Bruno Sanguinetti; Anthony Martin; Hugo Zbinden; Nicolas Gisin

2014-05-02T23:59:59.000Z

Note: This page contains sample records for the topic "anyconnect secure mobility" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

AMALGAMATED SECURITY COMMUNITIES  

E-Print Network [OSTI]

This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

Harvey, Andrew Stephen

2011-08-31T23:59:59.000Z

182

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

1988-01-22T23:59:59.000Z

183

Safety, Security & Fire Report  

E-Print Network [OSTI]

2013 Safety, Security & Fire Report Stanford University #12;Table of Contents Public Safety About the Stanford University Department of Public Safety Community Outreach & Education Programs Emergency Access Transportation Safety Bicycle Safety The Jeanne Clery and Higher Education Act Timely Warning

Straight, Aaron

184

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

2007-05-25T23:59:59.000Z

185

Operations Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

1992-04-30T23:59:59.000Z

186

Engineering secure software  

E-Print Network [OSTI]

In recent years computer software has gained notoriety for the endemic nature of security problems in software. These problems have been exploited with malicious intent by attackers. Most attempts at fixing these problems have been after...

Jetly, Prateek

2001-01-01T23:59:59.000Z

187

Performance Impacts of Lower-Layer Cryptographic Methods in Mobile Wireless Ad Hoc Networks  

SciTech Connect (OSTI)

In high consequence systems, all layers of the protocol stack need security features. If network and data-link layer control messages are not secured, a network may be open to adversarial manipulation. The open nature of the wireless channel makes mobile wireless mobile ad hoc networks (MANETs) especially vulnerable to control plane manipulation. The objective of this research is to investigate MANET performance issues when cryptographic processing delays are applied at the data-link layer. The results of analysis are combined with modeling and simulation experiments to show that network performance in MANETs is highly sensitive to the cryptographic overhead.

VAN LEEUWEN, BRIAN P.; TORGERSON, MARK D.

2002-10-01T23:59:59.000Z

188

Incidents of Security Concern  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

2004-03-17T23:59:59.000Z

189

SECURING RADIO FREQUENCY IDENTIFICATION (RFID)  

E-Print Network [OSTI]

business process for an organization; as a result, the security risks for RFID systems and the controls for an organization; as a result, the security risks for RFID systems and the controls available to address themMay 2007 SECURING RADIO FREQUENCY IDENTIFICATION (RFID) SYSTEMS SECURING RADIO FREQUENCY

190

ANNUAL SECURITY & FIRE SAFETY REPORT  

E-Print Network [OSTI]

ANNUAL SECURITY & FIRE SAFETY REPORT 2014 A guide to policies, procedures, practices, and programs implemented to keep students, faculty, and staff safe and facilities secure. www.montana.edu/reports/security.pdf #12;Inside this Report 2014 Annual Security and Fire Safety Report for Reporting Year 2013

Maxwell, Bruce D.

191

Lemnos Interoperable Security Program  

SciTech Connect (OSTI)

The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or ?? tunnels?, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

2012-01-31T23:59:59.000Z

192

Mobile systems capability plan  

SciTech Connect (OSTI)

This plan was prepared to initiate contracting for and deployment of these mobile system services. 102,000 cubic meters of retrievable, contact-handled TRU waste are stored at many sites around the country. Also, an estimated 38,000 cubic meters of TRU waste will be generated in the course of waste inventory workoff and continuing DOE operations. All the defense TRU waste is destined for disposal in WIPP near Carlsbad NM. To ship TRU waste there, sites must first certify that the waste meets WIPP waste acceptance criteria. The waste must be characterized, and if not acceptable, subjected to additional processing, including repackaging. Most sites plan to use existing fixed facilities or open new ones between FY1997-2006 to perform these functions; small-quantity sites lack this capability. An alternative to fixed facilities is the use of mobile systems mounted in trailers or skids, and transported to sites. Mobile systems will be used for all characterization and certification at small sites; large sites can also use them. The Carlsbad Area Office plans to pursue a strategy of privatization of mobile system services, since this offers a number of advantages. To indicate the possible magnitude of the costs of deploying mobile systems, preliminary estimates of equipment, maintenance, and operating costs over a 10-year period were prepared and options for purchase, lease, and privatization through fixed-price contracts considered.

NONE

1996-09-01T23:59:59.000Z

193

Sandia National Laboratories proof-of-concept robotic security vehicle  

SciTech Connect (OSTI)

Several years ago Sandia National Laboratories developed a prototype interior robot that could navigate autonomously inside a large complex building to air and test interior intrusion detection systems. Recently the Department of Energy Office of Safeguards and Security has supported the development of a vehicle that will perform limited security functions autonomously in a structured exterior environment. The goal of the first phase of this project was to demonstrate the feasibility of an exterior robotic vehicle for security applications by using converted interior robot technology, if applicable. An existing teleoperational test bed vehicle with remote driving controls was modified and integrated with a newly developed command driving station and navigation system hardware and software to form the Robotic Security Vehicle (RSV) system. The RSV, also called the Sandia Mobile Autonomous Navigator (SANDMAN), has been successfully used to demonstrate that teleoperated security vehicles which can perform limited autonomous functions are viable and have the potential to decrease security manpower requirements and improve system capabilities. 2 refs., 3 figs.

Harrington, J.J.; Jones, D.P.; Klarer, P.R.; Morrow, J.D.; Workhoven, R.M.; Wunderlin, F.

1989-01-01T23:59:59.000Z

194

Update on mobile applications in dermatology  

E-Print Network [OSTI]

FDA regulation of mobile health technologies. N Engl J Med.providers. As technology advances, mobile applications maytechnology continues to advance and physicians have greater access to mobile-

Patel, Shivani; Eluri, Madhu; Boyers, Lindsay N; Karimkhani, Chante; Dellavalle, Robert

2015-01-01T23:59:59.000Z

195

Mobile Persuasive Technologies for Rural Health  

E-Print Network [OSTI]

the potential of mobile technologies to deliver healthmotivation for using mobile technology in this context, andfeatures of mobile technology could be advantageous for

Ramachandran, Divya Lalitha

2010-01-01T23:59:59.000Z

196

Addressing the needs of mobile users  

E-Print Network [OSTI]

Based Localization Technology for Mobile Users . . . . . 3.1for designing future mobile technology. Methods There arefor ways future mobile technology might better address

Sohn, Timothy Youngjin

2008-01-01T23:59:59.000Z

197

Mobile Robot Sensing for Environmental Applications  

E-Print Network [OSTI]

infomechanical systems: A mobile wireless sensor networkMobile robot sensing for environmental applications Amarjeetsystems per- formed using mobile robot sensing systems. Both

2007-01-01T23:59:59.000Z

198

Mobile Persuasive Technologies for Rural Health  

E-Print Network [OSTI]

3.5.1 The Case for Mobile Phones . . . . . . . . . . . . . .ICTs 5 Mobile Persuasive Messages for Rural Health Promotionvideos. . . ASHAs using mobile phones. . . . . . . . Health

Ramachandran, Divya Lalitha

2010-01-01T23:59:59.000Z

199

Mobile Robot Sensing for Environmental Applications  

E-Print Network [OSTI]

Mobile robot sensing for environmental applications Amarjeetwith Mobile robot sensing for environmental applications (a)Mobile robot sensing for environmental applications only a

2007-01-01T23:59:59.000Z

200

Global Material Security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickr Flickr Editor'sshortGeothermal HeatStartedGirlsMaterial Security |

Note: This page contains sample records for the topic "anyconnect secure mobility" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

physical security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 Joint JOULECorrective Actions Program LANL TRU

202

safeguards and security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 JointProgram Consortium -

203

Nuclear Security 101 | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohnSecurityControls |Navy NuclearNuclear Science

204

Nuclear Security Enterprise | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohnSecurityControls |Navy NuclearNuclear

205

International Nuclear Security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickrinformation for and NovelFEG-SEMInterlibrary LoanExercises |Security

206

Defense Nuclear Security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to UserProduct: CrudeOffice ofINLNuclear Security | National Nuclear

207

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment ofDepartment ofofOxfordVeteransAdministrationPhysical Security Systems |

208

How to Download, Install, and Use Cisco AnyConnect VPN Client  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickr FlickrGuidedCH2MLLC HistoryVeterans |VirtualLoveApplyDownload,

209

U-196: Cisco AnyConnect VPN Client Two Vulnerabilities | Department of  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of EnergyofProject is on Track | Department ofLLCU-023: Debian||Vulnerability

210

An electromagnetic perpetuum mobile?  

E-Print Network [OSTI]

A charge moving freely in orbit around the Earth radiates according to Larmor's formula. If the path is closed, it would constitute a perpetuum mobile. The solution to this energy paradox is found in an article by C. M. DeWitt and B. DeWitt from 1964. The main point is that the equation of motion of a radiating charge is modified in curved spacetime. In the present article we explain the physics behind this modification, and use the generalized equation to solve the perpetuum mobile paradox.

yvind Grn; Sigurd Kirkevold Nss

2008-06-03T23:59:59.000Z

211

Correlation ion mobility spectroscopy  

DOE Patents [OSTI]

Correlation ion mobility spectrometry (CIMS) uses gating modulation and correlation signal processing to improve IMS instrument performance. Closely spaced ion peaks can be resolved by adding discriminating codes to the gate and matched filtering for the received ion current signal, thereby improving sensitivity and resolution of an ion mobility spectrometer. CIMS can be used to improve the signal-to-noise ratio even for transient chemical samples. CIMS is especially advantageous for small geometry IMS drift tubes that can otherwise have poor resolution due to their small size.

Pfeifer, Kent B. (Los Lunas, NM); Rohde, Steven B. (Corrales, NM)

2008-08-26T23:59:59.000Z

212

Security Administration Production Office,  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 %Security and

213

SecuritySmart  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0SecuritySmart March 2009

214

Safety, Security & Environment  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared0 ResourceAwardsSafeguards and SecuritySafety for

215

MOBILE-TERMINATED DATA User's Guide  

E-Print Network [OSTI]

MOBILE-TERMINATED DATA User's Guide Iridium Satellite LLC Rev. 2; February 1, 2002 #12;MOBILE................................................................................................................................3 1.1 IRIDIUM MOBILE TERMINATED DATA CONNECTIVITY ..........................................................................................................................7 4 Mobile Terminated Call Scenarios

Ashley, Michael C. B.

216

Webinar: Fuel Cell Mobile Lighting  

Broader source: Energy.gov [DOE]

Video recording of the Fuel Cell Technologies Office webinar, Fuel Cell Mobile Lighting, originally presented on November 13, 2012.

217

Personnel Security - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2.2 Admin Chg 1, Personnel Security by Mark Pekrul Functional areas: Administrative Change, Personnel Security, Safety and Security The order establishes requirements that will...

218

Personnel Security - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

72.2 Chg 1, Personnel Security by Mark Pekrul Functional areas: Personnel Security, Security, Human Capital The order establishes requirements that will enable DOE to operate a...

219

Security enhanced with increased vehicle inspections  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security enhanced with increased vehicle inspections Security measures increase as of March: vehicle inspections won't delay traffic New increased security procedures meet LANL's...

220

On Cyber Security for Networked Control Systems  

E-Print Network [OSTI]

her students on security of process control systems. I amcyber-security tools for process control systems. In theon the security mechanisms of process control systems, few

Amin, Saurabh

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "anyconnect secure mobility" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Mobile lighting apparatus  

DOE Patents [OSTI]

A mobile lighting apparatus includes a portable frame such as a moveable trailer or skid having a light tower thereon. The light tower is moveable from a stowed position to a deployed position. A hydrogen-powered fuel cell is located on the portable frame to provide electrical power to an array of the energy efficient lights located on the light tower.

Roe, George Michael; Klebanoff, Leonard Elliott; Rea, Gerald W; Drake, Robert A; Johnson, Terry A; Wingert, Steven John; Damberger, Thomas A; Skradski, Thomas J; Radley, Christopher James; Oros, James M; Schuttinger, Paul G; Grupp, David J; Prey, Stephen Carl

2013-05-14T23:59:59.000Z

222

ata security feature: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing...

223

Mobile Device Policy & Program Considerations  

E-Print Network [OSTI]

Page 1 Mobile Device Policy & Program Considerations To BYOD or not to BYOD (bring to manage the use of mobile devices within their corporate resources. Every business will naturally have different mobility requirements, and developing a policy in the first place, let alone an appropriate policy

Fisher, Kathleen

224

Mobile Recommender Systems Francesco Ricci  

E-Print Network [OSTI]

Mobile Recommender Systems Francesco Ricci Faculty of Computer Science Free University of Bolzano, Italy fricci@unibz.it January 11, 2010 Abstract Mobile phones are becoming a primary platform for information access and when coupled with recommender systems technologies they can become key tools for mobile

Ricci, Francesco

225

Mobile Computig: Conclusions Evaggelia Pitoura  

E-Print Network [OSTI]

' & $ % Mobile Computig: Conclusions Evaggelia Pitoura Computer Science Department, University; ' & $ % Mobile Computing Models ffl What is the best way to partition a computation as well as the functionality of a system or application between stationary and mobile elements? Adaptivity: the functionality assigned

Pitoura, Evaggelia

226

Environmental Technology Verification of Mobile Sources Control...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Environmental Technology Verification of Mobile Sources Control Technologies Environmental Technology Verification of Mobile Sources Control Technologies 2005 Diesel Engine...

227

Safety and Security What do Safety/Security work with?  

E-Print Network [OSTI]

Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with Police reports · Education in "First medical aid" · Education in laboratory safety #12;If something

228

GAANN -Computer Systems Security GAANN Computer Systems Security  

E-Print Network [OSTI]

GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important? ­ Computing devices have a large impact on our daily life ­ Guaranteeing that the devices perform as desired

Alpay, S. Pamir

229

National Security System Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

2007-03-08T23:59:59.000Z

230

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

1995-09-28T23:59:59.000Z

231

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

2011-07-21T23:59:59.000Z

232

September 2004 INFORMATION SECURITY  

E-Print Network [OSTI]

September 2004 INFORMATION SECURITY WITHIN THE SYSTEM DEVELOPMENT LIFE CYCLE Annabelle Lee of Standards and Technology Many System Development Life Cycle (SDLC) models exist that can be used. This model assumes that the system will be delivered near the end of its life cycle. Another SDLC model uses

233

Headquarters Security Operations  

Broader source: Energy.gov [DOE]

DOE strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; manages access authorization functions; ensures that executives and dignitaries are fully protected, and supports efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

234

Metaphors for cyber security.  

SciTech Connect (OSTI)

This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

2008-08-01T23:59:59.000Z

235

Information Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

2010-10-12T23:59:59.000Z

236

Information Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

2009-01-16T23:59:59.000Z

237

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

2005-08-26T23:59:59.000Z

238

A network security monitor  

SciTech Connect (OSTI)

The study of security in computer networks is a rapidly growing area of interest because of the proliferation of networks and the paucity of security measures in most current networks. Since most networks consist of a collection of inter-connected local area networks (LANs), this paper concentrates on the security-related issues in a single broadcast LAN such as Ethernet. Specifically, we formalize various possible network attacks and outline methods of detecting them. Our basic strategy is to develop profiles of usage of network resources and then compare current usage patterns with the historical profile to determine possible security violations. Thus, our work is similar to the host-based intrusion-detection systems such as SRI's IDES. Different from such systems, however, is our use of a hierarchical model to refine the focus of the intrusion-detection mechanism. We also report on the development of our experimental LAN monitor currently under implementation. Several network attacks have been simulated and results on how the monitor has been able to detect these attacks are also analyzed. Initial results demonstrate that many network attacks are detectable with our monitor, although it can surely be defeated. Current work is focusing on the integration of network monitoring with host-based techniques. 20 refs., 2 figs.

Heberlein, L.T.; Dias, G.V.; Levitt, K.N.; Mukherjee, B.; Wood, J.; Wolber, D. (California Univ., Davis, CA (USA). Dept. of Electrical Engineering and Computer Science)

1989-11-01T23:59:59.000Z

239

ARMY Energy Security Considerations  

E-Print Network [OSTI]

ARMY Energy Security Considerations Don Juhasz, PE, CEM HQDA, OACSIM, DAIM-FDF Telephone: (703-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 Army Energy · · · · FOREIGN OIL 2 Situation OIL & GAS LIQUIDS 38% Rise in NTV Fuel Use 35% of DoD utilities 21% of Fed government 11

240

Transmission Line Security Monitor  

ScienceCinema (OSTI)

The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

None

2013-05-28T23:59:59.000Z

Note: This page contains sample records for the topic "anyconnect secure mobility" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Departmental Personnel Security- Clearance Automation  

Broader source: Energy.gov [DOE]

The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

242

Database Security: A Historical Perspective  

E-Print Network [OSTI]

The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

Lesov, Paul

2010-01-01T23:59:59.000Z

243

System security Dr Len Hamey  

E-Print Network [OSTI]

, firewalls, detecting intrusions) Security process cycle policy implementation administration audit risk access with firewall Use generic service banners Use intrusion detection system that can detect;2 Security Services Confidentiality service. Authentication service. Integrity service. Access Control

Hamey, Len

244

Contributory Group Key Agreement Protocols, Revisited for Mobile Ad-Hoc Groups  

E-Print Network [OSTI]

Contributory Group Key Agreement Protocols, Revisited for Mobile Ad-Hoc Groups Mark Manulis Horst of various group-oriented applications for mo- bile ad-hoc groups requires a group secret shared between all- and wide-area wired networks, can also be used in ad-hoc sce- narios because of the similar security

Manulis, Mark

245

Target Tracking with Limited Sensing Range in Autonomous Mobile Sensor Networks  

E-Print Network [OSTI]

, security surveillance [1], [2]. Target tracking is a critical problem in the field of sensor networks, passive infrared (PIR) sensors can detect the 1The work is partially supported by NSFC under Grants, in this paper, we consider the mobile sensors equipped with both PIR module and ultrasonic sensing module

Boyer, Edmond

246

REST-Style Architecture and the Development of Mobile Health Care Solutions  

E-Print Network [OSTI]

describes the motivations and technical solutions chosen to build a REST API that can be easily integrated, RHIO, Lab Results, CCD, HL7, REST API, Web Services, JAX-RS, Security, Software Development Process. 1REST-Style Architecture and the Development of Mobile Health Care Solutions François Andry1 Daren

Andry, François

247

Energy Impact of Secure Computation on a Handheld Device # Zhiyuan Li + Rong Xu  

E-Print Network [OSTI]

and mobile computing. Many architectural and software e#orts have been initiated to improve the energy eEnergy Impact of Secure Computation on a Handheld Device # Zhiyuan Li + Rong Xu Department#oading is an important approach to save the energy consumption while improving perfor­ mance for wireless networked

Li, Zhiyuan

248

Safeguard Security and Awareness Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

2002-10-02T23:59:59.000Z

249

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

2008-08-12T23:59:59.000Z

250

Safeguards and Security Program References  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

2005-08-26T23:59:59.000Z

251

East Asian Security in 2025  

E-Print Network [OSTI]

East Asian Security in 2025 Who We Are Reagan Heavin Energy Adam Hudson State Capacity Brandon Krueger Military Sean ONeil Demographics Griffin Rozell Balance of Power Matt Suma Economy East Asian Security in 2025 China...: Competition, Cooperation, Plateau? Reagan Heavin Adam Hudson Brandon Krueger Sean ONeil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda Conclusions Projections Drivers Four Outcomes Questions East Asian Security in 2025...

Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

2008-01-01T23:59:59.000Z

252

January 2005 INTEGRATING IT SECURITY  

E-Print Network [OSTI]

January 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS technology (IT) security and capital planning and investment control (CPIC) processes have been performed taining appropriate security controls, both at the enterprise-wide and system level, commensurate

253

RECOMMENDED SECURITY CONTROLS FOR FEDERAL  

E-Print Network [OSTI]

May 2005 RECOMMENDED SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS: GUIDANCE FOR SELECTING COST-EFFECTIVE CONTROLS USING A RISK-BASED PROCESS Shirley Radack, Editor, Computer Security Division, Information-53, Recommended Security Controls for Federal Information Systems The basic questions that organizations should

254

August 2003 IT SECURITY METRICS  

E-Print Network [OSTI]

, efficiency, effectiveness, and the impact of the security controls. The process steps need not be sequen tial metrics program and provides examples of metrics based on the criti cal elements and security controls and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

255

Positioning Security from electronic warfare  

E-Print Network [OSTI]

Positioning Security from electronic warfare to cheating RFID and road-tax systems Markus Kuhn;Military positioning-security concerns Electronic warfare is primarily about denying or falsifying location of the importance of global positioning security has led to the military discipline of "navigation warfare". 5 #12

Kuhn, Markus

256

A Review of the Security of Insulin Pump Infusion Systems  

SciTech Connect (OSTI)

Insulin therapy has enabled diabetic patients to maintain blood glucose control to lead healthier lives. Today, rather than manually injecting insulin using syringes, a patient can use a device, such as an insulin pump, to programmatically deliver insulin. This allows for more granular insulin delivery while attaining blood glucose control. The insulin pump system features have increasingly benefited patients, but the complexity of the resulting system has grown in parallel. As a result security breaches that can negatively affect patient health are now possible. Rather than focus on the security of a single device, we concentrate on protecting the security of the entire system. In this paper we describe the security issues as they pertain to an insulin pump system that includes an embedded system of components including the insulin pump, continuous glucose management system, blood glucose monitor, and other associated devices (e.g., a mobile phone or personal computer). We detail not only the growing wireless communication threat in each system component, but we also describe additional threats to the system (e.g., availability and integrity). Our goal is to help create a trustworthy infusion pump system that will ultimately strengthen pump safety, and we describe mitigating solutions to address identified security issues both for now and in the future.

Klonoff, David C. [Mills-Peninsula Health Services; Paul, Nathanael R [ORNL; Kohno, Tadayoshi [University of Washington, Seattle

2011-01-01T23:59:59.000Z

257

Architectural support for enhancing security in clusters  

E-Print Network [OSTI]

to security, numerous security loopholes in cluster servers come to the forefront. Clusters usually rely on rewalls for their security, but the rewalls cannot prevent all security attacks; therefore, cluster systems should be designed to be robust...

Lee, Man Hee

2009-05-15T23:59:59.000Z

258

Mobile Biomass Pelletizing System  

SciTech Connect (OSTI)

This grant project examines multiple aspects of the pelletizing process to determine the feasibility of pelletizing biomass using a mobile form factor system. These aspects are: the automatic adjustment of the die height in a rotary-style pellet mill, the construction of the die head to allow the use of ceramic materials for extreme wear, integrating a heat exchanger network into the entire process from drying to cooling, the use of superheated steam for adjusting the moisture content to optimum, the economics of using diesel power to operate the system; a break-even analysis of estimated fixed operating costs vs. tons per hour capacity. Initial development work has created a viable mechanical model. The overall analysis of this model suggests that pelletizing can be economically done using a mobile platform.

Thomas Mason

2009-04-16T23:59:59.000Z

259

Line Management Perspective: National Nuclear Security Administration...  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration (NNSA) Line Management Perspective: National Nuclear Security Administration (NNSA) Addthis Description Slide Presentation by Jim...

260

Workforce Statistics - Office of Secure Transportation | National...  

National Nuclear Security Administration (NNSA)

Office of Secure Transportation | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation...

Note: This page contains sample records for the topic "anyconnect secure mobility" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Secretary Richardson Accepts Recommendations for Improving Security...  

National Nuclear Security Administration (NNSA)

Secretary Richardson Accepts Recommendations for Improving Security at Nuclear Weapons Laboratories | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS...

262

Security Science & Technology | Nuclear Science | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Nuclear Security Science & Technology Border Security Comprehensive Vulnerability and Threat Analysis Consequence Management, Safeguards, and Non-Proliferation Tools Export...

263

Nightmares with Mobile Devices Are Just Around the Corner!  

SciTech Connect (OSTI)

Mobile Devices (MDs) such as Personal Digital Assistants (PDAs), smart phones, handheld personal computers, and Tablet PCs, are proliferating in the marketplace. Cheap and ubiquitous mobile computing devices represent computings fifth wave [1], bringing about new opportunities in the marketplace. As MDs become more powerful and commonplace with ubiquitous connectivity, the line that currently divides these handheld devices from typical network computers will become very unclear. Mobile devices have become integrated into the business processes of both government and commercial institutions. MDs are small, portable, and able to store large amounts of information. The breadth of communication options (infrared, wireless, docking station) for MDs introduces many security risks. Some of the problems associated with MDs are: easy to loose, misplace, or have stolen, potential loss/comprise of company data (user ids, passwords, contacts, sensitive documentation, credit card numbers), increases the opportunity for a backdoor into an enterprises network, lack of authentication and limited logging capability. The use of these devices poses a risk to the security of an organization.

Kurt Derr

2007-03-01T23:59:59.000Z

264

Security seal. [Patent application  

DOE Patents [OSTI]

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, G.W.

1981-11-17T23:59:59.000Z

265

NNSA orders security enhancements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | National Nuclear SecurityAdministration

266

National Security Initiatives | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohn Cyber Security Nuclear Forensics Bioinformatics

267

Security Clearances; Limitations  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of Energyof the Americas | Department ofofDeliveredSectionSecuring theSEC. 1072.

268

Strengthening Global Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBiSiteNeutronStrategic Plan The

269

Parasitic mobility for sensate media  

E-Print Network [OSTI]

Distributed sensor networks offer many new capabilities for monitoring environments with applicability to medical, industrial, military, anthropological, and experiential fields. By making such systems mobile, we increase ...

Laibowitz, Matthew Joel, 1975-

2004-01-01T23:59:59.000Z

270

A demonstration mobility experiment  

E-Print Network [OSTI]

Corporation, Albuquerque& New Nhxico& for his assl. stance and advice in the preparation of the crystslsl snd my wife, Ellen, who corrected gram&asr& typed, proofread& and offered sncouragesmnt throughout the comple- tion of this thesis, I I I 8 I w... Shockley Haynes mobil. ty experiment. Tp Fig, 2. Sketch of oscilloscope trace from asr1y version of tha Shoo'klay Hagrnes momlity experiment, drift toward the eollsotor point with e velocity~? whereMLO the h ~ ability of a boles Ths Current tlsw...

Martin, Howard Lawrence

1961-01-01T23:59:59.000Z

271

Future Mobility in Maryland  

National Nuclear Security Administration (NNSA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartmentNationalRestart of the Review of theOFFICEACMEFUTURE MOBILITY IN NEVADA: Meeting the

272

MobileMatch App  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recovery challenge fundProject8Mistakes to Avoid Mistakes to AvoidMoMobileMatch

273

MOBILE AGENT MANAGEMENT Patricia Cuesta Rivalta  

E-Print Network [OSTI]

MOBILE AGENT MANAGEMENT By Patricia Cuesta Rivalta A Thesis Submitted to the Faculty of Graduate to Faculty of Graduate Studies and Research acceptance of this thesis MOBILE AGENT MANAGEMENT Submitted with the mobile agent technology. This thesis extends the Mobile Code Toolkit of the Perpetuum Mobile Procura

274

AGREEMENT FOR MOBILE TECHNOLOGY ACCESS AND ALLOWANCE  

E-Print Network [OSTI]

AGREEMENT FOR MOBILE TECHNOLOGY ACCESS AND ALLOWANCE My signature on the "Mobile Technology Access and conditions identified in the Access to Mobile Technology and the Payment Options for Mobile Technology policies [http://hr.uoregon.edu/policy/MobileTechnologyDevice.html]. 2. I understand that that I must

Oregon, University of

275

V-186: Drupal Login Security Module Security Bypass and Denial...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

U-162: Drupal Multiple Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

276

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerabil...  

Broader source: Energy.gov (indexed) [DOE]

or later. Addthis Related Articles V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

277

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability  

E-Print Network [OSTI]

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability Communications and Embedded Systems Department Southwest Research Institute Gary Ragsdale, Ph.D., P.E. August 24 ? 25, 2010 ESL-HH-10-08-09 Proceedings of the 17... of Smart Grid devices ? Describe progress made in Smart Grid security ? Propose a more robust approach to SG security ? Describe needs for further research and development ESL-HH-10-08-09 Proceedings of the 17th Symposium for Improving Building Systems...

Ragsdale, G.

278

Final report for the mobile node authentication LDRD project.  

SciTech Connect (OSTI)

In hostile ad hoc wireless communication environments, such as battlefield networks, end-node authentication is critical. In a wired infrastructure, this authentication service is typically facilitated by a centrally-located ''authentication certificate generator'' such as a Certificate Authority (CA) server. This centralized approach is ill-suited to meet the needs of mobile ad hoc networks, such as those required by military systems, because of the unpredictable connectivity and dynamic routing. There is a need for a secure and robust approach to mobile node authentication. Current mechanisms either assign a pre-shared key (shared by all participating parties) or require that each node retain a collection of individual keys that are used to communicate with other individual nodes. Both of these approaches have scalability issues and allow a single compromised node to jeopardize the entire mobile node community. In this report, we propose replacing the centralized CA with a distributed CA whose responsibilities are shared between a set of select network nodes. To that end, we develop a protocol that relies on threshold cryptography to perform the fundamental CA duties in a distributed fashion. The protocol is meticulously defined and is implemented it in a series of detailed models. Using these models, mobile wireless scenarios were created on a communication simulator to test the protocol in an operational environment and to gather statistics on its scalability and performance.

Michalski, John T.; Lanzone, Andrew J.

2005-09-01T23:59:59.000Z

279

The Requirements for Personal Mobile Assistants in a Mobile  

E-Print Network [OSTI]

: information filtering and retrieving, scheduling meetings, mail management, etc. These agents act as PersonalThe Requirements for Personal Mobile Assistants in a Mobile Telecommunications Environment Barcin. The unique demands and needs of each user will require assistants that are customized or personalized

Huhns, Michael N.

280

Dye filled security seal  

DOE Patents [OSTI]

A security seal for providing an indication of unauthorized access to a sealed object includes an elongate member to be entwined in the object such that access is denied unless the member is removed. The elongate member has a hollow, pressurizable chamber extending throughout its length that is filled with a permanent dye under greater than atmospheric pressure. Attempts to cut the member and weld it together are revealed when dye flows through a rupture in the chamber wall and stains the outside surface of the member.

Wilson, Dennis C. W. (Tijeras, NM)

1982-04-27T23:59:59.000Z

Note: This page contains sample records for the topic "anyconnect secure mobility" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Cyberspace security system  

SciTech Connect (OSTI)

A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

2014-06-24T23:59:59.000Z

282

National Security Science  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohn Cyber Security Nuclear ForensicsScience National

283

National Security Science Archive  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohn Cyber Security Nuclear ForensicsScienceScience »

284

Security | Argonne National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest RegionatSearchScheduled System OutagesNews PressThemesLinksUserSecurity

285

Security | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0

286

PNNL: Security & Privacy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 - September 2006 TheSteven Ashby Dr. Steven Ashby Photo Dr.1999alt=Search

287

Energy Security Overview  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsing Zirconia Nanoparticles asSecondCareerFebruaryEnergySecurity Overview We are

288

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy Login The National

289

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy Login The NationalWashington. DC

290

Natlonal Nuclear Security Admlnlstratlon  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy2015 | JeffersonNations

291

Mobile Conductance and Gossip-based Information Spreading in Mobile Networks  

E-Print Network [OSTI]

Mobile Conductance and Gossip-based Information Spreading in Mobile Networks Huazi Zhang, Zhaoyang framework for information spreading in mobile networks based on a new performance metric, mobile conductance, which allows us to separate the details of mobility models from the study of mobile spreading time. We

Dai, Huaiyu

292

Technology Transfer Success Stories, Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Navigate Home About Us Contact Information Hide Thumbs First Previous Pause Next Last Set Speed Slideshow speed: 5 seconds Move Autoinduction system New Image Set...

293

Climate Change and National Security  

E-Print Network [OSTI]

CLIMATE CHANGE Multiplying Threats to National Securityfor the impacts of climate change on national security. Pagea warming world. Page 11 Climate change acts as a threat

Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

2015-01-01T23:59:59.000Z

294

David Telles wins NNSA Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

who conduct vulnerability analyses, authored the LANL Site Safeguards and Security Plan, and administered the Lab's Performance Assurance Program. Under his leadership,...

295

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

2008-08-12T23:59:59.000Z

296

Secure Data Center (Fact Sheet)  

SciTech Connect (OSTI)

This fact sheet describes the purpose, lab specifications, applications scenarios, and information on how to partner with NREL's Secure Data Center at the Energy Systems Integration Facility.

Not Available

2012-08-01T23:59:59.000Z

297

Mobile Information Access M. Satyanarayanan  

E-Print Network [OSTI]

Carnegie Mellon University Pittsburgh, PA 15213 To appear in IEEE Personal Communications, Volume 3, No. 1, February 1996 Abstract The ability to access information on demand when mobile will be a criticalMobile Information Access M. Satyanarayanan January 1996 CMU­CS­96­107 School of Computer Science

298

MOBILE PHONE, A SUSTAINABLE PRODUCT?  

E-Print Network [OSTI]

but mobile > fixed line household penetration) ITU, 2013 GSMA, 2013 Growth Operators activity Europe (EEA GSMA, 2014 Deloitte, 2012 Price of an entrylevel mobile broadband 12% of monthly GNI p.c. 1125Wh / year (own measures, Malmodin 2014) network : 23kWh / user / year (Malmodin 2014) French electricity

van Tiggelen, Bart

299

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE O 470.1 Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. Chg 1, Safeguards and Security Program, dated 9/28/95, extended by DOE N 251.57, dated 4/28/2004. Change 1, 5/21/96, revises Chapter IV. Cancels: DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, DOE M 5632.1C-1 in part.

1995-09-28T23:59:59.000Z

300

Security classification of information  

SciTech Connect (OSTI)

This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

Quist, A.S.

1993-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "anyconnect secure mobility" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Electronic security device  

DOE Patents [OSTI]

The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.

Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

1992-03-17T23:59:59.000Z

302

Ideas for Security Assurance in Security Critical Software using Modelica  

E-Print Network [OSTI]

Ideas for Security Assurance in Security Critical Software using Modelica David Broman, Peter critical software. Modelica is a modern, strongly typed, de- clarative, and object-oriented language assurance, by expanding the scope of Modelica into also becoming a declarative modeling language for other

Zhao, Yuxiao

303

SUPPLEMENTAL EXPORT COMPLIANCE PROCEDURES FOR TRAVEL WITH MOBILE DEVICES & RESEARCH EQUIPMENT To ensure that SAO-affiliated persons, who work on export-controlled projects and travel with their  

E-Print Network [OSTI]

SUPPLEMENTAL EXPORT COMPLIANCE PROCEDURES FOR TRAVEL WITH MOBILE DEVICES & RESEARCH EQUIPMENT I. Purpose To ensure that SAO-affiliated persons, who work on export-controlled projects and travel with their laptops and mobile devices, take additional export compliance security precautions in advance and bring

304

2014 Headquarters Facilities Master Security Plan - Chapter 8...  

Office of Environmental Management (EM)

8, Operations Security Program 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program June 2014 2014 Headquarters Facilities Master Security...

305

2014 Headquarters Facilities Master Security Plan - Chapter 14...  

Office of Environmental Management (EM)

4, Cyber Security 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

306

2014 Headquarters Facilities Master Security Plan - Chapter 1...  

Office of Environmental Management (EM)

, Physical Security 2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 1,...

307

2014 Headquarters Facilities Master Security Plan - Chapter 10...  

Office of Environmental Management (EM)

0, Security Awareness Program 2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program June 2014 2014 Headquarters Facilities Master Security Plan...

308

2014 Headquarters Facilities Master Security Plan - Chapter 3...  

Office of Environmental Management (EM)

3, Personnel Security 2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 3,...

309

Workshop on Education in Computer Security Page 1 Computer Security in Introductory Programming Classes  

E-Print Network [OSTI]

of domains occurs in a secure manner (as defined by the site security policy) and that the change in domains

Bishop, Matt

310

Mobile Traffic Management System Test Deployment  

E-Print Network [OSTI]

BERKELEY Mobile Traf?c Management System Test DeploymentHIGHWAYS MOBILE TRAFFIC MANAGEMENT SYSTEM TEST DEPLOYMENTMobile Transportation Management System (MTMS). This new and

Gerfen, Jeffrey Brian

2005-01-01T23:59:59.000Z

311

Pricing Security L. Jean Camp  

E-Print Network [OSTI]

documented, with free patches, continue to exist on the Internet(Farmer, 1999). An alternative solution on the issues of defining the good and jumpstarting a market in the information survivability workshop. Security, the lack of security on one machine can cause adverse effects on another. The most obvious example

Camp, L. Jean

312

Fluid Mechanics and Homeland Security  

E-Print Network [OSTI]

Fluid Mechanics and Homeland Security Gary S. Settles Mechanical and Nuclear Engineering Department. 2006. 38:87­110 The Annual Review of Fluid Mechanics is online at fluid.annualreviews.org doi: 10 security involves many applications of fluid mechanics and offers many opportunities for research

Settles, Gary S.

313

Reporting Incidents Of Security Concern  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To enhance the Department of Energy (DOE) Incidents of Security Concern Reporting Program through more consistent reporting, better information tracking, and interactive coordination. DOE N 251.54, dated 07/08/03, extends this directive until 07/08/04. Cancels Deputy Secretary Glauthier memorandum, subject: Reporting Security Incidents, dated 9-7-99.

2001-04-03T23:59:59.000Z

314

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

2009-01-08T23:59:59.000Z

315

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

2009-01-08T23:59:59.000Z

316

FOOD SECURITY: WAYS FORWARD THROUGH  

E-Print Network [OSTI]

FOOD SECURITY: WAYS FORWARD THROUGH COOPERATIVE PRODUCTION AND MARKETING1 "Given the chance, poor. The Sustainable Community Connections project, coordinated by AWISH-HELLAS, seeks to address food security issues) olive oil-related products, with targeting of markets in the European Union (EU) and United States (US

Zaferatos, Nicholas C.

317

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE N 251.40, dated 5/3/01, extends this directive until 12/31/01. Cancels DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, and Chapter IX of DOE M 5632.1C-1

1995-09-28T23:59:59.000Z

318

Office of Headquarters Personnel Security Operations  

Broader source: Energy.gov [DOE]

The Office of Headquarters Personnel Security manages and implements safeguards and security access authorization functions for DOE Headquarters and manages the Personal Identity Verification (PIV) process for Headquarters as mandated by Homeland Security Presidential Directive Number 12 (HSPD-12).

319

Departmental Personnel Security- Policy and Procedures  

Broader source: Energy.gov [DOE]

Departmental Personnel Security provides centralized and authoritative policy guidance and ensures consistent and effective implementation of the DOE personnel security program Department-wide to include the National Nuclear Security Administration.

320

Independent Activity Report, Office of Secure Transportation...  

Broader source: Energy.gov (indexed) [DOE]

Office of Secure Transportation - March 2011 Independent Activity Report, Office of Secure Transportation - March 2011 March 2011 Report for the Appropriateness of Revisions to the...

Note: This page contains sample records for the topic "anyconnect secure mobility" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Independent Oversight Evaluation, Office of Secure Transportation...  

Office of Environmental Management (EM)

Evaluation, Office of Secure Transportation - February 2004 Independent Oversight Evaluation, Office of Secure Transportation - February 2004 February 2004 Evaluation of the Office...

322

Independent Oversight Inspection, Office of Secure Transportation...  

Office of Environmental Management (EM)

Office of Secure Transportation - March 2007 Independent Oversight Inspection, Office of Secure Transportation - March 2007 March 2007 Inspection of Emergency Management at the...

323

Security & Defense Licenses Available | Tech Transfer | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security and Defense SHARE Security and Defense 200401423 Synthesis Method for Stable Colloids of "Naked" Metal Nanocrystals 200501549 Enhanced Detection of Toxic Agents 200501614...

324

Homeland Security and Emergency Management Coordination (HSEMC...  

National Nuclear Security Administration (NNSA)

Homeland Security and Emergency Management Coordination (HSEMC) Program | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

325

Preliminary Notice of Violation, National Security Technologies...  

Office of Environmental Management (EM)

Preliminary Notice of Violation, National Security Technologies, LLC - NEA-2011-03 Preliminary Notice of Violation, National Security Technologies, LLC - NEA-2011-03 August 11,...

326

Safety and Security Enforcement Process Overview  

Broader source: Energy.gov (indexed) [DOE]

SAFETY AND SECURITY ENFORCEMENT PROCESS OVERVIEW August 2012 OFFICE OF ENFORCEMENT AND OVERSIGHT OFFICE OF HEALTH, SAFETY AND SECURITY U.S. DEPARTMENT OF ENERGY AUGUST 2012 DOE...

327

Safety and Security Enforcement Coordinator Handbook  

Broader source: Energy.gov (indexed) [DOE]

SAFETY AND SECURITY ENFORCEMENT COORDINATOR HANDBOOK August 2012 Office of Enforcement and Oversight Office of Health, Safety and Security U.S. Department of Energy AUGUST 2012 DOE...

328

Harold Washington Social Security Administration (SSA) Center...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Harold Washington Social Security Administration (SSA) Center Water Conservation and Green Energy Harold Washington Social Security Administration (SSA) Center Water Conservation...

329

National Securities Technologies _NSTec_ Livermore Operations...  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration NRTL Nationally Recognized Testing Laboratory NSTec National Security Technologies, LLC NTS Nevada Test Site OSHA Occupational Safety and...

330

Preliminary Notice of Violation, National Security Technologies...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

a Preliminary Notice of Violation (SEA-2014-02) to National Security Technologies, LLC (NSTec), for violations of Department of Energy's classified information security program...

331

National Nuclear Security Administration Appropriation and Program...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

4 National Nuclear Security Administration Appropriation and Program Summary Tables Outyear Appropriation Summary Tables FY 2012 BUDGET TABLES National Nuclear Security...

332

Independent Oversight Review, Nevada National Security Site,...  

Broader source: Energy.gov (indexed) [DOE]

and Special Door Interlock systems at the Nevada National Security Site (NNSS) Device Assembly Facility (DAF). The NNSS DAF is operated by National Security Technologies, LLC...

333

Automated Security Compliance Tool for the Cloud.  

E-Print Network [OSTI]

?? Security, especially security compliance, is a major concern that is slowing down the large scale adoption of cloud computing in the enterprise environment. Business (more)

Ullah, Kazi Wali

2012-01-01T23:59:59.000Z

334

Independent Oversight Activity Report, Nevada National Security...  

Office of Environmental Management (EM)

Report, Nevada National Security Site - March 3-6, 2014 March 2014 Operational Awareness Oversight of the Nevada National Security Site HIAR NNSS-2014-03-03 This...

335

SECURITY ANALYSIS OF PROPOSEDTRAVELTO SENSITIVE COUNTRIES | Department...  

Broader source: Energy.gov (indexed) [DOE]

COUNTRIES More Documents & Publications 2014 Headquarters Facilities Master Security Plan - Chapter 6, Foreign Interaction PSH-12-0117 - In the matter of Personnel Security...

336

Extension of DOE Directive on Cyber Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

DOE N 205.4, Handling Cyber Security Alerts and Advisories and Reporting Cyber Security Incidents, is extended until 6/4/04.

2003-06-04T23:59:59.000Z

337

On Cyber Security for Networked Control Systems  

E-Print Network [OSTI]

cyber-security analysis of the SCADA system of the Gignac water distributioncyber security of SCADA systems managing other infrastructures (e.g. , oil and natural gas distribution

Amin, Saurabh

2011-01-01T23:59:59.000Z

338

ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY, EMERGENCY PLANNING...  

Broader source: Energy.gov (indexed) [DOE]

8: SECURITY, EMERGENCY PLANNING, AND SAFETY RECORDS ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY, EMERGENCY PLANNING, AND SAFETY RECORDS Protection program records include the...

339

Enforcement Letter, Consolidated Nuclear Security, LLC | Department...  

Energy Savers [EERE]

security incidents involving the unclassified waste stream and discrepancies in the inventory of accountable nuclear material at DOE's Y-12 National Security Complex in Oak...

340

Fundamental Challenges in Mobile Computing M. Satyanarayanan  

E-Print Network [OSTI]

and level of technology, but are intrinsic to mobility. Together, they complicate the considerationsFundamental Challenges in Mobile Computing M. Satyanarayanan School of Computer Science Carnegie different about mobile computing?" The paper begins by describing a set of constraints intrinsic to mobile

Note: This page contains sample records for the topic "anyconnect secure mobility" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

MOBILE IMMERSIVE MUSIC J. Lemordant A. Guerraz  

E-Print Network [OSTI]

MOBILE IMMERSIVE MUSIC J. Lemordant A. Guerraz WAM project jacques.lemordant @inrialpes.fr WAM project agnes.guerraz @inrialpes.fr ABSTRACT Due to obvious portability constraints, mobile technol- ogy is ideally suited for mobile applications. The use of stereo headphones or stereo speakers on mobile devices

Paris-Sud XI, Université de

342

Mobile RSVP Presentation in CSE534  

E-Print Network [OSTI]

1 Mobile RSVP Presentation in CSE534 Students: Yu Liu Xinwei She Huaming Zhang #12; 2 1 Introduction . The number of mobile users will grow and additionally the mobile users will demand the same real data through the Web, require that the network offers quality of service to moving users. . Mobility

Acharya, Raj

343

Waste Toolkit A-Z Mobile phones  

E-Print Network [OSTI]

Waste Toolkit A-Z Mobile phones How to recycle your mobile phone Recycling your mobile phone makes the deep forests in the Congo in central Africa. The Congo's mining business has in recent years led and recycling can help to reduce the demand for new raw materials. Do not put mobile phones in the recycling

Melham, Tom

344

Mobile application for utility domains  

E-Print Network [OSTI]

This research, a collaboration between MIT and ABB/Ventyx, is focused on the development of a mobile interface for field workers in power repair settings and field service delivery. A Human Systems Engineering (HSE) approach ...

Tappan, Jacqueline

345

Unravelling daily human mobility motifs  

E-Print Network [OSTI]

Human mobility is differentiated by time scales. While the mechanism for long time scales has been studied, the underlying mechanism on the daily scale is still unrevealed. Here, we uncover the mechanism responsible for ...

Schneider, Christian M.

346

Mobile Energy Laboratory Procedures  

SciTech Connect (OSTI)

Pacific Northwest Laboratory (PNL) has been tasked to plan and implement a framework for measuring and analyzing the efficiency of on-site energy conversion, distribution, and end-use application on federal facilities as part of its overall technical support to the US Department of Energy (DOE) Federal Energy Management Program (FEMP). The Mobile Energy Laboratory (MEL) Procedures establish guidelines for specific activities performed by PNL staff. PNL provided sophisticated energy monitoring, auditing, and analysis equipment for on-site evaluation of energy use efficiency. Specially trained engineers and technicians were provided to conduct tests in a safe and efficient manner with the assistance of host facility staff and contractors. Reports were produced to describe test procedures, results, and suggested courses of action. These reports may be used to justify changes in operating procedures, maintenance efforts, system designs, or energy-using equipment. The MEL capabilities can subsequently be used to assess the results of energy conservation projects. These procedures recognize the need for centralized NM administration, test procedure development, operator training, and technical oversight. This need is evidenced by increasing requests fbr MEL use and the economies available by having trained, full-time MEL operators and near continuous MEL operation. DOE will assign new equipment and upgrade existing equipment as new capabilities are developed. The equipment and trained technicians will be made available to federal agencies that provide funding for the direct costs associated with MEL use.

Armstrong, P.R.; Batishko, C.R.; Dittmer, A.L.; Hadley, D.L.; Stoops, J.L.

1993-09-01T23:59:59.000Z

347

Security control methods for CEDR  

SciTech Connect (OSTI)

The purpose of this document is to summarize the findings of recent studies on the security problem in statistical databases and examine their applicability to the specific needs of CEDR. The document is organized as follows: In Section 2 we describe some general control methods which are available on most commercial database software. In Section 3 we provide a classification of statistical security methods. In Section 4 we analyze the type of users of CEDR and the security control methods which may be applied to each type. In Section 5 we summarize the findings of this study and recommend possible solutions.

Rotem, D.

1990-09-01T23:59:59.000Z

348

AP1000 Design for Security  

SciTech Connect (OSTI)

Nuclear power plants are protected from potential security threats through a combination of robust structures around the primary system and other vital equipment, security systems and equipment, and defensive strategy. The overall objective for nuclear power plant security is to protect public health and safety by ensuring that attacks or sabotage do not challenge the ability to safely shutdown the plant or protect from radiological releases. In addition, plants have systems, features and operational strategies to cope with external conditions, such as loss of offsite power, which could be created as part of an attack. Westinghouse considered potential security threats during design of the AP1000 PWR. The differences in plant configuration, safety system design, and safe shutdown equipment between existing plants and AP1000 affect potential vulnerabilities. This paper provides an evaluation of AP1000 with respect to vulnerabilities to security threats. The AP1000 design differs from the design of operating PWRs in the US in the configuration and the functional requirements for safety systems. These differences are intentional departures from conventional PWR designs which simplify plant design and enhance overall safety. The differences between the AP1000 PWR and conventional PWRs can impact vulnerabilities to security threats. The NRC addressed security concerns as part of their reviews for AP1000 Design Certification, and did not identify any security issues of concern. However, much of the detailed security design information for the AP1000 was deferred to the combined Construction and Operating License (COL) phase as many of the security issues are site-specific. Therefore, NRC review of security issues related to the AP1000 is not necessarily complete. Further, since the AP1000 plant design differs from existing PWRs, it is not obvious that the analyses and assessments prepared for existing plants also apply to the AP1000. We conclude that, overall, the AP1000 is less vulnerable to security threats such as malevolent use of vehicles (land, water or air), than are conventional PWRs. Further, the AP1000 is less vulnerable to external events (e.g., loss of transmission) than conventional PWRs. For some of the threats evaluated the AP1000 is comparable to conventional PWRs, while for other threats the AP1000 is inherently less vulnerable. (authors)

Long, L.B. [Southern Nuclear Operating Company, 40 Inverness Center Parkway, Birmingham, AL 35242 (United States); Cummins, W.E.; Winters, J.W. [Westinghouse Electric Company, 4350 Northern Pike, Monroeville, PA 15146 (United States)

2006-07-01T23:59:59.000Z

349

National Security Science July 2014  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy LoginofNational SecuritySecurityJuly

350

Enhancements for distributed certificate authority approaches for mobile wireless ad hoc networks.  

SciTech Connect (OSTI)

Mobile wireless ad hoc networks that are resistant to adversarial manipulation are necessary for distributed systems used in military and security applications. Critical to the successful operation of these networks, which operate in the presence of adversarial stressors, are robust and efficient information assurance methods. In this report we describe necessary enhancements for a distributed certificate authority (CA) used in secure wireless network architectures. Necessary cryptographic algorithms used in distributed CAs are described and implementation enhancements of these algorithms in mobile wireless ad hoc networks are developed. The enhancements support a network's ability to detect compromised nodes and facilitate distributed CA services. We provide insights to the impacts the enhancements will have on network performance with timing diagrams and preliminary network simulation studies.

Van Leeuwen, Brian P.; Michalski, John T.; Anderson, William Erik

2003-12-01T23:59:59.000Z

351

Mobile Communication Device Allowance Authorization Form Revised: April 2011 MOBILE COMMUNICATION DEVICE ALLOWANCE AUTHORIZATION FORM  

E-Print Network [OSTI]

Mobile Communication Device Allowance Authorization Form Revised: April 2011 MOBILE COMMUNICATION list your CURRENT PLAN features: Mobile service provider Name: ________ Monthly Charge: $ Device.edu/policy/itc/FINAL%20Policy%20on%20Mobile%20Comm%20Devices.htm I have read the Mobile Communication Devices Policy

Dyer, Bill

352

Route Optimization based on ND-Proxy for Mobile Nodes in IPv6 Mobile Networks  

E-Print Network [OSTI]

Route Optimization based on ND-Proxy for Mobile Nodes in IPv6 Mobile Networks Jaehoon Jeong- bile nodes in IPv6 mobile network to perform route optimization. The route optimization is possible because mobile router provides the prefix of its care-of address for its mobile nodes by playing the role

Jeong, Jaehoon "Paul"

353

Sensor Relocation with Mobile Sensors:Sensor Relocation with Mobile Sensors: Design,Design,  

E-Print Network [OSTI]

Sensor Relocation with Mobile Sensors:Sensor Relocation with Mobile Sensors: Design of Freiburg #12;OverviewOverview · Sensor networks · mobile sensor · mobile robot · Mote · sensor relocation #12;Sensor networks · A wirless network . · Set of sensors. · Static Mote #12;Mobile sensor networks

Schindelhauer, Christian

354

DF-479 SD-11 Directory Security: Mechanisms and Practicality  

E-Print Network [OSTI]

This document reviews security issues and identifies some of the specific measures required to achieve security.

North American Directory

355

updated 6/7/2007 Aerospace Security Certificate (21 Hours)  

E-Print Network [OSTI]

Technologies AVED 5413* Landside Security Technologies AVED 5423* Security Planning, Audits, and NIMS AVED 5433

Veiga, Pedro Manuel Barbosa

356

A Strategy for Information Security: TOGAF , A. Movasseghi2  

E-Print Network [OSTI]

Security Planning, Information Security, TOGAF 1 Introduction Today's globally distributed network systems

Ertaull, Levent

357

CAMPUS ANNUAL SAFETY & SECURITY CRIME REPORT 2011 EMERGENCY NUMBERS  

E-Print Network [OSTI]

Security service is currently handled through a private security guard service contract, which provides

Olsen, Stephen L.

358

UbiBot : a system for experimenting with mobile devices on a wireless network  

E-Print Network [OSTI]

conference on mobile technology, applications, and systemshuman interaction in mobile technology (Mobility 07), pages

Vedar, Erwin Abad

2011-01-01T23:59:59.000Z

359

Cryptography and Data Security  

E-Print Network [OSTI]

The rising abuse of computers and increasing threat to personal privacy through data banks have stimulated much interest m the techmcal safeguards for data. There are four kinds of safeguards, each related to but distract from the others. Access controls regulate which users may enter the system and subsequently whmh data sets an active user may read or wrote. Flow controls regulate the dissemination of values among the data sets accessible to a user. Inference controls protect statistical databases by preventing questioners from deducing confidential information by posing carefully designed sequences of statistical queries and correlating the responses. Statlstmal data banks are much less secure than most people beheve. Data encryption attempts to prevent unauthorized disclosure of confidential information in transit or m storage. This paper describes the general nature of controls of each type, the kinds of problems they can and cannot solve, and their inherent limitations and weaknesses. The paper is intended for a general audience with little background in the area.

Dorothy E. Denning; Peter; J. Denning

1982-01-01T23:59:59.000Z

360

The mobile common : A guide to mobile open source and its effects on mobile device manufacturers  

E-Print Network [OSTI]

At the beginning of 2009, the global mobile industry is in the midst of a revolution, characterized by a trend towards openness, driven by technological advances, evolving consumer demands and increasing competition. Open ...

Markus, Ofri

2009-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "anyconnect secure mobility" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Port security and information technology  

E-Print Network [OSTI]

The terrorist attacks of September 11th 2001 on New York and Washington DC shed light on the many security shortcomings that sea ports and the entire import and export process face. A primary source of these problems is ...

Petrakakos, Nikolaos Harilaos

2005-01-01T23:59:59.000Z

362

Meeting Federal Energy Security Requirements  

Broader source: Energy.gov [DOE]

Presentationgiven at at the Fall 2012 Federal Utility Partnership Working Group (FUPWG) meetingdiscusses the opportunity to increase the scope of federal-utility partnerships for meeting energy security requirements.

363

Utility Security & Resiliency: Working Together  

Broader source: Energy.gov [DOE]

Presentationgiven at the Federal Utility Partnership Working Group (FUPWG) Fall 2008 meetingdiscusses Edison Electric Institute (EEI), including its key security objectives, key activities, cybersecurity activities, and spare transformer equipment program (STEP).

364

Intrusion detection using secure signatures  

DOE Patents [OSTI]

A method and device for intrusion detection using secure signatures comprising capturing network data. A search hash value, value employing at least one one-way function, is generated from the captured network data using a first hash function. The presence of a search hash value match in a secure signature table comprising search hash values and an encrypted rule is determined. After determining a search hash value match, a decryption key is generated from the captured network data using a second hash function, a hash function different form the first hash function. One or more of the encrypted rules of the secure signatures table having a hash value equal to the generated search hash value are then decrypted using the generated decryption key. The one or more decrypted secure signature rules are then processed for a match and one or more user notifications are deployed if a match is identified.

Nelson, Trent Darnel; Haile, Jedediah

2014-09-30T23:59:59.000Z

365

Securities trading of concepts (STOC)  

E-Print Network [OSTI]

Identifying winning new product concepts can be a challenging process that requires insight into private consumer preferences. To measure consumer preferences for new product concepts, the authors apply a securities trading ...

Dahan, Ely

366

Italy | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

United States and Italy on the 2014 Nuclear Security Summit See a fact sheet here.The White HouseOffice of the Press SecretaryItaly and the United States of America are pleased...

367

Belgium | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Elio Di Rupo of Belgium on the 2014 Nuclear Security Summit See a fact sheet here.The White HouseOffice of the Press SecretaryBelgium and the United States of America are pleased...

368

Forrestal Security and Safety Procedures  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish uniform procedures for the security and safety of the Forrestal Building and to inform all personnel of precautionary measures. This directive does not cancel another directive. Canceled by DOE N 251.11.

1983-02-02T23:59:59.000Z

369

INL@Work Cyber Security  

SciTech Connect (OSTI)

May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

Chaffin, May

2010-01-01T23:59:59.000Z

370

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes minimum implementation standards for cyber security management processes throughout the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B. No cancellations.

2008-08-12T23:59:59.000Z

371

Security Area Vouching and Piggybacking  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes requirements for the Department of Energy (DOE) Security Area practice of "vouching" or "piggybacking" access by personnel. DOE N 251.40, dated 5-3-01, extends this directive until 12-31-01.

2000-06-05T23:59:59.000Z

372

INL@Work Cyber Security  

ScienceCinema (OSTI)

May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

Chaffin, May

2013-05-28T23:59:59.000Z

373

Master Safeguards and Security Agreements  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the Department of Energy policy, requirements, responsibilities, and authorities for the development and implementation of Master Safeguards and Security Agreements (MSSA's). Does not cancel another directive. Canceled by DOE O 5630.13A

1988-02-03T23:59:59.000Z

374

Cognitive Security for Personal Devices  

E-Print Network [OSTI]

Humans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human minds---for example, computers authenticate ...

Greenstadt, Rachel

2008-03-17T23:59:59.000Z

375

Critical Infrastructure and Cyber Security  

E-Print Network [OSTI]

that employ stealth methods such as steganography, allowing botmasters to exploit public forums and search engines #1; As U.S. national elections draw near, an increase in phishing, scams and malicious code targeting candidates, campaigns, etc.... Chemical Manufacturing The Chemical Manufacturing sector combines organic and inorganic materials to make chemicals used in everyday life and that contribute to the national security, public safety, and economic security. The components...

Doll, Abby; Pirrong, Renee; Jennings, Matthew; Stasny, George; Giblin, Andy; Shaffer, Steph; Anderson, Aimee

2011-01-01T23:59:59.000Z

376

Office of Headquarters Security Operations  

Broader source: Energy.gov [DOE]

The Office of Headquarters Security Operations strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; managing access authorization functions for Headquarters; ensuring that executives and dignitaries are fully protected, and supporting efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

377

Homeland Security Issues for Facilities  

E-Print Network [OSTI]

efficiency filters typically cause greater static pressure drop. Replacing air handling units to accept higher efficiency filters can be a major undertaking and expense. Besides offering some protection from biological and radiological agents, efficient..., security, surveillance, ventilation and filtration, and maintenance and training. The remainder of this discussion will focus primarily on occupant protection through HVAC system readiness and additional security measures. The aftermath of natural...

McClure, J. D.; Fisher, D.; Fenter, T.

2004-01-01T23:59:59.000Z

378

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

2009-01-08T23:59:59.000Z

379

Extracting Security Control Requirements University of Tulsa  

E-Print Network [OSTI]

-component systems or systems of systems (SoSs) are difficult to verify because the security controls must to formulate functional requirements from security controls with SoSs as the target. The process starts accepted security controls for "Federal Information Systems and Organizations" [8]. NIST defines security

Gamble, R. F.

380

06 DEC 2013 1 Information Security Guideline  

E-Print Network [OSTI]

responsibilities make informed decisions related to their organization's assets and corresponding security plan the University. 3 Security Plan Intention The executive heads of major University organizations are responsible an Information Security Plan (Plan) that demonstrates due care in securing their assets by meeting the intention

Queitsch, Christine

Note: This page contains sample records for the topic "anyconnect secure mobility" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

April 11, 2005 --Lecture 31 Computer Security  

E-Print Network [OSTI]

Science Policy Ancillaries #12;Security Planning Team Must represent all stakeholders, typically: Hardware

Jones, Douglas W.

382

Decision Support for Choice of Security  

E-Print Network [OSTI]

Decision Support for Choice of Security Solution The Aspect-Oriented Risk Driven Development (AORDD decisions. (4) RDD annotation rules for security risk and security solution variable estimation. (5) The AORDD security solution trade-o analysis and trade-o tool BBN topology. (6) Rule set for how

Langseth, Helge

383

Mobile biometric device (MBD) technology : summary of selected first responder experiences in pilot projects.  

SciTech Connect (OSTI)

Mobile biometric devices (MBDs) capable of both enrolling individuals in databases and performing identification checks of subjects in the field are seen as an important capability for military, law enforcement, and homeland security operations. The technology is advancing rapidly. The Department of Homeland Security Science and Technology Directorate through an Interagency Agreement with Sandia sponsored a series of pilot projects to obtain information for the first responder law enforcement community on further identification of requirements for mobile biometric device technology. Working with 62 different jurisdictions, including components of the Department of Homeland Security, Sandia delivered a series of reports on user operation of state-of-the-art mobile biometric devices. These reports included feedback information on MBD usage in both operational and exercise scenarios. The findings and conclusions of the project address both the limitations and possibilities of MBD technology to improve operations. Evidence of these possibilities can be found in the adoption of this technology by many agencies today and the cooperation of several law enforcement agencies in both participating in the pilot efforts and sharing of information about their own experiences in efforts undertaken separately.

Aldridge, Chris D.

2013-06-01T23:59:59.000Z

384

Competition and Collaboration in Mobile Banking: A Stakeholder Analysis  

E-Print Network [OSTI]

of mobile technologies offers an opportunity for mobile carriers and banks to offer mobile banking services technology-aware customers. For banks, mobile banking is the next sequence after Internet banking. Thanks to the development of mobile technology which enables the delivery of banking services via mobile devices, mobile

Kurnia, Sherah

385

Route Optimization with MAP-Based Enhancement in Mobile Networks  

E-Print Network [OSTI]

technology and user de- mands for mobility support have motivated the IETF to introduce mobile IP, mobile IPv technology and demand for mobility support from users, the IETF has introduced mobile IP (MIP) [1], mobileRoute Optimization with MAP-Based Enhancement in Mobile Networks Jeonghoon Park, Tae-Jin Lee

Lee, Tae-Jin

386

Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security Mechanisms?  

E-Print Network [OSTI]

Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security Mechanisms--Improving energy efficiency of security-aware storage systems is challenging, because security and energy security and energy efficiency is to profile encryption algorithms to decide if storage systems would

Qin, Xiao

387

Cyber Security Companies, governments, and consumers depend on secure and reliable  

E-Print Network [OSTI]

Cyber Security Companies, governments, and consumers depend on secure and reliable computer-speed computers all introduce new cyber-security challenges. Cyber- security researchers at the University in the software development cycle. e also creates secure authentication protocols for vulnerable distributed

Hill, Wendell T.

388

Cyber Security and Resilient Systems  

SciTech Connect (OSTI)

The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nations cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.

Robert S. Anderson

2009-07-01T23:59:59.000Z

389

Using Mobile Technology and Social Networking to Crowdsource Citizen Science  

E-Print Network [OSTI]

Using Mobile Technology and Social Networking to CrowdsourceFall 2012 Using Mobile Technology and Social Networking toAbstract Using Mobile Technology and Social Networking to

Robson, Christine

2012-01-01T23:59:59.000Z

390

Mobile After-media, Cultural Narratives and the Data Imaginary  

E-Print Network [OSTI]

fiction and reality in mobile experiences. Paper presentedMobile After-media, Cultural Narratives and the Datahis approach toward mobile after-media. These theoretical

Kabisch, Eric

2009-01-01T23:59:59.000Z

391

Mobile Transit Trip Planning with Real-Time Data  

E-Print Network [OSTI]

International Confer- ence on Mobile Systems, Applications,international conference on Mobile systems, applications,international conference on Mobile systems, applica- tions,

Jariyasunant, Jerald; Work, Daniel B.; Kerkez, Branko; Sengupta, Raja; Glaser, Steven; Bayen, Alexandre

2011-01-01T23:59:59.000Z

392

Mobile sensor network to monitor wastewater collection pipelines  

E-Print Network [OSTI]

17 Mobile robot localization in23 WCS monitoring using mobile floatingDesign of mobile pipeline floating sensor SewerSnort

Lim, Jungsoo

2012-01-01T23:59:59.000Z

393

asymmetric ion mobility: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

High-Field Ion Mobility ions, including isotopomers and isobars, using ion mobility spectrometry (IMS), specifically, the field) and ion mobility spectrometry (IMS).1,2 Though both...

394

Alister John Miskimmon, University of Birmingham. RECASTING THE SECURITY BARGAINS: GERMANY, EUROPEAN SECURITY  

E-Print Network [OSTI]

Alister John Miskimmon, University of Birmingham. RECASTING THE SECURITY BARGAINS: GERMANY recent developments in European Union (EU) security policy and their implications for Germany's bilateral of a greater EU security capability has significantly affected Germany's bilateral relations with the USA

Sheldon, Nathan D.

395

International Masters Program in Nuclear Security Human Capacity Building in Nuclear Security  

E-Print Network [OSTI]

1 TUDelft International Masters Program in Nuclear Security Human Capacity Building in Nuclear Security Dirk Jan van den Berg President Del2 University of Technology participants, Nuclear security requires highly skilled experts. Professionals, who are familiar

Langendoen, Koen

396

Tag: Global Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR TableE9. TotalNumber ofES&HGlobal Security

397

Tag: global security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR TableE9. TotalNumberSecurityglobal security

398

Office of Secure Transportation | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 - September 2006 The 2002 Wholesale PowerSecurity Office of Oil,ArgonneServices

399

V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability  

Broader source: Energy.gov [DOE]

SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions.

400

Visual analysis of code security  

SciTech Connect (OSTI)

To help increase the confidence that software is secure, researchers and vendors have developed different kinds of automated software security analysis tools. These tools analyze software for weaknesses and vulnerabilities, but the individual tools catch different vulnerabilities and produce voluminous data with many false positives. This paper describes a system that brings together the results of disparate software analysis tools into a visual environment to support the triage and exploration of code vulnerabilities. Our system allows software developers to explore vulnerability results to uncover hidden trends, triage the most important code weaknesses, and show who is responsible for introducing software vulnerabilities. By correlating and normalizing multiple software analysis tools' data, the overall vulnerability detection coverage of software is increased. A visual overview and powerful interaction allows the user to focus attention on the most pressing vulnerabilities within huge volumes of data, and streamlines the secure software development workflow through integration with development tools.

Goodall, John R [ORNL] [ORNL; Radwan, Hassan [Applied Visions, Inc.] [Applied Visions, Inc.; Halseth, Lenny [Applied Visions, Inc.] [Applied Visions, Inc.

2010-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "anyconnect secure mobility" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Homeland Security and Defense Applications  

SciTech Connect (OSTI)

Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

None

2014-11-06T23:59:59.000Z

402

Homeland Security and Defense Applications  

ScienceCinema (OSTI)

Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

None

2015-01-09T23:59:59.000Z

403

On Data Caching for Mobile Clouds  

E-Print Network [OSTI]

Recent advances in smart device technologies have enabled a new computing paradigm in which large amounts of data are stored and processed on mobile devices. Despite the available powerful hardware, the actual capabilities of mobile devices...

Feng, Ying

2014-04-30T23:59:59.000Z

404

The Sentara Mobile Mammography Unit | Jefferson Lab  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

The Sentara Mobile Mammography Unit The Sentara Mobile Mammography Unit will be here at Jefferson Lab on December 11, 2014 from 9 a.m.-2 p.m. Mammography detects breast cancer and...

405

NERSC Releases Mobile Apps to Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Releases Mobile Apps to Users NERSC Releases Mobile Apps to Users Job Status, MOTD and Pilot of VASP Submission Available with More to Come April 23, 2012 In an effort to make...

406

Ecotransology : integrated design for urban mobility  

E-Print Network [OSTI]

This thesis demonstrates a rethinking of urban mobility through ecological design. Human mobility and ecological accountability are inextricably linked in city design; our current world ecological crisis underscores this ...

Joachim, Mitchell Whitney

2006-01-01T23:59:59.000Z

407

Designing Distributed Applications with Mobile Code Paradigms  

E-Print Network [OSTI]

Designing Distributed Applications with Mobile Code Paradigms Antonio Carzaniga Politecnico di the selection of the correct paradigm for a given distributed application. Keywords Mobile code, design with the design of distributed applications, that aims at identifying the distributable components

Carzaniga, Antonio

408

Sinch : searching intelligently on a mobile device  

E-Print Network [OSTI]

Sinch is an application that allows mobile device users to obtain answers to their questions without having to perform a web search in their mobile browser. Questions are answered by human beings using Mechanical Turk, an ...

Nayak, Rajeev (Rajeev R.)

2010-01-01T23:59:59.000Z

409

Security-by-design handbook.  

SciTech Connect (OSTI)

This document is a draft SecuritybyDesign (SeBD) handbook produced to support the Work Plan of the Nuclear Security Summit to share best practices for nuclear security in new facility design. The Work Plan calls on States to %E2%80%9Cencourage nuclear operators and architect/engineering firms to take into account and incorporate, where appropriate, effective measures of physical protection and security culture into the planning, construction, and operation of civilian nuclear facilities and provide technical assistance, upon request, to other States in doing so.%E2%80%9D The materials for this document were generated primarily as part of a bilateral project to produce a SeBD handbook as a collaboration between the Japan Atomic Energy Agency (JAEA) Nuclear Nonproliferation Science and Technology Center and Sandia National Laboratories (SNL), which represented the US Department Energy (DOE) National Nuclear Security Administration (NNSA) under a Project Action Sheet PASPP04. Input was also derived based on tours of the Savannah River Site (SRS) and Japan Nuclear Fuel Limited (JNFL) Rokkasho Mixed Oxide Fuel fabrication facilities and associated project lessonslearned. For the purposes of the handbook, SeBD will be described as the systemlevel incorporation of the physical protection system (PPS) into a new nuclear power plant or nuclear facility resulting in a PPS design that minimizes the risk of malicious acts leading to nuclear material theft; nuclear material sabotage; and facility sabotage as much as possible through features inherent in (or intrinsic to) the design of the facility. A fourelement strategy is presented to achieve a robust, durable, and responsive security system.

Snell, Mark Kamerer; Jaeger, Calvin Dell; Scharmer, Carol; Jordan, Sabina Erteza; Tanuma, Koji [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Ochiai, Kazuya [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Iida, Toru [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan

2013-01-01T23:59:59.000Z

410

Climate Change and National Security  

SciTech Connect (OSTI)

Climate change is increasingly recognized as having national security implications, which has prompted dialogue between the climate change and national security communities with resultant advantages and differences. Climate change research has proven useful to the national security community sponsors in several ways. It has opened security discussions to consider climate as well as political factors in studies of the future. It has encouraged factoring in the stresses placed on societies by climate changes (of any kind) to help assess the potential for state stability. And it has shown that, changes such as increased heat, more intense storms, longer periods without rain, and earlier spring onset call for building climate resilience as part of building stability. For the climate change research community, studies from a national security point of view have revealed research lacunae, for example, such as the lack of usable migration studies. This has also pushed the research community to consider second- and third-order impacts of climate change, such as migration and state stability, which broadens discussion of future impacts beyond temperature increases, severe storms, and sea level rise; and affirms the importance of governance in responding to these changes. The increasing emphasis in climate change science toward research in vulnerability, resilience, and adaptation also frames what the intelligence and defense communities need to know, including where there are dependencies and weaknesses that may allow climate change impacts to result in security threats and where social and economic interventions can prevent climate change impacts and other stressors from resulting in social and political instability or collapse.

Malone, Elizabeth L.

2013-02-01T23:59:59.000Z

411

Integrated safeguards and security management plan  

SciTech Connect (OSTI)

Berkeley Lab is committed to scientific excellence and stewardship of its assets. While security principles apply to all work performed at the Laboratory, their implementation is flexible. Berkeley Lab adheres to the following principles: Line management owns security; Security roles and responsibilities are clearly defined and communicated; Security functions are integrated; An open environment supports the Laboratory's Mission; The security program must support the scientific and operational missions of the Laboratory and must be value added; and Security controls are tailored to individual and facility requirements.

Bowen, Sue, editor

2001-04-16T23:59:59.000Z

412

Status of the National Security Workforce  

SciTech Connect (OSTI)

This report documents the status of the national security workforce as part of the National Security Preparedness Project, being performed by the Arrowhead Center of New Mexico State University under a DOE/NNSA grant. This report includes an assessment of the current workforce situation. The national security workforce is an important component of national security for our country. With the increase of global threats of terrorism, this workforce is being called upon more frequently. This has resulted in the need for an increasing number of national security personnel. It is imperative to attract and retain a skilled and competitive national security workforce.

None

2008-03-31T23:59:59.000Z

413

safeguards | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 JointProgram Consortium -| National Nuclear Security

414

Nuclear Safeguards and Security Challenge:  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the ContributionsArms Control R&D ConsortiumNuclearSafeguards and Security Challenge:

415

Security Cases | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 %Security

416

Security_Walls_VPP_Award  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0SecuritySmart March

417

Sandia National Laboratories: Climate Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared0Energy AdvancedEnergyEnergyMapping WaterMonitoringClimate Security

418

A taxonomy and business analysis for mobile web applications  

E-Print Network [OSTI]

Mobile web applications refer to web applications on mobile devices, aimed at personalizing, integrating, and discovering mobile contents in user contexts. This thesis presents a comprehensive study of mobile web applications ...

Liu, Kevin H

2009-01-01T23:59:59.000Z

419

assa security center: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cures All Dumb Ideas in Computer Security 919 Jul 2011 12 147 Annual Security Report October 2013 Materials Science Websites Summary: of Security Field Operations,...

420

PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE...  

Office of Environmental Management (EM)

INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM...

Note: This page contains sample records for the topic "anyconnect secure mobility" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

2014 Headquarters Facilities Master Security Plan - Chapter 11...  

Office of Environmental Management (EM)

1, Incidents of Security Concern 2014 Headquarters Facilities Master Security Plan - Chapter 11, Incidents of Security Concern October 2014 2014 Headquarters Facilities Master...

422

2014 Headquarters Facilities Master Security Plan - Chapter 17...  

Office of Environmental Management (EM)

7, Headquarters Security Officer Program 2014 Headquarters Facilities Master Security Plan - Chapter 17, Headquarters Security Officer Program June 2014 2014 Headquarters...

423

Energy and Security in Northeast Asia: Proposals for Nuclear Cooperation  

E-Print Network [OSTI]

The bilateral nuclear and security agreement between theThe bilateral nuclear and security agreement between thein East Asia's security, nuclear energy, and environment. It

Kaneko, Kumao; Suzuki, Atsuyuki; Choi, Jor-Shan; Fei, Edward

1998-01-01T23:59:59.000Z

424

Mobile Alternative Fueling Station Locator  

SciTech Connect (OSTI)

The Department of Energy's Alternative Fueling Station Locator is available on-the-go via cell phones, BlackBerrys, or other personal handheld devices. The mobile locator allows users to find the five closest biodiesel, electricity, E85, hydrogen, natural gas, and propane fueling sites using Google technology.

Not Available

2009-04-01T23:59:59.000Z

425

Seminar: 'Mobile health technology intervention  

E-Print Network [OSTI]

Seminar: 'Mobile health technology intervention for cancer patients' Wednesday 22 October Professor Nora Kearney Professor of Nursing and Cancer Care/Research Dean, College of Medicine Dentistry Higginson, Cicely Saunders Institute Director, Head of Division, Professor of Palliative Care and Policy

Kühn, Reimer

426

Spectrum Mobility Games Richard Southwell  

E-Print Network [OSTI]

by allowing cognitive radio devices to opportunisti- cally access underutilized licensed spectrum while With the unprecedented growth in the number of mobile devices and wireless services, the radio frequency spectrum are widely underutilized. Cognitive radio technology has the great potential to alleviate spectrum scarcity

Huang, Jianwei

427

Mobile Collaboration: Collaboratively Reading and Creating Children's Stories on Mobile Devices  

E-Print Network [OSTI]

Mobile Collaboration: Collaboratively Reading and Creating Children's Stories on Mobile Devices 20742 allisond@umiacs.umd.edu, mona@cs.umd.edu ABSTRACT This paper discusses design iterations of Mobile Stories ­ a mobile technology that empowers children to collaboratively read and create stories. We

Golbeck, Jennifer

428

Distributed Mobile Disk Cover A Building Block for Mobile Backbone Networks  

E-Print Network [OSTI]

1 Distributed Mobile Disk Cover ­ A Building Block for Mobile Backbone Networks Anand Srinivas, Gil of Mobile Backbone Networks has been recently studied by a few different approaches. An important subproblem a Geometric Disk Cover (GDC) under mobility. While from the context of static nodes and centralized solutions

Zussman, Gil

429

Mobile Application Development now and then Towards a Handbook for User-Centered Mobile  

E-Print Network [OSTI]

Mobile Application Development ­ now and then Towards a Handbook for User-Centered Mobile Schwarz, Universität Stuttgart (thomas.schwarz@informatik.uni-stuttgart.de) Abstract. Mobile applications a closer look at the distinguishing features between mobile design and "traditional" software design. We

Boll, Susanne

430

Supporting Mobile Service Usage through Physical Mobile Interaction Gregor Broll1  

E-Print Network [OSTI]

Supporting Mobile Service Usage through Physical Mobile Interaction Gregor Broll1 , Sven Siorpaes1 albrecht.schmidt@ifi.lmu.de Abstract Although mobile services can be used ubiquitously, their employment and the interaction with them are still restricted by the constraints of mobile devices. In order to facilitate

431

Health Sciences Library Resources for Mobile Device Users Wireless Access for Mobile Devices  

E-Print Network [OSTI]

1 Health Sciences Library Resources for Mobile Device Users Wireless Access for Mobile Devices to configure your mobile device; instructions are available at http://www.usask.ca/ict/services/network-services/wireless/index.php - Assistance with accessing University services (such as wireless) on mobile devices is available from the ICT

Peak, Derek

432

EcoMobile: Energy-aware Real-time Framework for Multicore Mobile Systems1  

E-Print Network [OSTI]

EcoMobile: Energy-aware Real-time Framework for Multicore Mobile Systems1 B. Liu, Y. Wen, F. Liu, Y://www.cs.uh.edu Technical Report Number UH-CS-11-09 October 23, 2011 Keywords: mobile system, energy-aware, real plan to build an energy-aware framework for multicore mobile systems which extends Android with two

Cheng, Albert M. K.

433

all-weather security surveillance: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing...

434

Literature Review in Mobile Technologies and Learning  

E-Print Network [OSTI]

Literature Review in Mobile Technologies and Learning REPORT 11: FUTURELAB SERIES Laura Naismith to educational policy and practice. #12;FOREWORD Mobile technologies are a familiar part of the lives of most or the wider world. Newer developments in mobile phone technology are also beginning to offer the potential

Paris-Sud XI, Universit de

435

Mobile Communities Requirements and Features for Success  

E-Print Network [OSTI]

Mobile Communities ­ Requirements and Features for Success Sarah Denis Heldt Media Informatics LMU.broll@ifi.lmu.de Philipp Lehmann Burda Wireless GmbH philipp.lehmann@burda.com ABSTRACT Advancements in mobile technologies and decreasing charges are starting to leverage the mobile usage of the internet and its applications. This paper

436

Reinventing Mobile Community Computing and Communication  

E-Print Network [OSTI]

Reinventing Mobile Community Computing and Communication (Position Paper) Yann Busnel, Nuno Cruz, smartphones and mobile applications spread like wildfire and dramatically improved aspects of our professional and mostly provide mobile versions of online Internet services or arcade games. With the exception of simple

Paris-Sud XI, Université de

437

Mobile Device Guide Google Android based devices  

E-Print Network [OSTI]

Mobile Device Guide ­ Google Android based devices CSUF Date Last Revised: 1/20/11 Page 1 of 3;Mobile Device Guide ­ Google Android based devices CSUF Date Last Revised: 1/20/11 Page 2 of 3 2. Under' with your campus username and enter your password (case sensitive). 4. Tap `next'. #12;Mobile Device Guide

de Lijser, Peter

438

Tracking Mobile Units for Dependable Message Delivery  

E-Print Network [OSTI]

Tracking Mobile Units for Dependable Message Delivery Amy L. Murphy, Member, IEEE Computer Society at their disposal at any time, mobile computing is developing as an important research area. One of the fundamental problems in mobility is maintaining connectivity through message passing as the user moves through

Zhou, Yuanyuan

439

Commercial Mobile Radio Service (WRI CMRS)  

E-Print Network [OSTI]

Commercial Mobile Radio Service (WRI ­ CMRS) Commercial Motor Vehicle Roadside Technology Corridor · Improved safety of CMVs and their operation · Reductions in accidents · Increased productivity and mobility · CMRS ­ Commercial Mobile Radio Services · Includes telematics devices (such as electronic on

440

Mobile Game Recommendation using Touch Gestures  

E-Print Network [OSTI]

Mobile Game Recommendation using Touch Gestures Hao-Tsung Yang, De-Yu Chen, Ya-Xuan Hong, and Kuan and download more than one hundred thousands of games on mobile app marketplaces; nevertheless, how to pick discover mobile games with similar gameplay based on players' touch gestures while playing a game. We

Chen, Sheng-Wei

Note: This page contains sample records for the topic "anyconnect secure mobility" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Kaval: Cooperative Signature Identification on Mobile  

E-Print Network [OSTI]

Kaval: Cooperative Signature Identification on Mobile Devices Kaval is an Android-based signature in near real-time to multiple users. How It worKS Technological advances have made mobile devices device. Using a mobile device allows users to capture data from a team of users and process that data

442

Mobile Agents: An Introduction Gian Pietro Picco  

E-Print Network [OSTI]

1 Mobile Agents: An Introduction Gian Pietro Picco Dipartimento di Elettronica e Informazione, Politecnico di Milano, Italy picco@elet.polimi.it Abstract| Mobile agents are enjoying a lot of popularity to the related research #12;eld by showing evidence of the bene#12;ts mobile agents can potentially achieve

Picco, Gian Pietro

443

NFC Mobile Payment with Citizen Digital Certificate  

E-Print Network [OSTI]

NFC Mobile Payment with Citizen Digital Certificate Wei-Dar Chen, Keith E. Mayes Smart Card Centre handsets, the mobile phone is likely to become the device of choice for accessing sophisticated services or to emulate smart cards. However the user registration process is relatively weak for access to mobile

Sheldon, Nathan D.

444

Student Mobile Device Survey Table of Contents  

E-Print Network [OSTI]

CiCS. Student Mobile Device Survey 2011 Table of Contents Section Number Subject Page 1 With little information and supporting evidence on student ownership and usage of mobile devices at the University of Sheffield, making decisions on our services and support for mobile devices has been based

Martin, Stephen John

445

MOBILE PHONES: THE NEW (CELLULAR) GEOGRAPHY  

E-Print Network [OSTI]

MOBILE PHONES: THE NEW (CELLULAR) GEOGRAPHY Pablo Mateos MSc in Geographic Information Science first at p.mateos@ucl.ac.uk MATEOS, PABLO (2004) "Mobile phones: The new (cellular) geography", unpublished MSc dissertation, University of Leicester. #12;Mobile Phones: The New (Cellular) Geography 1

Jones, Peter JS

446

Batteries, mobile phones & small electrical devices  

E-Print Network [OSTI]

, mobile phones and data collection equipment. Lithium Ion batteries are used in mobile phones, laptopsBatteries, mobile phones & small electrical devices IN-BUILDING RECYCLING STATIONS. A full list of acceptable items: Sealed batteries ­excludes vented NiCad and Lead acid batteries Cameras Laser printer

447

Abstract --We describe the core components of a mobile RFID system, and they include components such as mobile  

E-Print Network [OSTI]

>P5-14mobile RFID system, and they include components such as mobile RFID reader, platform architecture and network architecture. Although there are several kinds of mobile RFID readers in the market, we will propose specially designed mobile RFID

California at Los Angeles, University of

448

Securing AODV for MANETs using Message Digest with Secret Key  

E-Print Network [OSTI]

Due to lack of the infrastructure, open peer-to-peer architecture, shared wireless medium, limited resource constraints and highly dynamic topology, MANETs (Mobile Adhoc Networks) are frequently established in insecure environments, which make them more vulnerable to attacks. These attacks are initiated by sharing malicious nodes against different services of network. The binding force in these networks is routing protocol, which is a common target of malicious nodes. MANETs routing protocols are being developed without having security in mind. Ad-hoc On-Demand Distance Vector (AODV) is one such widely used routing protocol that is at present undergo extensive research and development. AODV is based on distance vector routing, but here the updates are shared not on a periodic basis but on an as per demand basis. The control packets contain a hop-count and sequence number field which recognizes the freshness of routing. These fields are editable, so it creates a possible susceptibility that is frequently abuse...

Lakhtaria, Mr Kamaljit; Prajapati, Mr Satish G; Jani, N N

2010-01-01T23:59:59.000Z

449

Embedded Controllers Control. Connectivity. Security.  

E-Print Network [OSTI]

Application Summary MCF5282 HVAC and Security Control Panel Application Summary MCF5307 Music Media Player controllers to help get their products to market quickly and cost-effectively. Aggressive price of continuous innovative technology--provides customers with the opportunity to build market share

Grantner, Janos L.

450

International Aviation Security Technology Symposium  

E-Print Network [OSTI]

Laboratory, US Dept. of Homeland Security, William J. Hughes Technical Center; Atlantic City, NJ, USA-wave Mach number as a function of distance from the explosion center. These data then yield a peak. Characterization of an explosive requires understanding of the energy released during detonation. Typically TNT

Settles, Gary S.

451

Cloud Security by Max Garvey  

E-Print Network [OSTI]

Cloud Security Survey by Max Garvey #12;Cloudy Cloud is Cloudy What is the cloud? On Demand Service Network access Resource pooling Elasticity of Resources Measured Service #12;Cloud Types/Variants Iaa Cloud Public Cloud Hybrid Cloud combination. Private cloud with overflow going to public cloud. #12

Tolmach, Andrew

452

Library Protocol Safety and Security  

E-Print Network [OSTI]

Library Protocol Safety and Security · The library is open only to members of Brasenose; strangers are not to be admitted. · Eating, drinking (with the exception of water) and smoking are strictly forbidden. · Library the library. · Lampshades must not be tilted or have notes, postcards etc attached to them; any such items

Oxford, University of

453

Secure Symmetrical Multilevel Diversity Coding  

E-Print Network [OSTI]

Secure symmetrical multilevel diversity coding (S-SMDC) is a source coding problem, where a total of L - N discrete memoryless sources (S1,...,S_L-N) are to be encoded by a total of L encoders. This thesis considers a natural generalization of SMDC...

Li, Shuo

2012-07-16T23:59:59.000Z

454

Security & Sustainability College of Charleston  

E-Print Network [OSTI]

Security & Sustainability POLI 399 College of Charleston Fall 2013 Day/Time: T/H; 10@cofc.edu Office: 284 King Street, #206 (Office of Sustainability) Office Hours: by appt or virtual apt Instructor is that if sustained well-being and prosperity of human and ecological systems is the goal of sustainability

Young, Paul Thomas

455

Corporate Security and Conflict Outcomes  

E-Print Network [OSTI]

..................................................................................................... 75 Competition in Security Contracting and Conflict Outcomes .................................. 80 Research Design ....................................................................................................... 88 Dependent Variable... ................................... 16 Table 2 Contracted Service Total by Corporate Structure ............................................... 42 Table 3 The Effects of Public and Individual Firms Operating in Iraq (Part A) .............. 54 Table 4 The Effects of Public...

Tkach, Benjamin K

2013-10-21T23:59:59.000Z

456

KNOWLEDGE: Building, Securing, Sharing & Applying  

E-Print Network [OSTI]

is to educate and provide powerful analytical tools for information sharing, collaboration & decision support against threats to cyber infrastructure and data Data management in emergency situations Risk analysis for challenging problems in data analysis that address present and emerging homeland security threats Our Mission

457

An Operations Research approach to aviation security  

E-Print Network [OSTI]

Since the terrorist attacks of September 11, 2001, aviation security policy has remained a focus of national attention. We develop mathematical models to address some prominent problems in aviation security. We explore ...

Martonosi, Susan Elizabeth

2005-01-01T23:59:59.000Z

458

Statistical analysis of correlated fossil fuel securities  

E-Print Network [OSTI]

Forecasting the future prices or returns of a security is extraordinarily difficult if not impossible. However, statistical analysis of a basket of highly correlated securities offering a cross-sectional representation of ...

Li, Derek Z

2011-01-01T23:59:59.000Z

459

Safeguards and Security Program, acronyms and abbereviations...  

Office of Environmental Management (EM)

Program, acronyms and abbereviations - DOE M 470.4-7 Safeguards and Security Program, acronyms and abbereviations - DOE M 470.4-7 August 26, 2005 Canceled Safeguards and Security...

460

Site Tour Security Plan.pdf  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

for Site Tours Regarding Request for Proposal No. DE-SOL-0001458 Page 1 of 6 SECURITY PLAN The Pantex Plant (Pantex), Y-12 National Security Complex (Y-12), and the Tritium...

Note: This page contains sample records for the topic "anyconnect secure mobility" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY  

E-Print Network [OSTI]

379 DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY ADMINISTRATION Federal Funds General and special funds: OFFICE OF THE ADMINISTRATOR For necessary expenses of the Office of the Administrator in the National Nuclear Security Administration, including official reception and representation expenses

462

DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY  

E-Print Network [OSTI]

361 DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY ADMINISTRATION Federal Funds General and special funds: OFFICE OF THE ADMINISTRATOR For necessary expenses of the Office of the Administrator in the National Nuclear Security Administration, including official reception and representation expenses (not

463

Improving tamper detection for hazardous waste security  

SciTech Connect (OSTI)

After September 11, waste managers are increasingly expected to provide improved levels of security for the hazardous materials in their charge. Many low-level wastes that previously had minimal or no security must now be well protected, while high-level wastes require even greater levels of security than previously employed. This demand for improved security comes, in many cases, without waste managers being provided the necessary additional funding, personnel, or security expertise. Contributing to the problem is the fact that--at least in our experience--waste managers often fail to appreciate certain types of security vulnerabilities. They frequently overlook or underestimate the security risks associated with disgruntled or compromised insiders, or the potential legal and political liabilities associated with nonexistent or ineffective security. Also frequently overlooked are potential threats from waste management critics who could resort to sabotage, vandalism, or civil disobedience for purposes of discrediting a waste management program.

Johnston, R. G. (Roger G.); Garcia, A. R. E. (Anthony R. E.); Pacheco, A. N. (Adam N.); Trujillo, S. J. (Sonia J.); Martinez, R. K. (Ronald K.); Martinez, D. D. (Debbie D.); Lopez, L. N. (Leon N.)

2002-01-01T23:59:59.000Z

464

Building an Information Technology Security Awareness  

E-Print Network [OSTI]

Building an Information Technology Security Awareness and Training Program Mark Wilson and Joan Hash C O M P U T E R S E C U R I T Y NIST Special Publication 800-50 Computer Security Division

465

Security Equipment and Systems Certification Program (SESCP)  

SciTech Connect (OSTI)

Sandia National Laboratories (SNL) and Underwriters Laboratories, Inc., (UL) have jointly established the Security Equipment and Systems Certification Program (SESCP). The goal of this program is to enhance industrial and national security by providing a nationally recognized method for making informed selection and use decisions when buying security equipment and systems. The SESCP will provide a coordinated structure for private and governmental security standardization review. Members will participate in meetings to identify security problems, develop ad-hoc subcommittees (as needed) to address these identified problems, and to maintain a communications network that encourages a meaningful exchange of ideas. This program will enhance national security by providing improved security equipment and security systems based on consistent, reliable standards and certification programs.

Steele, B.J. [Sandia National Labs., Albuquerque, NM (United States); Papier, I.I. [Underwriters Labs., Inc., Northbrook, IL (United States)

1996-06-20T23:59:59.000Z

466

IBM Internet Security Systems Threat Insight Monthly  

E-Print Network [OSTI]

the Report 01 Keylogging, by the numbers 02 Securing the Secure Shell ­ Advanced user authentication and key Page 1 #12;Keylogging, by the numbers Introduction During the course of malware analysis, especially

467

Physical Security System Sensitivity to DBT Perturbations  

E-Print Network [OSTI]

, multiple scenarios are assessed that test different sets of adversary capabilities to better uncover and understand any security system vulnerabilities that may exist. We believe the benefit of identifying these site-specific security vulnerabilities...

Conchewski, Curtis

2012-10-19T23:59:59.000Z

468

Delegating Network Security with More Information  

E-Print Network [OSTI]

Network security is gravitating towards more centralized control. Strong centralization places a heavy burden on the administrator who has to manage complex security policies and be able to adapt to users' requests. To be ...

Naous, Jad

469

The encryption requirement can be waived for certain circumstances. Contact the Chief Information Security Officer (CISO) to seek an exemption. All exemptions must be approved by the CISO.  

E-Print Network [OSTI]

' Information Technology policies require that any mobile device containing institutional data must be encrypted Security Officer (CISO) to seek an exemption. All exemptions must be approved by the CISO. This directive Information Technology Appropriate Use Policy Colorado School of Mines Administrative Data Policy Mines

470

New Solicitations | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Stewardship Science Academic Alliances New Solicitations New Solicitations The National Nuclear Security Administration's Office of Research, Development, Test, and Evaluation...

471

Preproposal Conference & Site Tour | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Preproposal Conference & Site Tour | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation...

472

Spring 2013 Computer Security Midterm 1  

E-Print Network [OSTI]

the site's security officers have set a policy that all access between machines must use two separate forms

Paxson, Vern

473

On Cyber Security for Networked Control Systems  

E-Print Network [OSTI]

J. [2004], Low-latency cryptographic protection for SCADAlatency high-integrity security retrofit for lecacy SCADA

Amin, Saurabh

2011-01-01T23:59:59.000Z

474

Track 6: Integrating Safety Into Security Operations  

Broader source: Energy.gov [DOE]

ISM Workshop Presentations Knoxville Convention Center, Knoxville, TN August 2009 Track 6: Integrating Safety Into Security Operations

475

Infrastructure & Sustainability | National Nuclear Security Administra...  

National Nuclear Security Administration (NNSA)

& Sustainability | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear...

476

Energy Security: Microgrid Planning and Design (Presentation)  

SciTech Connect (OSTI)

Energy Security: Microgrid Planning and Design presentation to be given at the 2012 WREF in Denver, CO.

Giraldez, J.

2012-05-01T23:59:59.000Z

477

Security and United States Immigration Policy  

E-Print Network [OSTI]

National Security Council memorandum as created to encourage defection of all USSR nationals and key personnel from the satellite

Totten, Robbie James

2012-01-01T23:59:59.000Z

478

T-Mobile and Nokia collaborate to open up an integrated marketplace for mobile content and Internet services  

E-Print Network [OSTI]

T-Mobile and Nokia collaborate to open up an integrated marketplace for mobile content and Internet and other content offered by both T-Mobile's widget gallery and Nokia's Ovi Store · Through T-Mobile's web of their mobile phone · Launching on mass market Nokia Series 40 platform based phones Today T-Mobile and Nokia

Deutschmann, Rainer

479

Security Policy Specification Using a Graphical Approach Page 1 Security Policy Specification Using a Graphical  

E-Print Network [OSTI]

Security Policy Specification Using a Graphical Approach Page 1 Security Policy Specification Using of California, Davis {hoagland,pandey,levitt}@cs.ucdavis.edu Technical Report CSE-98-3 A security policy states for organizations to declare their security policies, even informal state- ments would be better than the current

California at Davis, University of

480

National Security Issues at Department of Homeland Security and Department of Wednesday, November 18th  

E-Print Network [OSTI]

Transformational & Applied Research Directorate U.S. Department of Homeland Security Domestic Nuclear Detection Directorate at the Department of Homeland Security's Domestic Nuclear Detection Office. In this role, heSeminar: National Security Issues at Department of Homeland Security and Department of Energy

Farritor, Shane

Note: This page contains sample records for the topic "anyconnect secure mobility" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Continental energy security: Energy security in the North American context1  

E-Print Network [OSTI]

, commissioned reports, and signed legislation in an effort to stem crude oil imports and improve energy securityERG/201101 Continental energy security: Energy security in the North American context1 Larry Hughes, Canada 24 January 2011 1 A textbox for the Global Energy Assessment's Knowledge Module 5: Energy Security

Hughes, Larry

482

Securing Distributed Storage: Challenges, Techniques, and Systems  

E-Print Network [OSTI]

important security issues related to storage and present a comprehensive survey of the security services, present a critical review of the existing solutions, compare them, and highlight potential research issues time, recent trends in data outsourcing have raised many new privacy issues making security a crucial

Kim, Dae-Shik

483

GEORG-AUGUST-UNIVERSITT Computer Security  

E-Print Network [OSTI]

systems 2 #12;GEORG-AUGUST-UNIVERSIT?T G?TTINGEN Why Security? » Computer systems are ubiquitous in our daily life » Computers store and process our data » Computers access and control our resources » More: intelligent security systems » Machine learning and arti cial intelligence for security 4 T-800 HAL 9000WOPR

Grabowski, Jens

484

Systems Security at Chemical and Biochemical Engineering  

E-Print Network [OSTI]

and Biochemical Engineering. The Systems Administrator for Chemical and Biochemical Engineering regularly reviews network security.However, maintaining systems security is a group effort and a never-ending task. Here Administrator regarding security bugs that may affect your personal computer. If a patch is available, download

485

Human Resources Security Access Matrix Function Training  

E-Print Network [OSTI]

June 2013 Human Resources Security Access Matrix Function Training Course Required Class Mode Training Course Prerequisite Security Access Form Required Contact for Additional Information Complete Electronic I-9 Forms REC001: I-9 /E-Verify Web Training OR Online OR None Electronic I-9 Security Access Form

Wu, Shin-Tson

486

Optimal Security Liquidation Algorithms Sergiy Butenko  

E-Print Network [OSTI]

using a set of historical sample-paths of prices. 1. Introduction Consider the following decision making positions for several securities. Historical sequences of prices of these securities (after opening. The algorithms provide path-dependent strategies which sell some fractions of security depending upon price

Uryasev, Stanislav

487

Oak Ridge National Laboratory National Security Programs  

E-Print Network [OSTI]

Oak Ridge National Laboratory National Security Programs Dr. Michael A. Kuliasha, Chief Scientist National Security Technologies Oak Ridge National Laboratory #12;2 OAK RIDGE NATIONAL LABORATORY U. S Security Challenges #12;3 OAK RIDGE NATIONAL LABORATORY U. S. DEPARTMENT OF ENERGY How Will Our Enemies

488

Department of Energy Cyber Security Management Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The purpose of the Department of Energy (DOE) Cyber Security Management Program (hereafter called the Program) is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE N 205.1

2003-03-21T23:59:59.000Z

489

Cloud Security: Issues and Concerns Pierangela Samarati*  

E-Print Network [OSTI]

1 Cloud Security: Issues and Concerns Authors Pierangela Samarati* Università degli Studi di Milano, Italy sabrina.decapitani@unimi.it Keywords cloud security confidentiality integrity availability secure data storage and processing Summary The cloud has emerged as a successful computing paradigm

Samarati, Pierangela

490

Third Annual Cyber Security and Information  

E-Print Network [OSTI]

Third Annual Cyber Security and Information Infrastructure Research Workshop May 14-15, 2007 TOWARDS COMPREHENSIVE STRATEGIES THAT MEET THE CYBER SECURITY CHALLENGES OF THE 21ST CENTURY Frederick Sheldon, Axel Krings, Seong-Moo Yoo, and Ali Mili (Editors) #12;CSIIRW07: Cyber Security and Information

Krings, Axel W.

491

Department of Energy Cyber Security Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The purpose of the DOE Cyber Security Management Program is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE O 205.1. Canceled by DOE O 205.1B.

2006-12-04T23:59:59.000Z

492

Cyber Security in Smart Grid Substations  

E-Print Network [OSTI]

Cyber Security in Smart Grid Substations Thijs Baars Lucas van den Bemd Michail Theuns Robin van.089 3508 TB Utrecht The Netherlands #12;CYBER SECURITY IN SMART GRID SUBSTATIONS Thijs Baars T.Brinkkemper@uu.nl Abstract. This report describes the state of smart grid security in Europe, specifically the Netherlands

Utrecht, Universiteit

493

Business-driven security White paper  

E-Print Network [OSTI]

March 2008 Business-driven security White paper Take a holistic approach to business-driven security. #12;Take a holistic approach to business-driven security. 2 Overview Today's corporate leaders face multiple challenges, including the need to innovate in extremely competitive business climates

494

Energy Security in Nova Scotia Larry Hughes  

E-Print Network [OSTI]

to maintain energy security #12;Mr. Harper and his energy superpower · "...an ocean of oil soaked sand liesERG/200706 Energy Security in Nova Scotia Larry Hughes Energy Research Group Electrical to Café Canada, Mahone Bay 30 November 2007 #12;Energy security in Nova Scotia Larry Hughes, PhD Energy

Hughes, Larry

495

Electronic DOE Information Security System (eDISS) PIA, Office...  

Office of Environmental Management (EM)

DOE Information Security System (eDISS) PIA, Office of Health Safety and Security Electronic DOE Information Security System (eDISS) PIA, Office of Health Safety and Security...

496

Facility Security Checklist U.S. Department of Transportation  

E-Print Network [OSTI]

was the last time security logs and/or incident reports were reviewed? 25. Is there a current security plan

Goodman, Robert M.

497

NISTIR 6462 CSPP -Guidance for COTS Security Protection Profiles  

E-Print Network [OSTI]

..................................................................................................................................................4 2.2 OPERATIONAL ENVIRONMENT ............................................................................................................................... 25 4.3 JOINT TOE/ENVIRONMENT SECURITY OBJECTIVES...................................................................................................................5 3. SECURITY ENVIRONMENT

498

2012 Annual Planning Summary for National Nuclear Security Administrat...  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration 2012 Annual Planning Summary for National Nuclear Security Administration The ongoing and projected Environmental Assessments and...

499

Mobile phone and my health  

SciTech Connect (OSTI)

The interaction of the microwave radiation emitted by mobile phones with the user's body is analyzed from the International Commission on Non-Ionizing Radiation Protection (ICNIRP) recommendations perspective as a correlation between the specific absorption ratio (SAR) of the mobile phone and the call duration. The relative position of the cell phone to the user's body, the dielectric properties of the exposed body parts, the SAR value and the call duration are considered in the local body temperature rise due to the microwave heating effect. The recommended local temperature rise limit in the human body is evaluated according to standards. The aim of this study is to disseminate information to young people, especially high school students, about the microwave thermal effects on the human body, to make them aware of the environmental electromagnetic pollution and to offer them a simple method of biological self protection.

Surducan, Aneta [Nicolae Balcescu High School, 6 Constanta St., 400158 Cluj-Napoca (Romania)] [Nicolae Balcescu High School, 6 Constanta St., 400158 Cluj-Napoca (Romania); Dabala, Dana [National Railways Medical Clinic,, Occupational Medicine Department, 16-20 Republicii St., 400015 Cluj-Napoca (Romania)] [National Railways Medical Clinic,, Occupational Medicine Department, 16-20 Republicii St., 400015 Cluj-Napoca (Romania); Neamtu, Camelia, E-mail: emanoil.surducan@itim-cj.ro; Surducan, Vasile, E-mail: emanoil.surducan@itim-cj.ro; Surducan, Emanoil, E-mail: emanoil.surducan@itim-cj.ro [National Institute for Research and Development of Isotopic and Molecular Technologies, 65-103 Donath St., 400293 Cluj-Napoca (Romania)] [National Institute for Research and Development of Isotopic and Molecular Technologies, 65-103 Donath St., 400293 Cluj-Napoca (Romania)

2013-11-13T23:59:59.000Z

500

New depths with mobile rig  

SciTech Connect (OSTI)

Magee-Poole Drilling Company, a drilling contractor operating out of the south Texas drilling center of Alice, claims it operates the largest mobile drilling rig in the world. That is, it's the only wheel mounted portable rig that drills to 16,000 feet with 4 1/2-inch drill pipe - at least 3000 feet deeper than the previous mobile drilling rig ratings. The unit is designated the Ingersoll-Rand 1500 Series. What's more significant, according to co-owner Don Magee, is that the rig's portability gets the rotary table turning to the right sooner; it drills more footage per year. It rigs up in 1 1/2 days versus 3 to 4 days for a conventional skid type rig normally used at these depths. The unit's compact arrangement, with more components combined into single loads, makes possible its higher mobility. A conventional skid rig might require 25 to 30 truckloads to move the rig components, mud system, fuel and water tank, houses for utilities, storage and crew change, generators, and drill pipe. The new rig moves in anywhere from four to nine loads less. Further, the rig components weigh less without sacrificing durability.

Not Available

1982-03-01T23:59:59.000Z