Powered by Deep Web Technologies
Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated  

Broader source: Energy.gov (indexed) [DOE]

2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated 2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates February 28, 2012 - 8:45am Addthis PROBLEM: A vulnerability was reported in PostgreSQL. PLATFORM: Version(s): prior to 8.3.18, 8.4.11, 9.0.7, 9.1.3 ABSTRACT: A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases. reference LINKS: Vendor Advisory Security Tracker ID 1026744 CVE-2012-0866 IMPACT ASSESSMENT: Medium Discussion: For trigger functions marked SECURITY DEFINER, a remote authenticated user can execute a trigger function and gain elevated privileges CVE-2012-0866.

2

U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain  

Broader source: Energy.gov (indexed) [DOE]

84: Cisco Digital Media Manager Lets Remote Authenticated Users 84: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges January 19, 2012 - 9:00am Addthis PROBLEM: A remote authenticated user can gain elevated privileges on the target system. PLATFORM: Cisco Digital Media Manager: Version(s) 5.22 and prior, 5.2.3 ABSTRACT: The system does not properly validate unreferenced URLs. REFERENCE LINKS: Vendor Advisory SecurityTracker Alert ID: 1026541 CVE-2012-0329 IMPACT ASSESSMENT: medium Discussion: Cisco Show and Share is not directly affected by this vulnerability, but a user can exploit the Cisco Digital Media Manager to gain full access to Cisco Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port

3

U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain  

Broader source: Energy.gov (indexed) [DOE]

4: Cisco Digital Media Manager Lets Remote Authenticated Users 4: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges January 19, 2012 - 9:00am Addthis PROBLEM: A remote authenticated user can gain elevated privileges on the target system. PLATFORM: Cisco Digital Media Manager: Version(s) 5.22 and prior, 5.2.3 ABSTRACT: The system does not properly validate unreferenced URLs. REFERENCE LINKS: Vendor Advisory SecurityTracker Alert ID: 1026541 CVE-2012-0329 IMPACT ASSESSMENT: medium Discussion: Cisco Show and Share is not directly affected by this vulnerability, but a user can exploit the Cisco Digital Media Manager to gain full access to Cisco Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port

4

T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain  

Broader source: Energy.gov (indexed) [DOE]

8: HP Virtual Server Environment Lets Remote Authenticated 8: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges April 22, 2011 - 7:47am Addthis PROBLEM: A vulnerability was reported in HP Virtual Server Environment. A remote authenticated user can obtain elevated privileges on the target system. PLATFORM: HP Virtual Server Environment prior to v6.3 ABSTRACT: A potential security vulnerability has been identified in HP Virtual Server Environment for Windows. The vulnerability could be exploited remotely to elevate privileges. reference LINKS: HP Document ID: c02749050 SecurityTracker Alert ID: 1025429 CVE-2011-1724 HP Insight Software media set 6.3 HP Technical Knowledge Base Discussion: System management and security procedures must be reviewed frequently to

5

V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication  

Broader source: Energy.gov (indexed) [DOE]

3: RSA Authentication Agent Lets Remote Users Bypass 3: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements March 4, 2013 - 12:27am Addthis PROBLEM: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements PLATFORM: RSA Authentication Agent 7.1, 7.1.1 for Microsoft Windows ABSTRACT: A vulnerability was reported in RSA Authentication Agent. REFERENCE LINKS: RSA SecurCare SecurityTracker Alert ID: 1028230 CVE-2013-0931 IMPACT ASSESSMENT: Medium DISCUSSION: On systems configured for Quick PIN Unlock, the system will request a PIN instead of a full Passcode when the session is activated from an active screensaver after the Quick PIN Unlock timeout has expired. RSA Authentication Agent on Windows Vista, Windows 7, Windows 2008, and

6

V-103: RSA Authentication Agent Lets Remote Users Bypass Authenticatio...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements March 4, 2013 - 12:27am Addthis PROBLEM: RSA Authentication Agent Lets Remote Users Bypass...

7

User Authentication Policy | Argonne Leadership Computing Facility  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Eureka / Gadzooks Eureka / Gadzooks Policies Pullback Policy ALCF Acknowledgment Policy Account Sponsorship & Retention Policy Accounts Policy Data Policy INCITE Quarterly Report Policy Job Scheduling Policy on BG/P Job Scheduling Policy on BG/Q Refund Policy Software Policy User Authentication Policy Documentation Feedback Please provide feedback to help guide us as we continue to build documentation for our new computing resource. [Feedback Form] User Authentication Policy Users of the Argonne production systems are required to use a CRYPTOCard one time password, multifactor authentication system. This document explains the policies users must follow regarding CRYPTOCard tokens for accessing the Argonne resources. MultiFactor Authentication "Authentication systems are frequently described by the authentication

8

V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users  

Broader source: Energy.gov (indexed) [DOE]

0: Apache VCL Input Validation Flaw Lets Remote Authenticated 0: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges May 7, 2013 - 12:01am Addthis PROBLEM: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges PLATFORM: Apache VCL Versions: 2.1, 2.2, 2.2.1, 2.3, 2.3.1 ABSTRACT: A vulnerability was reported in Apache VCL. REFERENCE LINKS: Apache Securelist SecurityTracker Alert ID: 1028515 CVE-2013-0267 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated administrative user with minimal administrative privileges (i.e., nodeAdmin, manageGroup, resourceGrant, or userGrant) can send specially crafted data via the web interface or XMLRPC API to gain additional administrative privileges.

9

Challenges and architectural approaches for authenticating mobile users  

Science Journals Connector (OSTI)

This paper casts an architectural eye at existing work on security and privacy in mobile computing. Specifically, it focuses on authentication as it leads up to access control from two points of view: servicer providers granting access to users, and ... Keywords: access control, anonymity, authentication, mobile computing, trust, ubiquitous computing, user mobility

Joo Pedro Sousa

2008-05-01T23:59:59.000Z

10

V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication |  

Broader source: Energy.gov (indexed) [DOE]

7: Barracuda SSL VPN Bug Lets Remote Users Bypass 7: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication January 25, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Barracuda SSL VPN. PLATFORM: The vulnerability has been verified to exist in Barracuda SSL VPN version 2.2.2.203 ABSTRACT: A remote user can gain administrative access to the target system. REFERENCE LINKS: SecurityTracker Alert ID: 1028039 Barracuda Networks Advisory IMPACT ASSESSMENT: High DISCUSSION: A remote user can set a specially crafted Java system property (via 'setSysProp.jsp') to bypass access restrictions and gain access to the API functionality. This can be exploited to download configuration files, download database dumps, shutdown the system, and set new administrative

11

V-063: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain  

Broader source: Energy.gov (indexed) [DOE]

3: Adobe ColdFusion Bugs Let Remote Users Gain Access and 3: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information V-063: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information January 7, 2013 - 1:00am Addthis PROBLEM: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information PLATFORM: ColdFusion 10, 9.0.2, 9.0.1 and 9.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe has identified three vulnerabilities affecting ColdFusion for Windows, Macintosh and UNIX REFERENCE LINKS: Adobe Security Bulletin APSA13-01 SecurityTracker Alert ID: 1027938 CVE-2013-0625 CVE-2013-0629 CVE-2013-0631 IMPACT ASSESSMENT: High DISCUSSION: A remote user can bypass authentication and take control of the target system [CVE-2013-0625]. Systems with password protection disabled or with no password set are affected.

12

V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session  

Broader source: Energy.gov (indexed) [DOE]

5: Apache Tomcat FORM Authenticator Lets Remote Users Conduct 5: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks May 14, 2013 - 12:08am Addthis PROBLEM: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks PLATFORM: Tomcat 6.0.21 to 6.0.36, 7.0.0 to 7.0.32 ABSTRACT: A vulnerability was reported in Apache Tomcat. REFERENCE LINKS: Apache Tomcat SecurityTracker Alert ID: 1028534 CVE-2013-2067 IMPACT ASSESSMENT: High DISCUSSION: A remote user can repeatedly send a specially crafted request for a resource requiring authentication while the target user is completing the login form to cause the FORM authentication process to execute the remote user's request with the privileges of the target user.

13

U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

0: JBoss Operations Network LDAP Authentication Bug Lets Remote 0: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication March 21, 2012 - 7:00am Addthis PROBLEM: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication PLATFORM: JBoss Operations Network 2.x ABSTRACT: A vulnerability was reported in JBoss Operations Network. A remote user can login with an arbitrary password in certain cases. reference LINKS: SecurityTracker Alert ID: 1026826 Secunia Advisory SA48471 CVE-2012-1100 IMPACT ASSESSMENT: Medium Discussion: The vulnerability is caused due to an error within the Lightweight Directory Access Protocol (LDAP) authentication when handling invalid bind account credentials, which can be exploited to log-in to LDAP-based

14

T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without...  

Broader source: Energy.gov (indexed) [DOE]

LDAP Authentication Bug Lets Remote Users Bypass Authentication U-185: OpenLDAP May Ignore TLSCipherSuite Setting in Some Cases T-535: Oracle Critical Patch Update - January 2011...

15

V-195: RSA Authentication Manager Lets Local Users View the Administrative  

Broader source: Energy.gov (indexed) [DOE]

95: RSA Authentication Manager Lets Local Users View the 95: RSA Authentication Manager Lets Local Users View the Administrative Account Password V-195: RSA Authentication Manager Lets Local Users View the Administrative Account Password July 9, 2013 - 12:51am Addthis PROBLEM: RSA Authentication Manager Lets Local Users View the Administrative Account Password PLATFORM: RSA Authentication Manager 7.1, 8.0 ABSTRACT: A vulnerability was reported in RSA Authentication Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1028742 CVE-2013-3273 RSA IMPACT ASSESSMENT: Medium DISCUSSION: When the RSA Authentication Manager Software Development Kit (SDK) is used to develop a custom application that connects with RSA Authentication Manager and the trace logging is set to verbose, the administrative account password used by the custom application is written in clear text to trace

16

U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP  

Broader source: Energy.gov (indexed) [DOE]

6: Apache CXF Lets Remote Authenticated Users Execute 6: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions September 24, 2012 - 6:00am Addthis PROBLEM: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions PLATFORM: This vulnerability affects all released versions of Apache CXF. ABSTRACT: A vulnerability was reported in Apache CXF reference LINKS: SecurityTracker Alert ID: 1027554 Apache CXF Security Advisories Apache CXF Advisory - CVE-2012-3451 CVE-2012-3451 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache CXF. A remote authenticated user can execute unauthorized commands on the target web service. Impact: A remote authenticated user can execute potentially unauthorized actions on

17

U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP  

Broader source: Energy.gov (indexed) [DOE]

6: Apache CXF Lets Remote Authenticated Users Execute 6: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions September 24, 2012 - 6:00am Addthis PROBLEM: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions PLATFORM: This vulnerability affects all released versions of Apache CXF. ABSTRACT: A vulnerability was reported in Apache CXF reference LINKS: SecurityTracker Alert ID: 1027554 Apache CXF Security Advisories Apache CXF Advisory - CVE-2012-3451 CVE-2012-3451 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache CXF. A remote authenticated user can execute unauthorized commands on the target web service. Impact: A remote authenticated user can execute potentially unauthorized actions on

18

V-223: RSA Authentication Agent for PAM Allows Remote Users to Make  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

3: RSA Authentication Agent for PAM Allows Remote Users to Make 3: RSA Authentication Agent for PAM Allows Remote Users to Make Unlimited Login Attempts V-223: RSA Authentication Agent for PAM Allows Remote Users to Make Unlimited Login Attempts August 21, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in RSA Authentication Agent for PAM PLATFORM: RSA Authentication Agent for PAM 7.0.2 and prior ABSTRACT: A remote user can make unlimited login attempts REFERENCE LINKS: Security Tracker Alert ID 1028930 CVE-2013-3271 IMPACT ASSESSMENT: Medium DISCUSSION: The system does not restrict the number of login attempts made via the agent IMPACT: System Access SOLUTION: Vendor has issued a fix Addthis Related Articles U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability

19

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain  

Broader source: Energy.gov (indexed) [DOE]

1: RSA Adaptive Authentication Bugs Let Remote Users Bypass 1: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls December 14, 2011 - 8:17am Addthis PROBLEM: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may be able to bypass certain security controls. reference LINKS: SecurityTracker Alert ID: 1026420 Security Focus: ESA-2011-036 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA Adaptive Authentication (On-Premise). A remote user may be able to bypass certain security controls. A remote user can send specially crafted data elements to affect the Device

20

T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

704: RSA enVision Lets Remote Users View Files and Remote 704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password August 29, 2011 - 3:45am Addthis PROBLEM: Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT: RSA enVision lets remote users view files and remote authenticated users obtain password. reference LINKS: SecurityTracker Alert ID: 1025979 CVE-2011-2736 CVE-2011-2737 RSA enVision Product Security IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA enVision. A remote user can view files on the target system. A remote authenticated user can obtain

Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

4: RSA enVision Lets Remote Users View Files and Remote 4: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password August 29, 2011 - 3:45am Addthis PROBLEM: Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT: RSA enVision lets remote users view files and remote authenticated users obtain password. reference LINKS: SecurityTracker Alert ID: 1025979 CVE-2011-2736 CVE-2011-2737 RSA enVision Product Security IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA enVision. A remote user can view files on the target system. A remote authenticated user can obtain

22

V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

V-057: eXtplorer "ext_find_user()" Authentication Bypass V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis December 28 2012 - 6:00am PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory SA51636 eXtplorer 2.1.3 Security Release IMPACT ASSESSMENT: Medium DISCUSSION: eXtplorer was notified of a problem within the authentication system of eXtplorer Versions 2.1.2, 2.1.1, 2.1.0 and 2.1.0RC5 that have been found to be vulnerable to an authentication bypass bug.

23

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Broader source: Energy.gov (indexed) [DOE]

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

24

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Broader source: Energy.gov (indexed) [DOE]

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

25

V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...  

Broader source: Energy.gov (indexed) [DOE]

or userGrant) can send specially crafted data via the web interface or XMLRPC API to gain additional administrative privileges. IMPACT: A remote authenticated user can...

26

U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

54: Webmin Flaws Let Remote Authenticated Users Execute 54: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files September 10, 2012 - 6:00am Addthis PROBLEM: Webmin Multiple Input Validation Vulnerabilities PLATFORM: The vulnerabilities are reported in version 1.580. Other versions may also be affected. ABSTRACT: An authenticated attacker may be able to execute arbitrary commands. reference LINKS: Webmin Security Alerts Bugtraq ID: 55446 Secunia Advisory SA50512 SecurityTracker Alert ID: 1027507 US CERT Vulnerability Note VU#788478 CVE-2012-2981 CVE-2012-2982 CVE-2012-2983 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities have been reported in Webmin, which can be exploited by malicious users to compromise a vulnerable system and by

27

T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid  

Broader source: Energy.gov (indexed) [DOE]

5: OpenLDAP back-ndb Lets Remote Users Authenticate Without a 5: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password March 11, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in OpenLDAP. A remote user can authenticate without a valid password. PLATFORM: Open LDAP version(s) 2.4.12 - 2.2.24 ABSTRACT: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password. reference LINKS: SecurityTracker Alert ID:1025190 Secunia Advisory:SA43331 OpenLDAP Issue OpenLDAP Download CVE-2011-1025 IMPACT ASSESSMENT: Medium Discussion: A remote user with knowledge of the target distinguished name can provide an arbitrary password to successfully authenticate on systems using the NDB back-end. Impact: Some vulnerabilities have been reported in OpenLDAP, which can be exploited

28

V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

7: eXtplorer "ext_find_user()" Authentication Bypass 7: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory SA51636 eXtplorer 2.1.3 Security Release IMPACT ASSESSMENT: Medium DISCUSSION: eXtplorer was notified of a problem within the authentication system of eXtplorer Versions 2.1.2, 2.1.1, 2.1.0 and 2.1.0RC5 that have been found to be vulnerable to an authentication bypass bug. IMPACT: An error within the "ext_find_user()" function in users.php can be

29

U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and  

Broader source: Energy.gov (indexed) [DOE]

44: McAfee Email Gateway Lets Remote Users Bypass Authentication 44: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks August 27, 2012 - 7:00am Addthis PROBLEM: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks PLATFORM: McAfee Email Gateway (MEG) 7.0.0 and 7.0.1 (MEG 6.7.x is NOT affected.) McAfee Email and Web Security (EWS) 5.6 Patch 3 and earlier McAfee Email and Web Security (EWS) 5.5 Patch 6 and earlier ABSTRACT: Several vulnerabilities were reported in McAfee Email Gateway. reference LINKS: McAfee Security Bulletin ID: SB10026 SecurityTracker Alert ID: 1027444

30

U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and  

Broader source: Energy.gov (indexed) [DOE]

4: McAfee Email Gateway Lets Remote Users Bypass Authentication 4: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks August 27, 2012 - 7:00am Addthis PROBLEM: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks PLATFORM: McAfee Email Gateway (MEG) 7.0.0 and 7.0.1 (MEG 6.7.x is NOT affected.) McAfee Email and Web Security (EWS) 5.6 Patch 3 and earlier McAfee Email and Web Security (EWS) 5.5 Patch 6 and earlier ABSTRACT: Several vulnerabilities were reported in McAfee Email Gateway. reference LINKS: McAfee Security Bulletin ID: SB10026 SecurityTracker Alert ID: 1027444

31

T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated...  

Office of Environmental Management (EM)

T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service T-563: Red Hat Directory Server Bugs Let Local Users Gain...

32

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass...  

Broader source: Energy.gov (indexed) [DOE]

Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may...

33

SECURING UNFAMILAR SYSTEM ENTRY POINTS AGAINST FAULTY USER AUTHENTICATION VIA  

E-Print Network [OSTI]

of electromagnetic interference produced by these circuits. Furthermore, this paper outlines a novel approach to user the electromagnetic interference produced by the keyboard device, making it considerably harder to isolate

Thornton, Mitchell

34

A Primary User Authentication System for Mobile Cognitive Radio Networks  

E-Print Network [OSTI]

portion of the licensed spectrum to establish network commu- nications. Essential to the co Cognitive radio technology is expected to increase the spectrum utilization by allowing opportunistic use of the idle portion of the licensed spectrum by Secondary (unlincensed) Users (SUs) [1], [9], [15], [17

Lazos, Loukas

35

Enhancing security of electronic health records through grid-based user authentication scheme  

Science Journals Connector (OSTI)

Medical research and electronic health record (EHR) maintenance involves large databases that are geographically distributed which calls naturally for a grid computing environment. Huge data in medical image analysis, storage and genome processing demand large medical data storage and computing power. Data sharing, software specialisation and data processing which occur in a heterogeneous way tend to make use of the grid computing environment for the medical field. The security solution for authentication in the existing grid environment is non-scalable. This major drawback can hinder the growth of the user community in the medical field. A simple user authentication scheme is proposed, which enhances the security of the overall system but takes less time for execution and lesser communication cost.

G. Jaspher Willsie Kathrine; E. Kirubakaran; Elijah Blessing Rajsingh

2014-01-01T23:59:59.000Z

36

T-601: Windows Kernel win32k.sys Lets Local Users Gain Elevated...  

Broader source: Energy.gov (indexed) [DOE]

01: Windows Kernel win32k.sys Lets Local Users Gain Elevated Privileges T-601: Windows Kernel win32k.sys Lets Local Users Gain Elevated Privileges April 13, 2011 - 5:12am Addthis...

37

T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated  

Broader source: Energy.gov (indexed) [DOE]

3: Red Hat Directory Server Bugs Let Local Users Gain Elevated 3: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service February 23, 2011 - 7:00am Addthis PROBLEM: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service. PLATFORM: Red Hat Directory Server v8 EL4, Red Hat Directory Server v8 EL5 ABSTRACT: Several vulnerabilities were reported in Red Hat Directory Server. A local user can obtain elevated privileges on the target system. A remote user can cause denial of service conditions. A local user can cause denial of service conditions. A remote user can send multiple simple paged search requests to cause the

38

U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain  

Broader source: Energy.gov (indexed) [DOE]

0:HP Onboard Administrator Unspecified Flaw Lets Remote Users 0:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access October 13, 2011 - 8:15am Addthis PROBLEM: HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access PLATFORM: Onboard Administrator (OA) 3.21 through 3.31 ABSTRACT: A remote user can gain access to the target system reference LINKS: HP Support document ID: c03048779 SecurityTracker Alert ID: 1026158 CVE-2011-3155 IMPACT ASSESSMENT: Medium Discussion: A potential security vulnerability has been identified with HP Onboard Administrator (OA). The vulnerability could be exploited remotely to gain unauthorized access. Impact: A remote user can gain access to the target system. Solution: Onboard Administrator (OA) v3.32 is available.

39

U-194: Symantec LiveUpdate Administrator Lets Local Users Gain Elevated  

Broader source: Energy.gov (indexed) [DOE]

4: Symantec LiveUpdate Administrator Lets Local Users Gain 4: Symantec LiveUpdate Administrator Lets Local Users Gain Elevated Privledges U-194: Symantec LiveUpdate Administrator Lets Local Users Gain Elevated Privledges June 19, 2012 - 7:00am Addthis PROBLEM: Symantec LiveUpdate Administrator Lets Local Users Gain Elevated Privileges . PLATFORM: Version(s): 2.3 and prior versions Abstract: Users Gain Elevated Privileges reference LINKS: Vendor Advisory SecurityTracker Alert ID: 1027182 CVE-2012-0304 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Symantec LiveUpdate Administrator. A local user can obtain elevated privileges on the target system.The default installation of Symantec LiveUpdate Administrator installs files with full control privileges granted to the 'Everyone' group.A local user can exploit

40

U-040: HP-UX System Administration Manager Lets Local Users Gain Elevated  

Broader source: Energy.gov (indexed) [DOE]

0: HP-UX System Administration Manager Lets Local Users Gain 0: HP-UX System Administration Manager Lets Local Users Gain Elevated Privileges U-040: HP-UX System Administration Manager Lets Local Users Gain Elevated Privileges November 17, 2011 - 8:00am Addthis PROBLEM: HP-UX System Administration Manager Lets Local Users Gain Elevated Privileges. PLATFORM: HP-UX B.11.11, B.11.23, B.11.31; running Enterprise Mobility Suite (EMS) prior to A.04.20.11.04_01 ABSTRACT: A local user can obtain elevated privileges on the target system. reference LINKS: HP Support Center Document ID: c03089106 CVE-2011-4159 SecurityTracker Alert ID: 1026331 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP-UX System Administration Manager. A local user can obtain elevated privileges on the target system. A local user can gain full control of the target system.

Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

U-040: HP-UX System Administration Manager Lets Local Users Gain Elevated  

Broader source: Energy.gov (indexed) [DOE]

40: HP-UX System Administration Manager Lets Local Users Gain 40: HP-UX System Administration Manager Lets Local Users Gain Elevated Privileges U-040: HP-UX System Administration Manager Lets Local Users Gain Elevated Privileges November 17, 2011 - 8:00am Addthis PROBLEM: HP-UX System Administration Manager Lets Local Users Gain Elevated Privileges. PLATFORM: HP-UX B.11.11, B.11.23, B.11.31; running Enterprise Mobility Suite (EMS) prior to A.04.20.11.04_01 ABSTRACT: A local user can obtain elevated privileges on the target system. reference LINKS: HP Support Center Document ID: c03089106 CVE-2011-4159 SecurityTracker Alert ID: 1026331 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP-UX System Administration Manager. A local user can obtain elevated privileges on the target system. A local user can gain full control of the target system.

42

V-101: McAfee VirusScan Enterprise Lets Local Users Gain Elevated  

Broader source: Energy.gov (indexed) [DOE]

1: McAfee VirusScan Enterprise Lets Local Users Gain Elevated 1: McAfee VirusScan Enterprise Lets Local Users Gain Elevated Privileges V-101: McAfee VirusScan Enterprise Lets Local Users Gain Elevated Privileges February 28, 2013 - 12:05am Addthis PROBLEM: McAfee VirusScan Enterprise Lets Local Users Gain Elevated Privileges PLATFORM: VSE 8.8 Patch 2 with Access Protection, including Self Protection, turned off ABSTRACT: A vulnerability was reported in McAfee VirusScan Enterprise. REFERENCE LINKS: McAfee Security Bulletins ID: SB10038 SecurityTracker Alert ID: 1028209 IMPACT ASSESSMENT: Medium DISCUSSION: When Access Protection has been disabled, a local user can gain full control of the target application IMPACT: A local user can obtain elevated privileges on the target system. SOLUTION: The vendor has issued a fix (8.8 Patch 2 with HF778101, 8.8 Patch 3)

43

V-101: McAfee VirusScan Enterprise Lets Local Users Gain Elevated  

Broader source: Energy.gov (indexed) [DOE]

1: McAfee VirusScan Enterprise Lets Local Users Gain Elevated 1: McAfee VirusScan Enterprise Lets Local Users Gain Elevated Privileges V-101: McAfee VirusScan Enterprise Lets Local Users Gain Elevated Privileges February 28, 2013 - 12:05am Addthis PROBLEM: McAfee VirusScan Enterprise Lets Local Users Gain Elevated Privileges PLATFORM: VSE 8.8 Patch 2 with Access Protection, including Self Protection, turned off ABSTRACT: A vulnerability was reported in McAfee VirusScan Enterprise. REFERENCE LINKS: McAfee Security Bulletins ID: SB10038 SecurityTracker Alert ID: 1028209 IMPACT ASSESSMENT: Medium DISCUSSION: When Access Protection has been disabled, a local user can gain full control of the target application IMPACT: A local user can obtain elevated privileges on the target system. SOLUTION: The vendor has issued a fix (8.8 Patch 2 with HF778101, 8.8 Patch 3)

44

U-056: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root  

Broader source: Energy.gov (indexed) [DOE]

6: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root 6: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root Privileges U-056: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root Privileges December 9, 2011 - 8:00am Addthis PROBLEM: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root Privileges. PLATFORM: Linux kernel ABSTRACT: A vulnerability was reported in the Linux Kernel. reference LINKS: The Linux Kernel Archives SecurityTracker Alert ID: 1026395 CVE-2011-4330 IMPACT ASSESSMENT: Medium Discussion: When a specially crafted Hierarchical File System (HFS) file system is mounted, a local user can to trigger a buffer overflow and execute arbitrary code on the target system with root privileges. The vulnerability resides in the hfs_mac2asc() function. Impact: A local user can obtain root privileges on the target system.

45

V-093: Symantec PGP Desktop Buffer Overflows Let Local Users Gain Elevated  

Broader source: Energy.gov (indexed) [DOE]

3: Symantec PGP Desktop Buffer Overflows Let Local Users Gain 3: Symantec PGP Desktop Buffer Overflows Let Local Users Gain Elevated Privileges V-093: Symantec PGP Desktop Buffer Overflows Let Local Users Gain Elevated Privileges February 18, 2013 - 12:53am Addthis PROBLEM: Symantec PGP Desktop Buffer Overflows Let Local Users Gain Elevated Privileges PLATFORM: Symantec PGP Desktop 10.2.x,10.1.x,10.0.x Symantec Encryption Desktop 10.3.0 ABSTRACT: Two vulnerabilities were reported in Symantec PGP Desktop. REFERENCE LINKS: Symantec Security Advisory SYM13-001 Bugtraq ID: 57170 SecurityTracker Alert ID: 1028145 CVE-2012-4351 CVE-2012-4352 IMPACT ASSESSMENT: Medium DISCUSSION: A local user can trigger an integer overflow in 'pgpwded.sys' to execute arbitrary code on the target system [CVE-2012-4351]. On Windows XP and Windows Sever 2003, a local user can trigger a buffer

46

T-591: VMware vmrun Utility Lets Local Users Gain Elevated Privileges |  

Broader source: Energy.gov (indexed) [DOE]

1: VMware vmrun Utility Lets Local Users Gain Elevated 1: VMware vmrun Utility Lets Local Users Gain Elevated Privileges T-591: VMware vmrun Utility Lets Local Users Gain Elevated Privileges March 30, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in VMware. A local user can obtain elevated privileges on the target system. PLATFORM: VMware Workstation 6.5.5 and 7.1.3 and prior; VIX API for Linux 1.10.2 and prior ABSTRACT: The VMware vmrun utility is susceptible to a local privilege escalation in non-standard configurations. reference LINKS: VM Advisory ID:VMSA-2011-0006 Secunia Advisory: SA43885 SecurityTracker Alert ID: 1025270 CVE-2011-1126 VM Post IMPACT ASSESSMENT: Medium Discussion: A security issue has been reported in VMware Workstation, which can be exploited by malicious, local users to gain potentially escalated

47

V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain  

Broader source: Energy.gov (indexed) [DOE]

8: HP Service Manager Unspecified Flaw Lets Remote Users Gain 8: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access August 15, 2013 - 1:30am Addthis PROBLEM: A potential security vulnerability has been identified with HP Service Manager. The vulnerability could be exploited to allow remote unauthenticated access and elevation of privilege. PLATFORM: HP Service Manager v9.31, v9.30, v9.21, v7.11, v6.2.8 ABSTRACT: The vulnerabilities are reported in versions 9.31 and prior. REFERENCE LINKS: SecurityTracker Alert ID: 1028912 CVE-2013-4808 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in HP Service Manager. A remote user can gain unauthorized access on the target system. IMPACT: User access via network

48

V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain  

Broader source: Energy.gov (indexed) [DOE]

8: HP Service Manager Unspecified Flaw Lets Remote Users Gain 8: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access August 15, 2013 - 1:30am Addthis PROBLEM: A potential security vulnerability has been identified with HP Service Manager. The vulnerability could be exploited to allow remote unauthenticated access and elevation of privilege. PLATFORM: HP Service Manager v9.31, v9.30, v9.21, v7.11, v6.2.8 ABSTRACT: The vulnerabilities are reported in versions 9.31 and prior. REFERENCE LINKS: SecurityTracker Alert ID: 1028912 CVE-2013-4808 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in HP Service Manager. A remote user can gain unauthorized access on the target system. IMPACT: User access via network

49

U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated  

Broader source: Energy.gov (indexed) [DOE]

8:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated 8:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges December 23, 2011 - 8:45am Addthis PROBLEM: Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server AUS (v. 6.2) Red Hat Enterprise Linux Server EUS (v. 6.2.z) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: A local privileged user on the guest operating system can obtain elevated privileges on the target system. reference LINKS: Red Hat kernel security and bug fix update SecurityTracker Alert ID: 1026453 SecurityTracker Alert ID: 1026454

50

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain  

Broader source: Energy.gov (indexed) [DOE]

42: HP Onboard Administrator Bugs Let Remote Users Gain Access, 42: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks April 6, 2012 - 7:00am Addthis PROBLEM: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks PLATFORM: HP Onboard Administrator (OA) up to and including v3.32 ABSTRACT: A remote user can obtain potentially sensitive information. reference LINKS: HP Support Document ID: c03263573 SecurityTracker Alert ID: 1026889 CVE-2012-0128, CVE-2012-0129, CVE-2012-0130 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Onboard Administrator. A remote

51

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain  

Broader source: Energy.gov (indexed) [DOE]

2: HP Onboard Administrator Bugs Let Remote Users Gain Access, 2: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks April 6, 2012 - 7:00am Addthis PROBLEM: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks PLATFORM: HP Onboard Administrator (OA) up to and including v3.32 ABSTRACT: A remote user can obtain potentially sensitive information. reference LINKS: HP Support Document ID: c03263573 SecurityTracker Alert ID: 1026889 CVE-2012-0128, CVE-2012-0129, CVE-2012-0130 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Onboard Administrator. A remote

52

T-671: Red Hat system-config-firewall Lets Local Users Gain Root Privileges  

Broader source: Energy.gov (indexed) [DOE]

1: Red Hat system-config-firewall Lets Local Users Gain Root 1: Red Hat system-config-firewall Lets Local Users Gain Root Privileges T-671: Red Hat system-config-firewall Lets Local Users Gain Root Privileges July 19, 2011 - 2:42pm Addthis PROBLEM: A vulnerability was reported in Red Hat system-config-firewall. A local user can obtain root privileges on the target system. PLATFORM Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server EUS (v. 6.1.z) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: Red Hat system-config-firewall Lets Local Users Gain Root Privileges reference LINKS: RHSA-2011:0953-1 SecurityTracker Alert ID: 1025793 CVE-2011-2520 Red hat Article ID: 11259 IMPACT ASSESSMENT: Medium Discussion: The system-config-firewall utility uses the Python pickle module in an

53

U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges |  

Broader source: Energy.gov (indexed) [DOE]

2: Sudo Format String Bug Lets Local Users Gain Elevated 2: Sudo Format String Bug Lets Local Users Gain Elevated Privileges U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges January 31, 2012 - 5:45am Addthis PROBLEM: A vulnerability was reported in Sudo. A local user can obtain elevated privileges on the target system. PLATFORM: Linux (Any) Version(s): 1.8.0 - 1.8.3p1 ABSTRACT: A local user can supply a specially crafted command line argument to trigger a format string flaw and execute arbitrary commands on the target system with root privileges. reference LINKS: CVE-2012-0809 SecurityTracker Alert ID: 1026600 Vendor Site IMPACT ASSESSMENT: Medium Discussion: The vulnerability resides in the sudo_debug() function in 'src/sudo.c'. This can be exploited by local users, regardless of whether they are listed

54

U-059: Blackberry PlayBook File Sharing Option Lets Local Users Gain  

Broader source: Energy.gov (indexed) [DOE]

9: Blackberry PlayBook File Sharing Option Lets Local Users 9: Blackberry PlayBook File Sharing Option Lets Local Users Gain Elevated Privileges U-059: Blackberry PlayBook File Sharing Option Lets Local Users Gain Elevated Privileges December 13, 2011 - 6:00am Addthis PROBLEM: Blackberry PlayBook File Sharing Option Lets Local Users Gain Elevated Privileges. PLATFORM: BlackBerry PlayBook tablet software version 1.0.8.4985 and earlier ABSTRACT: A local user can obtain root privileges on the target tablet system. reference LINKS: SecurityTracker Alert ID:1026386 Vulnerability Summary for CVE-2011-0291 BlackBerry Technical Solution Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Blackberry PlayBook. A local user can obtain elevated privileges on the target system. On a tablet with File Sharing enabled and connected via USB to a system running BlackBerry

55

T-601: Windows Kernel win32k.sys Lets Local Users Gain Elevated Privileges  

Broader source: Energy.gov (indexed) [DOE]

01: Windows Kernel win32k.sys Lets Local Users Gain Elevated 01: Windows Kernel win32k.sys Lets Local Users Gain Elevated Privileges T-601: Windows Kernel win32k.sys Lets Local Users Gain Elevated Privileges April 13, 2011 - 5:12am Addthis PROBLEM: Windows Kernel win32k.sys Lets Local Users Gain Elevated Privileges PLATFORM: Windows XP Service Pack 3, Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems, Windows Vista Service Pack 1 and Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 1 and Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2*, Windows Server 2008 for x64-based Systems

56

V-101: McAfee VirusScan Enterprise Lets Local Users Gain Elevated...  

Broader source: Energy.gov (indexed) [DOE]

McAfee VirusScan Enterprise Lets Local Users Gain Elevated Privileges PLATFORM: VSE 8.8 Patch 2 with Access Protection, including Self Protection, turned off ABSTRACT: A...

57

V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain  

Broader source: Energy.gov (indexed) [DOE]

6: Linux Kernel Array Bounds Checking Flaw Lets Local Users 6: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges May 15, 2013 - 12:19am Addthis PROBLEM: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges PLATFORM: Version(s): 2.6.37 to 3.8.9 ABSTRACT: A vulnerability was reported in the Linux Kernel. REFERENCE LINKS: Linux Kernel SecurityTracker Alert ID: 1028565 CVE-2013-2094 IMPACT ASSESSMENT: Medium DISCUSSION: On systems compiled with PERF_EVENTS support, a local user can supply a specially crafted perf_event_open() call to execute arbitrary code on the target system with root privileges. The vulnerability resides in the perf_swevent_init() function in 'kernel/events/core.c'.

58

U-094: EMC Documentum Content Server Lets Local Administrative Users Gain  

Broader source: Energy.gov (indexed) [DOE]

4: EMC Documentum Content Server Lets Local Administrative 4: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges U-094: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges February 2, 2012 - 9:15am Addthis PROBLEM: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges PLATFORM: EMC Documentum Content Server 6.0, 6.5, 6.6 ABSTRACT: EMC Documentum Content Server contains a privilege elevation vulnerability that may allow an unauthorized user to obtain highest administrative privileges on the system. reference LINKS: SecurityTracker Alert ID: 1026624 EMC Resource Library CVE-2011-4144 bugtraq ESA-2012-009 IMPACT ASSESSMENT: Medium Discussion: EMC Documentum Content Server contains a security vulnerability that may allow a system administrator to elevate their or other users privileges to

59

U-178: VMware vMA Library Loading Error Lets Local Users Gain Elevated  

Broader source: Energy.gov (indexed) [DOE]

8: VMware vMA Library Loading Error Lets Local Users Gain 8: VMware vMA Library Loading Error Lets Local Users Gain Elevated Privileges U-178: VMware vMA Library Loading Error Lets Local Users Gain Elevated Privileges May 29, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in VMware vMA PLATFORM: Version(s): vMA 4.0, 4.1, 5 patch 1 (5.0.0.1) ABSTRACT: A local user can obtain elevated privileges on the target system. Reference Links: SecurityTracker Alert ID: 1027099 CVE-2012-2752 Vendor Advisory IMPACT ASSESSMENT: High Discussion: A local user can exploit a library loading error to cause arbitrary code to be executed on the target system with elevated privileges. Impact: Privilege escalation Solution: The vendor has issued a fix (vSphere Management Assistant 5.0 Patch 2 (5.0.0.2)). Addthis Related Articles T-591: VMware vmrun Utility Lets Local Users Gain Elevated Privileges

60

V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges | Department  

Broader source: Energy.gov (indexed) [DOE]

5: Apple iOS Bugs Let Local Users Gain Elevated Privileges 5: Apple iOS Bugs Let Local Users Gain Elevated Privileges V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges March 20, 2013 - 12:08am Addthis PROBLEM: Apple iOS Bugs Let Local Users Gain Elevated Privileges PLATFORM: Version(s): prior to 6.1.3 ABSTRACT: Several vulnerabilities were reported in Apple iOS REFERENCE LINKS: Apple security Article: HT1222 SecurityTracker Alert ID: 1028314 CVE-2013-0977 CVE-2013-0978 CVE-2013-0979 CVE-2013-0981 IMPACT ASSESSMENT: High DISCUSSION: A local user can exploit a flaw in the handling of Mach-O executable files with overlapping segments to execute unsigned code on the target system [CVE-2013-0977]. A local user can exploit a flaw in the ARM prefetch abort handling to determine the address of structures in the kernel [CVE-2013-0978].

Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

V-195: RSA Authentication Manager Lets Local Users View the Administra...  

Broader source: Energy.gov (indexed) [DOE]

can view the administrative account password SOLUTION: The vendor has issued a fix (Patch 26 (P26) for RSA Authentication Manager 7.1 Service Pack 4 (SP4) and Appliance 3.0...

62

V-220: Juniper Security Threat Response Manager Lets Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

0: Juniper Security Threat Response Manager Lets Remote 0: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands V-220: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands August 17, 2013 - 4:01am Addthis PROBLEM: A remote authenticated user can execute arbitrary commands on the target system. PLATFORM: 2010.0, 2012.0, 2012.1, 2013.1 ABSTRACT: A vulnerability was reported in Juniper Security Threat Response Manager (STRM) REFERENCE LINKS: SecurityTracker Alert ID: 1028921 CVE-2013-2970 IMPACT ASSESSMENT: High DISCUSSION: A remote authenticated user can inject commands to execute arbitrary operating system commands with the privileges of the target web service. This can be exploited to gain shell access on the target device.

63

V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication...  

Broader source: Energy.gov (indexed) [DOE]

property (via 'setSysProp.jsp') to bypass access restrictions and gain access to the API functionality. This can be exploited to download configuration files, download database...

64

T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let...  

Broader source: Energy.gov (indexed) [DOE]

8: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct Bypass Attacks T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct...

65

CAH and Shared Services Transition Plan CAH will move seven servers that provide daily operational services such as user authentication and access, central file  

E-Print Network [OSTI]

CAH and Shared Services Transition Plan CAH will move seven servers that provide daily operational the university's NET domain. Domains provide user authentication, access, and management to resources divide the transition plan, and each phase has goals and a deadline. The overall goal is to continue

Wu, Shin-Tson

66

Multi-factor authentication  

DOE Patents [OSTI]

Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

Hamlet, Jason R; Pierson, Lyndon G

2014-10-21T23:59:59.000Z

67

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications  

E-Print Network [OSTI]

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

Sabatini, David M.

68

Serious leisure, participation and experience in tourism: authenticity and ritual in a renaissance festival  

E-Print Network [OSTI]

the serious festival participation were reminiscent of tourism existential authenticity specified by Wang (1999) as two levels: intrapersonal authenticity (gaining one?s true self) and interpersonal authenticity (gaining true human relationship). A search...

Kim, Hyounggon

2005-02-17T23:59:59.000Z

69

U-178: VMware vMA Library Loading Error Lets Local Users Gain...  

Broader source: Energy.gov (indexed) [DOE]

A vulnerability was reported in VMware vMA PLATFORM: Version(s): vMA 4.0, 4.1, 5 patch 1 (5.0.0.1) ABSTRACT: A local user can obtain elevated privileges on the target...

70

U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass  

Broader source: Energy.gov (indexed) [DOE]

7: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass 7: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative Access U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative Access August 29, 2012 - 6:00am Addthis PROBLEM: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative Access PLATFORM: EMC Cloud Tiering Appliance (CTA) 7.4 and prior EMC Cloud Tiering Appliance Virtual Edition (CTA/VE) 7.4 and prior EMC Cloud Tiering Appliance (CTA) 9.0 and prior EMC Cloud Tiering Appliance Virtual Edition (CTA/VE) 9.0 and prior ABSTRACT: A vulnerability was reported in EMC Cloud Tiering Appliance. reference LINKS: SecurityTracker Alert ID: 1027448 Bugtraq ID: 55250 EMC.com CVE-2012-2285 IMPACT ASSESSMENT:

71

V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote 1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service November 22, 2012 - 3:00am Addthis PROBLEM: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service PLATFORM: Version(s): XC10 2.0.0.0 - 2.0.0.3, 2.1.0.0 - 2.1.0.2 ABSTRACT: Several vulnerabilities were reported in IBM WebSphere DataPower. REFERENCE LINKS: IBM Security Bulletin SecurityTracker Alert ID: 1027798 CVE-2012-5758 CVE-2012-5759 CVE-2012-5756 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in IBM WebSphere DataPower. A remote

72

A generic mechanism for efficient authentication in B3G networks  

Science Journals Connector (OSTI)

A user in Beyond 3rd Generation (B3G) networks in order to get access to the network services must perform a multi-pass authentication procedure, which includes two or three sequential authentications steps. These multiple authentication steps include ... Keywords: Authentication performance, B3G networks, B3G security, Multi-pass authentication, Security binding

Christoforos Ntantogian, Christos Xenakis, Ioannis Stavrakakis

2010-06-01T23:59:59.000Z

73

PAAS: A Privacy-Preserving Attribute-based Authentication System for eHealth Networks  

E-Print Network [OSTI]

PAAS: A Privacy-Preserving Attribute-based Authentication System for eHealth Networks Linke Guo PAAS which leverages users' verifiable attributes to authenticate users in eHealth systems while

Latchman, Haniph A.

74

Ch.3 User Authentication Textbook?  

E-Print Network [OSTI]

· account lockout mechanisms · policies against using common passwords but rather hard to guess passwords

Dong, Yingfei

75

V-231: Cisco Identity Services Engine Discloses Authentication Credentials  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

1: Cisco Identity Services Engine Discloses Authentication 1: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users V-231: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users August 30, 2013 - 3:01am Addthis PROBLEM: A vulnerability was reported in Cisco Identity Services Engine. A remote user can obtain authentication credentials. PLATFORM: Cisco Identity Services Engine (ISE) 1.x ABSTRACT: A vulnerability was reported in Cisco Identity Services Engine REFERENCE LINKS: SecurityTracker Alert ID: 1028965 CVE-2013-3471 IMPACT ASSESSMENT: Meduim DISCUSSION: A vulnerability was reported in Cisco Identity Services Engine. A remote user can obtain authentication credentials.The system stores the username and password of an authenticated user within hidden HTML form fields. A

76

V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and  

Broader source: Energy.gov (indexed) [DOE]

3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny 3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access June 21, 2013 - 6:00am Addthis PROBLEM: Three vulnerabilities were reported in Cisco TelePresence TC and TE PLATFORM: The following product models are affected by the vulnerabilities: Cisco TelePresence MX Series Cisco TelePresence System EX Series Cisco TelePresence Integrator C Series Cisco TelePresence Profiles Series running Cisco TelePresence Quick Set Series Cisco IP Video Phone E20 ABSTRACT: Cisco TelePresence TC and TE Software contain two vulnerabilities in the implementation of the Session Initiation Protocol (SIP) that could allow an

77

U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA®  

Broader source: Energy.gov (indexed) [DOE]

7: RSA® Authentication Agent 7.1 for Microsoft Windows® and 7: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability September 25, 2012 - 6:00am Addthis PROBLEM: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability PLATFORM: Product: RSA Authentication Agent for Microsoft Windows version 7.1 Platforms: Windows XP and Windows 2003 Product: RSA Authentication Client 3.5 Platforms: Windows XP and Windows 2003 ABSTRACT: RSA Authentication Agent Lets Remote Authenticated Users Bypass an Authentication Step reference LINKS: SecurityTracker Alert ID: 1027559 Bugtraq ID: 55662

78

U-268: Oracle Database Authentication Protocol Discloses Session Key  

Broader source: Energy.gov (indexed) [DOE]

8: Oracle Database Authentication Protocol Discloses Session 8: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users September 26, 2012 - 6:00am Addthis PROBLEM: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users PLATFORM: Oracle Database 11g Releases 1 and 2 ABSTRACT: A vulnerability was reported in Oracle Database. reference LINKS: Darkreading Threatpost Arstechnica Oracle Security Alerts SecurityTracker Alert ID: 1027558 CVE-2012-3137 IMPACT ASSESSMENT: Medium Discussion: The authentication protocol in Oracle Database 11g 1 and 2 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to

79

U-268: Oracle Database Authentication Protocol Discloses Session Key  

Broader source: Energy.gov (indexed) [DOE]

8: Oracle Database Authentication Protocol Discloses Session 8: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users September 26, 2012 - 6:00am Addthis PROBLEM: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users PLATFORM: Oracle Database 11g Releases 1 and 2 ABSTRACT: A vulnerability was reported in Oracle Database. reference LINKS: Darkreading Threatpost Arstechnica Oracle Security Alerts SecurityTracker Alert ID: 1027558 CVE-2012-3137 IMPACT ASSESSMENT: Medium Discussion: The authentication protocol in Oracle Database 11g 1 and 2 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to

80

Two-Factor Authentication  

Broader source: Energy.gov [DOE]

Two-Factor Authentication (2FA) is a system wherein two different methods are used to authenticate an individual. 2FA is based on something you know (a secret PIN) and something you have (an...

Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

U-201: HP System Management Homepage Bugs Let Remote Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

1: HP System Management Homepage Bugs Let Remote Users Deny 1: HP System Management Homepage Bugs Let Remote Users Deny Service U-201: HP System Management Homepage Bugs Let Remote Users Deny Service June 28, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in HP System Management Homepage. PLATFORM: Version(s): prior to 7.1.1 ABSTRACT: The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code. Reference links: Original Advisory Security Tracker ID 1027209 CVE-2012-2012, CVE-2012-2013, CVE-2012-2014 CVE-2012-2015, CVE-2012-2016 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP System Management Homepage. A remote authenticated user can gain elevated privileges. A remote authenticated

82

V-174: RSA Authentication Manager Writes Operating System, SNMP...  

Broader source: Energy.gov (indexed) [DOE]

SNMP, and HTTP plug-in proxy passwords. SOLUTION: The vendor has issued a fix (8.0 Patch 1 (P1)). Addthis Related Articles V-195: RSA Authentication Manager Lets Local Users...

83

Method and system for normalizing biometric variations to authenticate users from a public database and that ensures individual biometric data privacy  

DOE Patents [OSTI]

A password system comprises a set of codewords spaced apart from one another by a Hamming distance (HD) that exceeds twice the variability that can be projected for a series of biometric measurements for a particular individual and that is less than the HD that can be encountered between two individuals. To enroll an individual, a biometric measurement is taken and exclusive-ORed with a random codeword to produce a "reference value." To verify the individual later, a biometric measurement is taken and exclusive-ORed with the reference value to reproduce the original random codeword or its approximation. If the reproduced value is not a codeword, the nearest codeword to it is found, and the bits that were corrected to produce the codeword to it is found, and the bits that were corrected to produce the codeword are also toggled in the biometric measurement taken and the codeword generated during enrollment. The correction scheme can be implemented by any conventional error correction code such as Reed-Muller code R(m,n). In the implementation using a hand geometry device an R(2,5) code has been used in this invention. Such codeword and biometric measurement can then be used to see if the individual is an authorized user. Conventional Diffie-Hellman public key encryption schemes and hashing procedures can then be used to secure the communications lines carrying the biometric information and to secure the database of authorized users.

Strait, Robert S. (Oakland, CA); Pearson, Peter K. (Livermore, CA); Sengupta, Sailes K. (Livermore, CA)

2000-01-01T23:59:59.000Z

84

Authentication ofAuthentication ofAuthentication ofAuthentication of Degree Certificates Application Form Name in Full  

E-Print Network [OSTI]

Authentication ofAuthentication ofAuthentication ofAuthentication of Degree Certificates Application Form Name in Full Name in Full as Registered at King's Date of Birth Student ID number (IE degree certificate copies for authentication to: PLEASE REMEMBER TO INCLUDE COPIES OF YOUR CERTIFICATE(S

Applebaum, David

85

T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

6: RSA Adaptive Authentication Has Unspecified Remote 6: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw August 18, 2011 - 3:09pm Addthis PROBLEM: A vulnerability was reported in RSA Adaptive Authentication. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3, 6.0.2.1 SP2 and SP2 Patch 1, 6.0.2.1 SP3 ABSTRACT: An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session. reference LINKS: Security Tracker: 1025956

86

V-166: HP-UX Directory Server Discloses Passwords to Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

6: HP-UX Directory Server Discloses Passwords to Remote 6: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users V-166: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users May 29, 2013 - 12:32am Addthis PROBLEM: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users PLATFORM: Directory Server B.08.10.04 ABSTRACT: Two vulnerabilities were reported in HP-UX Directory Server. REFERENCE LINKS: HP Document ID: c03772083 SecurityTracker Alert ID: 1028593 CVE-2012-2678 CVE-2012-2746 IMPACT ASSESSMENT: High DISCUSSION: A local user can access the plaintext password in certain cases [CVE-2012-2678]. A remote authenticated user can can view the password for a target LDAP user when audit logging is enabled by reading the audit log [CVE-2012-2678].

87

Authentication of quantum messages.  

SciTech Connect (OSTI)

Authentication is a well-studied area of classical cryptography: a sender A and a receiver B sharing a classical private key want to exchange a classical message with the guarantee that the message has not been modified or replaced by a dishonest party with control of the communication line. In this paper we study the authentication of messages composed of quantum states. We give a formal definition of authentication in the quantum setting. Assuming A and B have access to an insecure quantum channel and share a private, classical random key, we provide a non-interactive scheme that both enables A to encrypt and authenticate (with unconditional security) an m qubit message by encoding it into m + s qubits, where the probability decreases exponentially in the security parameter s. The scheme requires a private key of size 2m + O(s). To achieve this, we give a highly efficient protocol for testing the purity of shared EPR pairs. It has long been known that learning information about a general quantum state will necessarily disturb it. We refine this result to show that such a disturbance can be done with few side effects, allowing it to circumvent cryptographic protections. Consequently, any scheme to authenticate quantum messages must also encrypt them. In contrast, no such constraint exists classically: authentication and encryption are independent tasks, and one can authenticate a message while leaving it publicly readable. This reasoning has two important consequences: On one hand, it allows us to give a lower bound of 2m key bits for authenticating m qubits, which makes our protocol asymptotically optimal. On the other hand, we use it to show that digitally signing quantum states is impossible, even with only computational security.

Barnum, Howard; Crpeau, Jean-Claude; Gottesman, D. (Daniel); Smith, A. (Adam); Tapp, Alan

2001-01-01T23:59:59.000Z

88

U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame  

Broader source: Energy.gov (indexed) [DOE]

2: RSA Authentication Manager Flaws Permit Cross-Site and 2: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks July 13, 2012 - 7:00am Addthis PROBLEM: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks PLATFORM: RSA Authentication Manager 7.1 is vulnerable; other versions may also be affected. ABSTRACT: RSA Authentication Manager is prone to multiple security vulnerabilities because it fails to properly sanitize user-supplied input. Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, and conduct phishing attacks. Other attacks may also be possible.

89

V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws  

Broader source: Energy.gov (indexed) [DOE]

4: RSA Adaptive Authentication (On-Premise) Input Validation 4: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks November 27, 2012 - 2:00am Addthis PROBLEM: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks PLATFORM: RSA Adaptive Authentication (On-Premise) 6.x ABSTRACT: A vulnerability was reported in RSA Adaptive Authentication (On-Premise). REFERENCE LINKS: SecurityTracker Alert ID: 1027811 SecurityFocus Security Alert RSA Customer Support CVE-2012-4611 IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability was reported in RSA Adaptive Authentication (On-Premise). A remote user can conduct cross-site scripting attacks. The software does not

90

PAKE-based mutual HTTP authentication for preventing phishing attacks  

E-Print Network [OSTI]

This paper describes a new password-based mutual authentication protocol for Web systems which prevents various kinds of phishing attacks. This protocol provides a protection of user's passwords against any phishers even if dictionary attack is employed, and prevents phishers from imitating a false sense of successful authentication to users. The protocol is designed considering interoperability with many recent Web applications which requires many features which current HTTP authentication does not provide. The protocol is proposed as an Internet Draft submitted to IETF, and implemented in both server side (as an Apache extension) and client side (as a Mozilla-based browser and an IE-based one). The paper also proposes a new user-interface for this protocol which is always distinguishable from fake dialogs provided by phishers.

Oiwa, Yutaka; Takagi, Hiromitsu

2009-01-01T23:59:59.000Z

91

A Novel Trigon based Dual Authentication Protocol for Enhancing Security in Grid Environment  

E-Print Network [OSTI]

In recent times, a necessity has been raised in order to distribute computing applications often across grids. These applications are dependent on the services like data transfer or data portal services as well as submission of jobs. Security is of utmost importance in grid computing applications as grid resources are heterogeneous, dynamic, and multidomain. Authentication remains as the significant security challenge in grid environment. In traditional authentication protocol a single server stores the sensitive user credentials, like username and password. When such a server is compromised, a large number of user passwords, will be exposed. Our proposed approach uses a dual authentication protocol in order to improve the authentication service in grid environment. The protocol utilizes the fundamental concepts of trigon and based on the parameters of the trigon the user authentication will be performed. In the proposed protocol, the password is interpreted and alienated into more than one unit and these uni...

Ruckmani, V

2010-01-01T23:59:59.000Z

92

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , Jinsong Han2  

E-Print Network [OSTI]

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems Li Lu1 , Jinsong Han2 an emerging requirement ­ protecting user privacy [13] in RFID authentications. In most RFID systems, tags sensitive information. For example, without pri- vacy protection, any reader can identify a consumer's ID

Liu, Yunhao

93

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , Jinsong Han2  

E-Print Network [OSTI]

- sitive information. For example, without privacy pro- tection, any reader can identify a consumer's IDDynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems Li Lu1 , Jinsong Han2 an emerging requirement ­ protecting user privacy [13] in RFID authentications. In most RFID systems, tags

Liu, Yunhao

94

QKD Quantum Channel Authentication  

E-Print Network [OSTI]

Several simple yet secure protocols to authenticate the quantum channel of various QKD schemes, by coupling the photon sender's knowledge of a shared secret and the QBER Bob observes, are presented. It is shown that Alice can encrypt certain portions of the information needed for the QKD protocols, using a sequence whose security is based on computational-complexity, without compromising all of the sequence's entropy. It is then shown that after a Man-in-the-Middle attack on the quantum and classical channels, there is still enough entropy left in the sequence for Bob to detect the presence of Eve by monitoring the QBER. Finally, it is shown that the principles presented can be implemented to authenticate the quantum channel associated with any type of QKD scheme, and they can also be used for Alice to authenticate Bob.

J. T. Kosloski

2006-04-02T23:59:59.000Z

95

V-036: EMC Smarts Network Configuration Manager Database Authentication  

Broader source: Energy.gov (indexed) [DOE]

6: EMC Smarts Network Configuration Manager Database 6: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability November 29, 2012 - 3:30am Addthis PROBLEM: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability PLATFORM: EMC Smarts Network Configuration Manager (NCM) all versions prior 9.1 ABSTRACT: Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. REFERENCE LINKS: EMC Identifier: ESA-2012-057 Secunia Advisory SA51408 SecurityTracker Alert ID: 1027812 CVE-2012-4614 CVE-2012-4615 IMPACT ASSESSMENT: Medium DISCUSSION: The systems uses a hard-coded key to encrypt authentication credentials on the target system [CVE-2012-4615]. A local user with knowledge of the key

96

Key recycling in authentication  

E-Print Network [OSTI]

In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely unknown to the adversary. Since their proof is not composable, we revisit it using a composable security framework. It turns out that the above argument is insufficient: if the adversary learns whether a corrupted message was accepted or rejected, information about the hash function is leaked, and after a bounded finite amount of rounds it is completely known. We show however that this leak is very small: Wegman and Carter's protocol is still $\\epsilon$-secure, if $\\epsilon$-almost strongly universal$_2$ hash functions are used. This implies that the secret key corresponding to the choice of hash function can be reused in the next round of authentication without any additional error than this $\\epsilon$. We also show that if the players have a mild form of synchronization, namely that the receiver knows when a message should be received, the key can be recycled for any arbitrary task, not only new rounds of authentication.

Christopher Portmann

2012-02-06T23:59:59.000Z

97

U-212: RSA Authentication Manager Flaws Permit Cross-Site and...  

Broader source: Energy.gov (indexed) [DOE]

actions on the site acting as the target user. Solution: The vendor has issued a fix (Patch 14 (P14) for RSA Authentication Manager 7.1 SP4 and Appliance 3.0 SP4). Addthis...

98

V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP  

Broader source: Energy.gov (indexed) [DOE]

4: RSA Authentication Manager Writes Operating System, SNMP, 4: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files June 10, 2013 - 12:47am Addthis PROBLEM: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files PLATFORM: RSA Authentication Manager 8.0 ABSTRACT: A vulnerability was reported in RSA Authentication Manager. REFERENCE LINKS: RSA SecurityTracker Alert ID: 1028638 CVE-2013-0947 IMPACT ASSESSMENT: Medium DISCUSSION: The system may write operating system, SNMP, and HTTP plug-in proxy passwords in clear text to log and configuration files. IMPACT: A local user can obtain operating system, SNMP, and HTTP plug-in proxy

99

U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users...

100

CERTIFICATE OF AUTHENTICITY  

Broader source: Energy.gov (indexed) [DOE]

CERTIFICATE OF AUTHENTICITY CERTIFICATE OF AUTHENTICITY I hereby certify that this transcript constitutes an accurate record of the full Council meeting of the National Coal Council held on November 14,2008 at the Westin Grand Hotel, Washington, D.C. ~ i c h a e l G. Mueller, Chair National Coal Council I NATIONAL COAL COUNCIL 1 FULL COUNCIL MEETING FRIDAY NOVEMBER 14, 2 0 0 8 The Full Council meeting convened at 9 : 0 0 a.m. in the Washington Ballroom of the Westin Grand Hotel, 2 3 5 0 M Street, NW, Washington, DC, Chair Michael G. Mueller presiding. ATTENDEES: MIKE MUELLER, Arneren Energy Fuels & Services Company, Chair RICH EIMER, Dynegy Inc., Vice-Chair ROBERT BECK, National Coal Council, Executive Vice-President SY ALI, Clean Energy Consulting BARB ALTIZER, Eastern Coal Council

Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

T-606: Sun Java System Access Manager Lets Remote Users Partially Modify  

Broader source: Energy.gov (indexed) [DOE]

06: Sun Java System Access Manager Lets Remote Users Partially 06: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data April 20, 2011 - 3:58am Addthis PROBLEM: Two vulnerabilities were reported in Sun Java System Access Manager. A remote authenticated user can partially access data on the target system. A remote user can partially modify data on the target system. PLATFORM: Sun Java versions 7.1, 8.0 ABSTRACT: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data. reference LINKS: SecurityTracker Alert ID: 1025408 CVE-2011-0844 CVE-2011-0847 Oracle Critical Patch Update Advisory

102

Users from Industry  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Users from Industry Users from Industry Users from Industry Print The Advanced Light Source (ALS) welcomes industrial users from large and small companies whose projects advance scientific knowledge, investigate the development of new products and manufacturing methods, or provide economic benefits and jobs to the economy. The nature of industrial research can be different from traditional university and government sponsored projects, so the ALS has created unique opportunities for new and existing industrial users to access our user facilities and engage in productive relationships with our scientific and engineering staff. Examples of past and current research conducted at the ALS can be viewed on the Industry @ ALS Web page. There are several modes of access; the ALS User and Scientific Support Groups are especially committed to helping new industrial users gain a foothold in our user community and welcome inquiries about how to make that happen.

103

Secure Anonymous RFID Authentication Protocols Christy Chatmon  

E-Print Network [OSTI]

and scalable. Keywords: RFID, Authentication, Anonymity, Privacy, Availability, Scalability. 1 Introduction technology is to automatically identify objects that are contained in electromagnetic fields. RFID tags doSecure Anonymous RFID Authentication Protocols Christy Chatmon Computer & Information Sciences

Burmester, Mike

104

Users from Industry  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Users from Industry Print Users from Industry Print The Advanced Light Source (ALS) welcomes industrial users from large and small companies whose projects advance scientific knowledge, investigate the development of new products and manufacturing methods, or provide economic benefits and jobs to the economy. The nature of industrial research can be different from traditional university and government sponsored projects, so the ALS has created unique opportunities for new and existing industrial users to access our user facilities and engage in productive relationships with our scientific and engineering staff. Examples of past and current research conducted at the ALS can be viewed on the Industry @ ALS Web page. There are several modes of access; the ALS User and Scientific Support Groups are especially committed to helping new industrial users gain a foothold in our user community and welcome inquiries about how to make that happen.

105

V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability  

Broader source: Energy.gov (indexed) [DOE]

6: MediaWiki CentralAuth Extension Authentication Bypass 6: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability September 6, 2013 - 4:36am Addthis PROBLEM: A vulnerability has been reported in the CentralAuth extension for MediaWiki, which can be exploited by malicious people to bypass certain security restrictions. PLATFORM: MediaWiki CentralAuth Extension ABSTRACT: A vulnerability has been reported in the CentralAuth extension for MediaWik REFERENCE LINKS: Secunia Advisory SA54723 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an error when handling auto-logins and can be exploited to bypass the authentication mechanism by providing a valid username within the "centralauth_User" cookie. IMPACT:

106

T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticate...  

Broader source: Energy.gov (indexed) [DOE]

A vulnerability was reported in RSA Adaptive Authentication. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3, 6.0.2.1 SP2 and SP2 Patch 1, 6.0.2.1 SP3 ABSTRACT: An issue with...

107

TwoKind Authentication: Usable Authenticators for Untrustworthy Environments  

E-Print Network [OSTI]

damage if the session or their password is compromised. 1. INTRODUCTION In today's Internet. Current authentication mechanisms such as one-time passwords [4] (such as RSA SecurID [3]) and privileged-time passwords limit the damage caused by stolen passwords, but allow full-scale damage in a hijacked session

Smith, Sean W.

108

T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass  

Broader source: Energy.gov (indexed) [DOE]

7: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users 7: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information August 31, 2011 - 12:00pm Addthis PROBLEM: A vulnerability was reported in Apache Tomcat. A remote user can bypass authentication or obtain potentially sensitive information. PLATFORM: Apache Tomcat 5.5.0 to 5.5.33, 6.0.0 to 6.0.33, 7.0.0 to 7.0.20 ABSTRACT: Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information. reference LINKS: SecurityTracker Alert ID: 1025993 CVE-2011-3190 (under review) Apache Tomcat Security Updates IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apache Tomcat. A remote user can bypass

109

T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code...

110

U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote 11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories July 12, 2012 - 7:00am Addthis PROBLEM: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories PLATFORM: EMC Celerra Network Server versions 6.0.36.4 through 6.0.60.2 EMC VNX versions 7.0.12.0 through 7.0.53.1 EMC VNXe 2.0 (including SP1, SP2, and SP3) EMC VNXe MR1 (including SP1, SP2, SP3, and SP3.1) EMC VNXe MR2 (including SP0.1) ABSTRACT: A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system. reference LINKS: The Vendor's Advisory

111

Biometric authentication system using reduced joint feature vector of iris and face  

Science Journals Connector (OSTI)

In this paper, we present the biometric authentication system based on the fusion of two user-friendly biometric modalities: Iris and Face. Using one biometric feature can lead to good results, but there is no reliable way to verify the classification. ...

Byungjun Son; Yillbyung Lee

2005-07-01T23:59:59.000Z

112

Integration of IEEE 802.21 services and pre-authentication framework  

Science Journals Connector (OSTI)

Providing multi-interface device users the ability to roam between different access networks is becoming a key requirement for service providers. The availability of multiple mobile broadband access technologies together with increasing use of real ... Keywords: IEEE 80221, MIH, MPA, authentication, handover performance, heterogeneous networks, media-independent handover, media-independent pre-, multi-interface devices, seamless mobility, testbed

Miriam Tauil; Ashutosh Dutta; Yuu-Heng Cheng; Subir Das; Donald Baker; Maya Yajnik; David Famolari; Yoshihiro Ohba; Kenichi Taniuchi; Victor Fajardo; Henning Schulzrinne

2010-07-01T23:59:59.000Z

113

Authentication of medicinal plant material by DNA fingerprinting  

Science Journals Connector (OSTI)

Based on their positive therapeutic results, herbal medicines are gaining popularity worldwide for human wellbeing and healthcare. Unfortunately, one major hurdle that might impair their potential future as 'medicine of choice' is the lack of standardisation. Many scientific studies on adulteration of herbal medicines have demonstrated that health consequences of adulterants may vary from life threatening to death. Fortunately, the breakthrough in genetic analysis and identification promise herbal medicines challenging era. Genetics permit the capacity to police adulterants to protect patients and public from dangerous fraud. This article highlights useful analytical techniques that can be employed to analyse DNA for quality assurance, control and authentication of medicinal plant species.

Sundus Tewfik

2008-01-01T23:59:59.000Z

114

Obfuscated authentication systems, devices, and methods  

DOE Patents [OSTI]

Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.

Armstrong, Robert C; Hutchinson, Robert L

2013-10-22T23:59:59.000Z

115

Simultaneous Authentication and Certification of Arms-Control Measurement Systems  

SciTech Connect (OSTI)

Most arms-control-treaty-monitoring scenarios involve a host party that makes a declaration regarding its nuclear material or items and a monitoring party that verifies that declaration. A verification system developed for such a use needs to be trusted by both parties. The first concern, primarily from the host party's point of view, is that any sensitive information that is collected must be protected without interfering in the efficient operation of the facility being monitored. This concern is addressed in what can be termed a 'certification' process. The second concern, of particular interest to the monitoring party, is that it must be possible to confirm the veracity of both the measurement system and the data produced by this measurement system. The monitoring party addresses these issues during an 'authentication' process. Addressing either one of these concerns independently is relatively straightforward. However, it is more difficult to simultaneously satisfy host party certification concerns and monitoring party authentication concerns. Typically, both parties will want the final access to the measurement system. We will describe an alternative approach that allows both parties to gain confidence simultaneously. This approach starts with (1) joint development of the measurement system followed by (2) host certification of several copies of the system and (3) random selection by the inspecting party of one copy to be use during the monitoring visit and one (or more) copy(s) to be returned to the inspecting party's facilities for (4) further hardware authentication; any remaining copies are stored under joint seal for use as spares. Following this process, the parties will jointly (5) perform functional testing on the selected measurement system and then (6) use this system during the monitoring visit. Steps (1) and (2) assure the host party as to the certification of whichever system is eventually used in the monitoring visit. Steps (1), (3), (4), and (5) increase the monitoring party's confidence in the authentication of the measurement system.

MacArthur, Duncan W. [Los Alamos National Laboratory; Hauck, Danielle K. [Los Alamos National Laboratory; Thron, Jonathan L. [Los Alamos National Laboratory

2012-07-09T23:59:59.000Z

116

CERTIFICATE OF AUTHENTICITY | Department of Energy  

Energy Savers [EERE]

D.C. Tran001.pdf CERTIFICATE OF AUTHENTICITY More Documents & Publications U.S. Offshore Wind Advanced Technology Demonstration Projects Public Meeting Transcript for...

117

A DAWP Technique for Audio Authentication  

Science Journals Connector (OSTI)

Digital audio content protection is part of information security for audio authentication and audio integrity evaluation. Watermarking is widely used in copyright protection. However, watermark requires a thir...

Tung-Shou Chen; Jeanne Chen; Jiun-Lin Tang; Keshou Wu

2011-01-01T23:59:59.000Z

118

User Survey | Argonne Leadership Computing Facility  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Survey User Survey Results The ALCF conducts yearly surveys to gain a better understanding of how we can improve the user experience at ALCF. Below are the numeric results of these...

119

Instructions for using HSPD-12 Authenticated Outlook Web Access...  

Energy Savers [EERE]

Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Provides instructions for remote Outlook...

120

Prospective Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Prospective Users Prospective Users Prospective Users Print The Advanced Light Source (ALS) welcomes researchers from universities, government labs, and industry who are interested in performing experiments at the general sciences and structural biology beamlines open to users. An overview of user opportunities, and the procedures to become a user, are outlined below: What is an ALS User? Research Facilities Available to Users Costs to Users Users from Industry User Policy How to Become an ALS User What is an ALS User? The ALS is a third generation synchrotron light source, providing over 35 beamlines, where samples may be illuminated with x-ray, ultraviolet or infrared light to explore the structure and electronic properties of materials. The ALS operates as a national user facility, and is open to researchers worldwide to submit proposals for research.

Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Verifying authentication protocols with CSP Steve Schneider  

E-Print Network [OSTI]

Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

Doran, Simon J.

122

Prospective Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Prospective Users Print Prospective Users Print The Advanced Light Source (ALS) welcomes researchers from universities, government labs, and industry who are interested in performing experiments at the general sciences and structural biology beamlines open to users. An overview of user opportunities, and the procedures to become a user, are outlined below: What is an ALS User? Research Facilities Available to Users Costs to Users Users from Industry User Policy How to Become an ALS User What is an ALS User? The ALS is a third generation synchrotron light source, providing over 35 beamlines, where samples may be illuminated with x-ray, ultraviolet or infrared light to explore the structure and electronic properties of materials. The ALS operates as a national user facility, and is open to researchers worldwide to submit proposals for research.

123

T-606: Sun Java System Access Manager Lets Remote Users Partially...  

Broader source: Energy.gov (indexed) [DOE]

LINKS: SecurityTracker Alert ID: 1025408 CVE-2011-0844 CVE-2011-0847 Oracle Critical Patch Update Advisory IMPACT ASSESSMENT: Medium Discussion: A remote authenticated user can...

124

User Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Contacts for Users Contacts for Users User Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment Coordination Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users Tel: 510-486-7727 ALS User Office The User Office is located on the mezzanine of Building 6 (the ALS), Room 2212. Contact Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 Fax: 510-486-4773 Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Hours User Office: Monday-Friday 8.00 a.m. - 12.00 p.m. and 1.00 p.m. - 5.00 p.m.

125

AUTHENTICATED  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2. AMENDMENT OF AGREEMENT BPA and Port Townsend amend the Agreement as follows: (a) The following Section 2.24 ("Wheel Turning Load") shall be added to the Agreement: "2.24...

126

Deniable Authentication with RSA and Multicasting Daniel R. L. Brown  

E-Print Network [OSTI]

. Related concepts to deniable authentication are plausible deniability and prevention of surreptitious

127

V-036: EMC Smarts Network Configuration Manager Database Authenticatio...  

Energy Savers [EERE]

Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative...

128

User-centric identity as a service-architecture for eIDs with selective attribute disclosure  

Science Journals Connector (OSTI)

Unique identification and secure authentication of users are essential processes in numerous security-critical areas such as e-Government, e-Banking, or e-Business. Therefore, many countries (particularly in Europe) have implemented national eID solutions ... Keywords: Austrian eID, authentication, citizen card, cloud computing, identity management, privacy, public cloud, selective attribute disclosure

Daniel Slamanig, Klaus Stranacher, Bernd Zwattendorfer

2014-06-01T23:59:59.000Z

129

User Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Home Contact Home Contact User Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment Coordination Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users Tel: 510-486-7727 ALS User Office The User Office is located on the mezzanine of Building 6 (the ALS), Room 2212. Contact Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 Fax: 510-486-4773 Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Hours User Office: Monday-Friday 8.00 a.m. - 12.00 p.m. and 1.00 p.m. - 5.00 p.m.

130

E-Print Network 3.0 - archeological gold authentication Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

't do. Tests and quizzes aren't the gold standard either. - Fixed-choice test questions tend... by authentic use & authentic assessment. 12;Authentic performance...

131

Hardware device binding and mutual authentication  

DOE Patents [OSTI]

Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

Hamlet, Jason R; Pierson, Lyndon G

2014-03-04T23:59:59.000Z

132

U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users  

Broader source: Energy.gov (indexed) [DOE]

9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain 9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication May 1, 2012 - 7:00am Addthis PROBLEM: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 6) ABSTRACT: A vulnerability was reported in Red Hat Enterprise MRG Messaging. A remote user can access cluster messages and view the internal configuration. reference LINKS: SecurityTracker Alert ID: 1026990 CVE-2011-3620 Red Hat advisory IMPACT ASSESSMENT: High Discussion: Qpid may accept arbitrary passwords and SASL mechanims. A remote user on the local private interconnect network with knowledge of a valid cluster

133

Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes  

DOE Patents [OSTI]

Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.

Kent, Alexander Dale (Los Alamos, NM)

2008-09-02T23:59:59.000Z

134

User Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Services Print User Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment Coordination Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users Tel: 510-486-7727 ALS User Office The User Office is located on the mezzanine of Building 6 (the ALS), Room 2212. Contact Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 Fax: 510-486-4773 Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Hours User Office: Monday-Friday 8.00 a.m. - 12.00 p.m. and 1.00 p.m. - 5.00 p.m. New user registration: Monday-Friday 8.00 a.m. - 12.00 p.m. and

135

User Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Services Print User Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment Coordination Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users Tel: 510-486-7727 ALS User Office The User Office is located on the mezzanine of Building 6 (the ALS), Room 2212. Contact Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 Fax: 510-486-4773 Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Hours User Office: Monday-Friday 8.00 a.m. - 12.00 p.m. and 1.00 p.m. - 5.00 p.m. New user registration: Monday-Friday 8.00 a.m. - 12.00 p.m. and

136

User Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Services Print User Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment Coordination Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users Tel: 510-486-7727 ALS User Office The User Office is located on the mezzanine of Building 6 (the ALS), Room 2212. Contact Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 Fax: 510-486-4773 Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Hours User Office: Monday-Friday 8.00 a.m. - 12.00 p.m. and 1.00 p.m. - 5.00 p.m. New user registration: Monday-Friday 8.00 a.m. - 12.00 p.m. and

137

User Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Services Print User Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment Coordination Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users Tel: 510-486-7727 ALS User Office The User Office is located on the mezzanine of Building 6 (the ALS), Room 2212. Contact Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 Fax: 510-486-4773 Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Hours User Office: Monday-Friday 8.00 a.m. - 12.00 p.m. and 1.00 p.m. - 5.00 p.m. New user registration: Monday-Friday 8.00 a.m. - 12.00 p.m. and

138

User Guide  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Guide Guide User Guide Print 1. Apply for Beam Time Submit a new proposal or a Beam Time Request (BTR) using an existing active proposal. 2. Establish a User Agreement Your institute must have a signed agreement with Berkeley Lab before you may do work at the ALS. 3. Complete Experiment Safety Documentation and Review Safety for Users Safety documentation must be completed and reviewed before your beam time. Experiments involving any biological material or radioactive material require more review steps so please allow several weeks for these. 4. Register with the User Office New and returning users need to register with the User Office TWO weeks before arriving at the ALS. Users arriving out of regular office hours must either have a valid Berkeley Lab ID badge, or have completed registration to be granted access to the ALS.

139

User Obligations  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Obligations User Obligations Summary of what APS expects of users in return for access to the facility. Registration Register with the APS as far in advance of your initial visit as possible (even when you are simply planning an experiment). User Agreement Ensure that a User Agreement is in place between the APS and your home institution. Training Ensure that you complete all required training before conducting hands-on work at the APS. Safety Assessement Complete Experiment Safety Assessment Forms. End of Experiment Form Complete End of Experiment form to provide feedback (required for General Users, optional for others). Published Reports of Work Carried Out at the APS As an APS user, you are required to notify both the APS and your host beamline staff of all work published in the open literature (including

140

Gaining a World View  

E-Print Network [OSTI]

tx H 2 O | pg. 26 --------------------------------------------- ???????????????????????? W hen Brandon Hartley traveled to Belgium last summer, he gained a first-hand appreciation for international soil and water issues. Hartley, a Texas A...

Wythe, Kathy

2007-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

T-646: Debian fex authentication bypass | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

6: Debian fex authentication bypass 6: Debian fex authentication bypass T-646: Debian fex authentication bypass June 14, 2011 - 3:45pm Addthis PROBLEM: The vulnerability is caused due to the application not properly verifying the existence of "auth-ID" when uploading files and can be exploited to bypass the authentication mechanism. PLATFORM: Debian fex ABSTRACT: Debian security discovered that fex, a web service for transferring very large, files, is not properly validating authentication IDs. While the service properly validates existing authentication IDs, an attacker who is not specifying any authentication ID at all, can bypass the authentication procedure. reference LINKS: DSA-2259-1 fex Secunia Advisory SA44940 Debian Security Advisory DSA-2259-1 fex-20110610.tar Vulnerability Report: Debian GNU/Linux 6.0

142

A service-oriented architecture for authentication and authorization  

E-Print Network [OSTI]

THESIS A Service-oriented Architecture for AuthenticationSAN DIEGO A Service-oriented Architecture for Authentication2.0, which is a service-oriented architecture that addresses

Hamedtoolloei, Hamidreza

2009-01-01T23:59:59.000Z

143

User Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Services Print Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment Coordination Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users Tel: 510-486-7727 ALS User Office The User Office is located on the mezzanine of Building 6 (the ALS), Room 2212. Contact Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 Fax: 510-486-4773 Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Hours User Office: Monday-Friday 8.00 a.m. - 12.00 p.m. and 1.00 p.m. - 5.00 p.m. New user registration: Monday-Friday 8.00 a.m. - 12.00 p.m. and

144

User Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Services Print Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment Coordination Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users Tel: 510-486-7727 ALS User Office The User Office is located on the mezzanine of Building 6 (the ALS), Room 2212. Contact Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 Fax: 510-486-4773 Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Hours User Office: Monday-Friday 8.00 a.m. - 12.00 p.m. and 1.00 p.m. - 5.00 p.m. New user registration: Monday-Friday 8.00 a.m. - 12.00 p.m. and

145

CLOC: Authenticated Encryption for Short Input Tetsu Iwata1  

E-Print Network [OSTI]

. CLOC uses a variant of CFB mode in its encryption part and a variant of CBC MAC in the authentication

146

Deniable Authentication with RSA and Multicasting Daniel R. L. Brown  

E-Print Network [OSTI]

of surreptitious forwarding. The IETF S/MIME protocol, which can be used to secure email, includes an Authenticated

147

PAP: A Privacy and Authentication Protocol for Passive RFID Tags  

E-Print Network [OSTI]

PAP: A Privacy and Authentication Protocol for Passive RFID Tags Alex X. Liu LeRoy A. Bailey for RFID tags is necessary to ensure the privacy and authentication between each tag and their reader. In order to accomplish this, we propose PAP, a privacy and authentication protocol for passive RFID tags

Liu, Alex X.

148

REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL  

E-Print Network [OSTI]

REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL Christopher Mann and Daniel Loebenberger 15 August 2014 Abstract. We show how to realize two-factor authentication for a Bitcoin wal- let a prototypic implementation of a Bitcoin wallet that offers both: two-factor authentication and verification

149

FORENSIC CONNOISSEURSHIP, JACKSON POLLOCK, AND THE AUTHENTIC EYE  

E-Print Network [OSTI]

FORENSIC CONNOISSEURSHIP, JACKSON POLLOCK, AND THE AUTHENTIC EYE by Francis V. O'Connor, Ph shall proceed to some general #12;Forensic Connoisseurship, Pollock, & The Authentic Eye - F. V. O, the training of authentic eyes and forensic connoisseurs -- concluding with a final thought on the historicity

Taylor, Richard

150

Robust video authentication system over internet protocol  

Science Journals Connector (OSTI)

This paper presents a video authentication system over internet protocol that is insusceptible to illumination and expression variations. The illumination and expression invariant features are extracted using multi-band feature extraction. These features are classified by a radial basis function neural network. A new adaptive decision fusion method is proposed to combine the scores from different modalities and the different frames during the authentication process. Three levels of decision fusion are carried out in the proposed adaptive decision fusion. Depending on the level of decision fusion, the level of illumination influence is taken into account during the decision making.

Sue Inn Ch'ng; Kah Phooi Seng; Li-Minn Ang; Fong Tien Ong; Yee Wan Wong

2011-01-01T23:59:59.000Z

151

Industrial Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Industrial Users - Media Publications and Information The Invisible Neutron Threat Neutron-Induced Failures in Semiconductor Devices Nuclear Science Research at the LANSCE-WNR...

152

Industrial Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

on altitude. This large flux allows testing of semiconductor devices at greatly accelerated rates. Industry users are invited to contact Steve Wender, phone:505-667-1344 or...

153

Gain Sharing.PDF  

Broader source: Energy.gov (indexed) [DOE]

SE SE DOE/IG-480 I N S P E C T I O N R E P O R T U.S. DEPARTMENT OF ENERGY OFFICE OF INSPECTOR GENERAL OFFICE OF INSPECTIONS INSPECTION OF GAIN SHARING OPPORTUNITIES FOR THE DEPARTMENT OF ENERGY SEPTEMBER 2000 U.S. DEPARTMENT OF ENERGY Washington, DC 20585 September 1, 2000 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman /s/ for Herbert Richardson Inspector General SUBJECT: INFORMATION: Report on "Inspection of Gain Sharing Opportunities for the Department of Energy" BACKGROUND In 1995, the General Services Administration provided guidance on a program known as "GAIN SHARING" where agencies could give cash awards to employees who participate in programs to save travel dollars. This guidance discussed the authority to offer cash awards to employees for obtaining a free coach class ticket with Frequent Flyer benefits earned on official travel and for

154

Building Energy Software Tools Directory: Window Heat Gain  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Window Heat Gain Window Heat Gain Window Heat Gain image Calculates the solar heat gain through vertical windows in temperate latitudes. Screen Shots Keywords Solar, window, energy Validation/Testing N/A Expertise Required None. Users Few (new program). Audience Architects, energy analysts. Input Location, window characteristics, ground characteristics. Output Daily/monthly heat gain through window. Computer Platform Web Programming Language JavaScript Strengths Allows default locations/windows/surfaces or custom user data. Incorporates lots of ASHRAE SHGF data that is otherwise burdensome to deal with. Weaknesses Only works for windows facing close to due north, south, east, or west. Doesn't address conductive losses or shading. Contact Company: Sustainable By Design Address: 3631 Bagley Avenue North

155

Spatial Data Authentication Using Mathematical Visualization  

E-Print Network [OSTI]

Spatial Data Authentication Using Mathematical Visualization Vert, G., Harris, F., Nasser, S. Dept has become an increasingly compromised method to transmit any type of data including spatial data. Due to the criticality of spatial data in decision making processes that range from military targeting to urban planning

Harris Jr., Frederick C.

156

User Policy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Policy Print User Policy Print 1. Guiding Principles The aim of User Policy at the Advanced Light Source (ALS) is to provide a framework for establishing a challenging yet congenial environment where talented scientists from different backgrounds can work together in pursuit of the new scientific opportunities presented by the availability of this innovative facility. User policy must address a variety of user needs and sensitivities. On one hand, the qualified researcher with little financial backing needs assurance of adequate access to the facility. On the other hand, qualified groups that make a large commitment of time and resources need some assurance of an equitable return on their investment. A national facility should be accessible to all qualified researchers and at the ALS there are three modes of access: as a General User, a member of an Approved Program (AP), or as a member of a Participating Research Team (PRT). All proposals for research to be conducted at the ALS are evaluated based on the criteria endorsed by the International Union of Pure and Applied Physics (IUPAP). These criteria are detailed on the IUPAP Web site at IUPAP Recommendations for the Use of Major Physics Users Facilities (pdf version).

157

T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

0:Samba SWAT 'user' Field Cross Site Scripting Vulnerability 0:Samba SWAT 'user' Field Cross Site Scripting Vulnerability T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability August 1, 2011 - 2:10pm Addthis PROBLEM: Samba SWAT 'user' Field Cross Site Scripting Vulnerability PLATFORM: All Linux ABSTRACT: It was found that the 'Change Password' page / screen of the Samba Web Administration Tool did not properly sanitize content of the user-provided "user" field, prior printing it back to the page content. A remote attacker could provide a specially-crafted URL, which once visited by an authenticated Samba SWAT user could allow the attacker to conduct cross-site scripting attacks (execute arbitrary HTML or script code). reference LINKS: SecurityFocus - Bugtraq ID: 48901 Secunia CVE Reference: CVE-2011-2694

158

T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

80:Samba SWAT 'user' Field Cross Site Scripting Vulnerability 80:Samba SWAT 'user' Field Cross Site Scripting Vulnerability T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability August 1, 2011 - 2:10pm Addthis PROBLEM: Samba SWAT 'user' Field Cross Site Scripting Vulnerability PLATFORM: All Linux ABSTRACT: It was found that the 'Change Password' page / screen of the Samba Web Administration Tool did not properly sanitize content of the user-provided "user" field, prior printing it back to the page content. A remote attacker could provide a specially-crafted URL, which once visited by an authenticated Samba SWAT user could allow the attacker to conduct cross-site scripting attacks (execute arbitrary HTML or script code). reference LINKS: SecurityFocus - Bugtraq ID: 48901 Secunia CVE Reference: CVE-2011-2694

159

NIF Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

have never been created in a laboratory environment and exist naturally only during thermonuclear burn, in supernovae and in the fusion reactions that power our stars. The NIF User...

160

User Community  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Community Community Given the pressures of conducting experiments, it's sometimes hard to find time to connect with new potential colleagues, even though they may be working at the next beamline. There are many opportunities for making informal connections with other users and with APS staff; this page lists only a few of the many communication channels at the APS. Reaching Other Users Coffee Cart A source of morning sustenance and a chance to see who's been working in the hutch next to yours all night. An APS manager makes the rounds with the Coffee Cart each morning. Scientific Interest Groups Self-organizing groups of users and beamline staff interested in advancing synchrotron research in a particular area. User Science Seminars, General Seminars and Conferences

Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Linda L. Gaines resume  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

L. Gaines L. Gaines Systems Analyst Center for Transportation Research Energy Systems Division Argonne National Laboratory 9700 South Cass Avenue, Bldg. 362 Argonne, IL 60439 phone: 630/252-4919 e-mail: lgaines@anl.gov Professional Experience * Lead analyst for U.S. Department of Energy's heavy vehicle idling studies. * Study costs and impacts on energy use and environment of production and recycling of advanced- design automobiles, trucks, trains, and batteries. * Primary interest is problem solving, which has been applied to efficient use of resources. * Since joining Argonne in 1976, have written handbooks of energy and material flows in petroleum refining, organic chemicals, and copper industries that provided background for reports and papers on technical and institutional issues involved in recycling discarded tires, packaging,

162

User Policy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Policy Policy User Policy Print 1. Guiding Principles The aim of User Policy at the Advanced Light Source (ALS) is to provide a framework for establishing a challenging yet congenial environment where talented scientists from different backgrounds can work together in pursuit of the new scientific opportunities presented by the availability of this innovative facility. User policy must address a variety of user needs and sensitivities. On one hand, the qualified researcher with little financial backing needs assurance of adequate access to the facility. On the other hand, qualified groups that make a large commitment of time and resources need some assurance of an equitable return on their investment. A national facility should be accessible to all qualified researchers and at the ALS there are three modes of access: as a General User, a member of an Approved Program (AP), or as a member of a Participating Research Team (PRT). All proposals for research to be conducted at the ALS are evaluated based on the criteria endorsed by the International Union of Pure and Applied Physics (IUPAP). These criteria are detailed on the IUPAP Web site at IUPAP Recommendations for the Use of Major Physics Users Facilities (pdf version).

163

U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users  

Broader source: Energy.gov (indexed) [DOE]

4: Apple OS X Lets Remote Users Execute Arbitrary Code and 4: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am Addthis U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am PROBLEM: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: Apple OS X ABSTRACT: Several vulnerabilities were reported in Apple OS X. reference LINKS: Apple Security Article: HT5501 SecurityTracker Alert ID: 1027551 CVE-2012-0650 CVE-2012-3716 CVE-2012-3718 CVE-2012-3719 CVE-2012-3720 CVE-2012-3721 CVE-2012-3722 CVE-2012-3723 IMPACT ASSESSMENT: Medium Discussion: If the DirectoryService Proxy is used, a remote user can trigger a buffer

164

U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users  

Broader source: Energy.gov (indexed) [DOE]

4: Apple OS X Lets Remote Users Execute Arbitrary Code and 4: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am Addthis U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am PROBLEM: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: Apple OS X ABSTRACT: Several vulnerabilities were reported in Apple OS X. reference LINKS: Apple Security Article: HT5501 SecurityTracker Alert ID: 1027551 CVE-2012-0650 CVE-2012-3716 CVE-2012-3718 CVE-2012-3719 CVE-2012-3720 CVE-2012-3721 CVE-2012-3722 CVE-2012-3723 IMPACT ASSESSMENT: Medium Discussion: If the DirectoryService Proxy is used, a remote user can trigger a buffer

165

U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

1: Microsoft Active Directory CRL Validation Flaw Lets Remote 1: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication November 9, 2011 - 8:30am Addthis PROBLEM: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Active Directory Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows 7 for 32-bit Systems Windows 7 for 32-bit Systems Service Pack 1

166

User Policy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Policy Print Policy Print 1. Guiding Principles The aim of User Policy at the Advanced Light Source (ALS) is to provide a framework for establishing a challenging yet congenial environment where talented scientists from different backgrounds can work together in pursuit of the new scientific opportunities presented by the availability of this innovative facility. User policy must address a variety of user needs and sensitivities. On one hand, the qualified researcher with little financial backing needs assurance of adequate access to the facility. On the other hand, qualified groups that make a large commitment of time and resources need some assurance of an equitable return on their investment. A national facility should be accessible to all qualified researchers and at the ALS there are three modes of access: as a General User, a member of an Approved Program (AP), or as a member of a Participating Research Team (PRT). All proposals for research to be conducted at the ALS are evaluated based on the criteria endorsed by the International Union of Pure and Applied Physics (IUPAP). These criteria are detailed on the IUPAP Web site at IUPAP Recommendations for the Use of Major Physics Users Facilities (pdf version).

167

User Policy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Policy Print Policy Print 1. Guiding Principles The aim of User Policy at the Advanced Light Source (ALS) is to provide a framework for establishing a challenging yet congenial environment where talented scientists from different backgrounds can work together in pursuit of the new scientific opportunities presented by the availability of this innovative facility. User policy must address a variety of user needs and sensitivities. On one hand, the qualified researcher with little financial backing needs assurance of adequate access to the facility. On the other hand, qualified groups that make a large commitment of time and resources need some assurance of an equitable return on their investment. A national facility should be accessible to all qualified researchers and at the ALS there are three modes of access: as a General User, a member of an Approved Program (AP), or as a member of a Participating Research Team (PRT). All proposals for research to be conducted at the ALS are evaluated based on the criteria endorsed by the International Union of Pure and Applied Physics (IUPAP). These criteria are detailed on the IUPAP Web site at IUPAP Recommendations for the Use of Major Physics Users Facilities (pdf version).

168

Verifiable process monitoring through enhanced data authentication.  

SciTech Connect (OSTI)

To ensure the peaceful intent for production and processing of nuclear fuel, verifiable process monitoring of the fuel production cycle is required. As part of a U.S. Department of Energy (DOE)-EURATOM collaboration in the field of international nuclear safeguards, the DOE Sandia National Laboratories (SNL), the European Commission Joint Research Centre (JRC) and Directorate General-Energy (DG-ENER) developed and demonstrated a new concept in process monitoring, enabling the use of operator process information by branching a second, authenticated data stream to the Safeguards inspectorate. This information would be complementary to independent safeguards data, improving the understanding of the plant's operation. The concept is called the Enhanced Data Authentication System (EDAS). EDAS transparently captures, authenticates, and encrypts communication data that is transmitted between operator control computers and connected analytical equipment utilized in nuclear processes controls. The intent is to capture information as close to the sensor point as possible to assure the highest possible confidence in the branched data. Data must be collected transparently by the EDAS: Operator processes should not be altered or disrupted by the insertion of the EDAS as a monitoring system for safeguards. EDAS employs public key authentication providing 'jointly verifiable' data and private key encryption for confidentiality. Timestamps and data source are also added to the collected data for analysis. The core of the system hardware is in a security enclosure with both active and passive tamper indication. Further, the system has the ability to monitor seals or other security devices in close proximity. This paper will discuss the EDAS concept, recent technical developments, intended application philosophy and the planned future progression of this system.

Goncalves, Joao G. M. (European Commission Joint Research Centre, Italy); Schwalbach, Peter (European Commission Directorate General%3CU%2B2014%3EEnergy, Luxemburg); Schoeneman, Barry Dale; Ross, Troy D.; Baldwin, George Thomas

2010-09-01T23:59:59.000Z

169

User Manual  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Manual Manual Services Overview ECS Audio/Video Conferencing Fasterdata IPv6 Network Network Performance Tools (perfSONAR) ESnet OID Registry PGP Key Service Virtual Circuits (OSCARS) OSCARS Case Study Documentation User Manual Web Browser Interface (WBUI) Web Service Interface (API) FAQ Design Specifications Functional Specifications Notifications Publications Authorization Policy Default Attributes Message Security Clients For Developers Interfaces Links Hardware Requirements DOE Grids Service Transition Contact Us Technical Assistance: 1 800-33-ESnet (Inside the US) 1 800-333-7638 (Inside the US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net User Manual Introduction The OSCARS Interdomain Controller (IDC) allows end users to reserve high

170

Formal analysis of device authentication applications in ubiquitous computing.  

SciTech Connect (OSTI)

Authentication between mobile devices in ad-hoc computing environments is a challenging problem. Without pre-shared knowledge, existing applications rely on additional communication methods, such as out-of-band or location-limited channels for device authentication. However, no formal analysis has been conducted to determine whether out-of-band channels are actually necessary. We answer this question through formal analysis, and use BAN logic to show that device authentication using a single channel is not possible.

Shin, Dongwan (New Mexico Tech, Socorro, NM); Claycomb, William R.

2010-11-01T23:59:59.000Z

171

U-268: Oracle Database Authentication Protocol Discloses Session...  

Broader source: Energy.gov (indexed) [DOE]

the authentication protocol at the time of this entry. Please visit the Oracle Critical Patch Updates, Security Alerts and Third Party Bulletin for additional information when it...

172

Dos and don'ts of client authentication on the web  

Science Journals Connector (OSTI)

Client authentication has been a continuous source of problems on the Web. Although many well-studied techniques exist for authentication, Web sites continue to use extremely weak authentication schemes, especially in non-enterprise environments such ...

Kevin Fu; Emil Sit; Kendra Smith; Nick Feamster

2001-08-01T23:59:59.000Z

173

V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and  

Broader source: Energy.gov (indexed) [DOE]

6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny 6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code January 24, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Cisco Wireless LAN Controller. PLATFORM: The vulnerabilities are reported in: Cisco 2000 Series WLC Cisco 2100 Series WLC Cisco 2500 Series WLC Cisco 4100 Series WLC Cisco 4400 Series WLC Cisco 5500 Series WLC Cisco 7500 Series WLC Cisco 8500 Series WLC Cisco 500 Series Wireless Express Mobility Controllers Cisco Wireless Services Module (Cisco WiSM) Cisco Wireless Services Module version 2 (Cisco WiSM version 2)

174

V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints |  

Broader source: Energy.gov (indexed) [DOE]

0: Apache Tomcat Bug Lets Remote Users Bypass Security 0: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints December 5, 2012 - 1:00am Addthis PROBLEM: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints PLATFORM: Version(s): 6.0.0 - 6.0.35, 7.0.0 - 7.0.29 ABSTRACT: A vulnerability was reported in Apache Tomcat. REFERENCE LINKS: Apache Tomcat Red Hat Bugzilla - Bug 883634 SecurityTracker Alert ID: 1027833 CVE-2012-3546 IMPACT ASSESSMENT: High DISCUSSION: When using FORM authentication it was possible to bypass the security constraint checks in the FORM authenticator by appending /j_security_check to the end of the URL if some other component (such as the Single-Sign-On valve) had called request.setUserPrincipal() before the call to

175

Greenhouse Gas and Air Pollution Interactions and Synergies (GAINS) | Open  

Open Energy Info (EERE)

Greenhouse Gas and Air Pollution Interactions and Synergies (GAINS) Greenhouse Gas and Air Pollution Interactions and Synergies (GAINS) Jump to: navigation, search Tool Summary Name: Greenhouse Gas and Air Pollution Interactions and Synergies (GAINS) Agency/Company /Organization: International Institute for Applied Systems Analysis (IIASA) Sector: Energy, Land Topics: Co-benefits assessment, GHG inventory Resource Type: Software/modeling tools User Interface: Website Complexity/Ease of Use: Not Available Website: gains.iiasa.ac.at/index.php/home-page/241-on-line-access-to-gains Cost: Free UN Region: Eastern Africa, Middle Africa, Northern Africa, Southern Africa, Western Africa, Caribbean, Central America, South America, Northern America, Central Asia, Eastern Asia, Southern Asia, South-Eastern Asia, Western Asia, Eastern Europe, Northern Europe, Southern Europe, Western Europe, Australia and New Zealand, Melanesia, Micronesia, Polynesia

176

User Environment  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Environment Environment on Genepool When you log into the Genepool system you will land in your $HOME directory on NERSC's "global homes" file system. The global homes file system is mounted across all NERSC computation systems with the exception of PDSF. The $HOME directory has quota of 40GB and 1,000,000 inodes. To customize your environment, by setting environment variables or aliases, you will need to modify one of the "dot" files that NERSC has created for you. You may NOT modify the .bashrc or .cshrc files. These are set to read-only on NERSC systems and specify system specific customizations. Instead you should modify a file called .bashrc.ext or .cshrc.ext. Learn more about the global homes user environment. Important Environment Variables

177

User's Manual  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User's User's Manual for Pelegant - Yusong Wang, Michael Borland, Robert Soliday - APS Accelerator Systems Division, Advanced Photon Source 1 Introduction Pelegant stands for "parallel elegant," which is a parallelized version of elegant [1]. Written in the C programming language with MPICH, the Pelegant has been successfully ported to several clusters and supercomputers, such as the "weed" cluster (a heterogeneous system of 100 CPUs) at Advanced Photon Source (APS), and the Jazz cluster (350 Intel Xeon CPUs) at Argonne National Lab (ANL) and the BlueGene/L supercomputer (1024 dual PowerPC 440 nodes) at Argonne National Lab. Thanks to careful design in parallelization and good architecture of the serial elegant, the Pelegant achieves very good performance. For example, for a simulation of 10 5 particles in APS including symplectic element-by-element tracking,

178

Secure password-based authenticated key exchange for web services  

Science Journals Connector (OSTI)

This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based ... Keywords: authenticated key exchange, password, security, web services

Liang Fang; Samuel Meder; Olivier Chevassut; Frank Siebenlist

2004-10-01T23:59:59.000Z

179

Enhancing CardSpace Authentication Using a Mobile Device  

E-Print Network [OSTI]

, authentication. 1 Introduction In line with the continuing increase in the number of on-line services requir- ing design goals of CardSpace is to reduce reliance on password authentication. We address this limitation, since the additional overhead is handled by the client. The remainder of the paper is

Sheldon, Nathan D.

180

Extreme Users WHY engage with extreme users  

E-Print Network [OSTI]

Extreme Users METHOD WHY engage with extreme users HOW to engage extreme users Designers engage inspiration from their work-arounds and frameworks. When you speak with and observe extreme users, their needs extreme users are often also needs of a wider population. Determine who's extreme Determining who

Prinz, Friedrich B.

Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

NIF User Group  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

users NIF User Group The National Ignition Facility User Group provides an organized framework and independent vehicle for interaction between the scientists who use NIF for...

182

2011 Raj JainCSE571SWashington University in St. Louis Authentication, Authorization,Authentication, Authorization,  

E-Print Network [OSTI]

23-1 ©2011 Raj JainCSE571SWashington University in St. Louis Authentication, Authorization://www.cse.wustl.edu/~jain/cse571-11/ #12;23-2 ©2011 Raj JainCSE571SWashington University in St. Louis OverviewOverview RADIUS 802.1X #12;23-3 ©2011 Raj JainCSE571SWashington University in St. Louis RADIUSRADIUS Remote

Jain, Raj

183

U-030: Apache Tomcat Lets Untrusted Web Applications Gain Elevated  

Broader source: Energy.gov (indexed) [DOE]

30: Apache Tomcat Lets Untrusted Web Applications Gain Elevated 30: Apache Tomcat Lets Untrusted Web Applications Gain Elevated Privileges U-030: Apache Tomcat Lets Untrusted Web Applications Gain Elevated Privileges November 9, 2011 - 8:30am Addthis PROBLEM: Apache Tomcat Lets Untrusted Web Applications Gain Elevated Privileges. PLATFORM: Apache Tomcat 7.0.0-7.0.21. ABSTRACT: An untrusted web application can access Manager application functions. reference LINKS: Apache Tomcat 7.x vulnerabilities SecurityTracker Alert ID: 1026295 CVE-2011-3376 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apache Tomcat. A local user (application) can obtain elevated privileges on the target system. A local web application (that is not trusted) can access Manager application functions without being marked as privileged. This can be exploited to obtain

184

Secure password-based authenticated key exchange for web services  

SciTech Connect (OSTI)

This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

2004-11-22T23:59:59.000Z

185

T-659: Update support for RSA Authentication Manager | Department...  

Broader source: Energy.gov (indexed) [DOE]

Manager July 1, 2011 - 7:15am Addthis PROBLEM: Authentication Manager SP4 Patch 4 Windows Server 2008 PLATFORM: Windows Server 2008 SP4 Patch 4 32bit & 64bit...

186

Student Users' Perceptions of Second Life as an Educational Tool  

E-Print Network [OSTI]

Second Life (SL) is gaining popularity in an educational context. Based on the need for educators to understand emerging technologies and their potential for use in the classroom, this study explored student users perceptions of the use of SL...

Shepperd, Christopher

2012-07-16T23:59:59.000Z

187

U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary 8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code January 25, 2012 - 6:00am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. PLATFORM: Version(s): 12.5 SP3; pcAnywhere Solutions 7.1 GA, SP 1, and SP 2 ABSTRACT: Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain elevated privileges on the target system. reference LINKS: Symantec Advisory Secunia Advisory SecurityTracker Alert ID:102576 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted data to TCP port 5631 to trigger a but in the validation of authentication data and execute arbitrary code.

188

U-188: MySQL User Login Security Bypass and Unspecified Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

8: MySQL User Login Security Bypass and Unspecified 8: MySQL User Login Security Bypass and Unspecified Vulnerability U-188: MySQL User Login Security Bypass and Unspecified Vulnerability June 12, 2012 - 7:00am Addthis PROBLEM: A security issue and vulnerability have been reported in MySQL PLATFORM: MySQL 5.x ABSTRACT: An error when verifying authentication attempts can be exploited to bypass the authentication mechanism. Reference LINKS: Original Advisory CVE-2012-2122 Secunia Advisory 49409 IMPACT ASSESSMENT: High Discussion: Successful exploitation of this vulnerability requires MySQL to be built on a system with a library that allows "memcmp()" to return a value outside of the -128 through 127 range (e.g. sse-optimized glibc). NOTE: Vendor binaries are reportedly not affected. The security issue is reported in versions prior to 5.1.63 and 5.5.25.

189

V-212: Samba smbd CPU Processing Loop Lets Remote Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

2: Samba smbd CPU Processing Loop Lets Remote Users Deny 2: Samba smbd CPU Processing Loop Lets Remote Users Deny Service V-212: Samba smbd CPU Processing Loop Lets Remote Users Deny Service August 6, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba PLATFORM: Samba 3.0.x - 4.0.7 ABSTRACT: All current released versions of Samba are vulnerable to a denial of service on an authenticated or guest connection REFERENCE LINKS: Secunia Advisory SA54436 Samba Security Release CVE-2013-4124 IMPACT ASSESSMENT: Medium DISCUSSION: A malformed packet can cause the smbd server to loop the CPU performing memory allocations and preventing any further service. A connection to a file share, or a local account is needed to exploit this problem, either authenticated or unauthenticated if guest connections are allowed. This

190

2014 NERSC User Survey  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2014 NERSC User Survey 2014 NERSC User Survey December 17, 2014 by Francesca Verdier (0 Comments) Please take a few minutes to fill out NERSC's annual user survey. Your feedback is...

191

Safety for Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Safety for Users Print Safety at the ALS The mission of the ALS is "Support users in doing outstanding science in a safe environment." All users and staff participate in creating a...

192

Safety for Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Safety for Users Print Safety at the ALS The mission of the ALS is "Support users in doing outstanding science in a safe environment." All users and staff participate in creating...

193

General User Proposals  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

General User Proposals Print General Users are granted beam time through a peer review proposal process. They may use beamlines and endstations provided by the ALS or the...

194

General User Proposals  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Office General User Proposals Print General Users are granted beam time through a peer review proposal process. They may use beamlines and endstations provided by the ALS...

195

Using Semantics for Automating the Authentication of Web APIs  

E-Print Network [OSTI]

Abstract. Recent technology developments in the area of services on the Web are marked by the proliferation of Web applications and APIs. The implementation and evolution of applications based on Web APIs is, however, hampered by the lack of automation that can be achieved with current technologies. Research on semantic Web services is therefore trying to adapt the principles and technologies that were devised for traditional Web services, to deal with this new kind of services. In this paper we show that currently more than 80 % of the Web APIs require some form of authentication. Therefore authentication plays a major role for Web API invocation and should not be neglected in the context of mashups and composite data applications. We present a thorough analysis carried out over a body of publicly available APIs that determines the most commonly used authentication approaches. In the light of these results, we propose an ontology for the semantic annotation of Web API authentication information and demonstrate how it can be used to create semantic Web API descriptions. We evaluate the applicability of our approach by providing a prototypical implementation, which uses authentication annotations as the basis for automated service invocation. 1

Maria Maleshkova; Carlos Pedrinaci; John Domingue; Guillermo Alvaro; Ivan Martinez

196

Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding author)  

E-Print Network [OSTI]

1 Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding in the process algebra Communicating Sequential Processes (CSP) to specify authentication. The purpose, security protocols, CSP, formal specification, Kerberos 1. Introduction Schneider [1] uses Communicating

Doran, Simon J.

197

Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis  

Science Journals Connector (OSTI)

Authentication schemes relying on per-packet signature and per-signature verification introduce heavy cost for computation and communication. Due to its constraint resources, smart grid's authentication requirement cannot be satisfied by this scheme. ...

Depeng Li; Zeyar Aung; John R. Williams; Abel Sanchez

2012-01-01T23:59:59.000Z

198

U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site  

Broader source: Energy.gov (indexed) [DOE]

7: Red Hat Certificate System Bugs Let Remote Users Conduct 7: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks July 20, 2012 - 7:00am Addthis PROBLEM: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks PLATFORM: Red Hat Certificate System v8 ABSTRACT: Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate. reference LINKS: Advisory: RHSA-2012:1103-1 SecurityTracker Alert ID: 1027284 CVE-2012-2662 CVE-2012-3367 IMPACT ASSESSMENT: Medium Discussion: The Agent and End Entity pages do not properly filter HTML code from

199

U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject  

Broader source: Energy.gov (indexed) [DOE]

6: Cisco Small Business SRP500 Series Bug Lets Remote Users 6: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands November 3, 2011 - 8:15am Addthis PROBLEM: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands. PLATFORM: The following models are affected when running firmware prior to version 1.1.24: Cisco SRP521W Cisco SRP526W Cisco SRP527W The following models are affected when running firmware prior to version 1.2.1: Cisco SRP541W Cisco SRP546W Cisco SRP547W ABSTRACT: A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system. reference LINKS: Advisory ID: cisco-sa-20111102-srp500 SecurityTracker Alert ID: 1026266

200

U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service 31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service August 9, 2012 - 7:00am Addthis PROBLEM: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service PLATFORM: Version(s): ASA 5500 Series; 8.2 - 8.4 ABSTRACT: Two vulnerabilities were reported in Cisco ASA. A remote or remote authenticated user can cause denial of service conditions. reference LINKS: Release Notes for the Cisco ASA 5500 Series, 8.4(x) SecurityTracker Alert ID: 1027355 CVE-2012-2472 CVE-2012-2474 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in Cisco ASA. 1. On systems with SIP inspection enabled, a remote user can send specially crafted SIP traffic to cause the target device to create many identical

Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Quantum-Secure Authentication with a Classical Key  

E-Print Network [OSTI]

Authentication provides the trust people need to engage in transactions. The advent of physical keys that are impossible to copy promises to revolutionize this field. Up to now, such keys have been verified by classical challenge-response protocols. Such protocols are in general susceptible to emulation attacks. Here we demonstrate Quantum-Secure Authentication ("QSA") of an unclonable classical physical key in a way that is inherently secure by virtue of quantum-physical principles. Our quantum-secure authentication operates in the limit of a large number of channels, represented by the more than thousand degrees of freedom of an optical wavefront shaped with a spatial light modulator. This allows us to reach quantum security with weak coherent pulses of light containing dozens of photons, too few for an adversary to determine their complex spatial shapes, thereby rigorously preventing emulation.

Sebastianus A. Goorden; Marcel Horstmann; Allard P. Mosk; Boris kori?; Pepijn W. H. Pinkse

2014-06-03T23:59:59.000Z

202

U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication...  

Broader source: Energy.gov (indexed) [DOE]

7.0.0 and 7.0.1 (MEG 6.7.x is NOT affected.) McAfee Email and Web Security (EWS) 5.6 Patch 3 and earlier McAfee Email and Web Security (EWS) 5.5 Patch 6 and earlier ABSTRACT:...

203

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

vulnerabilities were reported in Symantec Messaging Gateway. August 29, 2012 U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative...

204

VISION 2008 User's Guide  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

VISION 2008 User's Guide VISION 2008 User's Guide ANL-08/34 Energy Systems Division VISION 2008 User's Guide ANL-08/34 User's Guide by J. Ward Vehicle Technologies Program, U.S. Department of Energy, Energy Efficiency and Renewable Energy VISION model by A. Vyas and M. Singh Transportation Technology R&D Center, Argonne National Laboratory October 2008 VISION 2008 User's Guide October 2008 i Table of Contents Copyright Notification .............................................................................................................................. ii List of Abbreviations ................................................................................................................................ iii

205

Current Projects: Product Authenticity Tags - Vulnerability Assessment Team  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Product Authenticity Tags Product Authenticity Tags VAT Projects Introducing the VAT Adversarial Vulnerability Assessments Safety Tags & Product Counterfeiting Election Security Spoofing GPS Defeating Existing Tamper-Indicating Seals Specialty Field Tools & Sampling Tools Insider Threat Mitigation Drug Testing Security Microprocessor Prototypes The Journal of Physical Security Vulnerability Assessments Vulnerability Assessments Insanely Fast µProcessor Shop Insanely Fast µProcessor Shop Seals About Seals Applications of Seals Common Myths about Tamper Indicating Seals Definitions Findings and Lessons Learned New Seals Types of Seals Seals References Selected VAT Papers Selected VAT Papers Selected Invited Talks Self-Assessment Survey Security Maxims Devil's Dictionary of Security Terms Argonne's VAT (brochure)

206

FACET User Facility  

Broader source: All U.S. Department of Energy (DOE) Office Webpages

AD SLACPortal > Accelerator Research Division > FACET User Facility AD SLACPortal > Accelerator Research Division > FACET User Facility Sign In Launch the Developer Dashboard SLAC National Accelerator Laboratory DOE | Stanford | SLAC | SSRL | LCLS | AD | PPA | Photon Science | PULSE | SIMES FACET User Facility : FACET An Office of Science User Facility Search this site... Search Help (new window) Top Link Bar FACET User Facility FACET Home About FACET FACET Experimental Facilities FACET Users Research at FACET SAREC Expand SAREC FACET FAQs FACET User Facility Quick Launch FACET Users Home FACET Division ARD Home About FACET FACET News FACET Users FACET Experimental Facilities FACET Research Expand FACET Research FACET Images Expand FACET Images SAREC Expand SAREC FACET Project Site (restricted) FACET FAQs FACET Site TOC All Site Content

207

User_ViewRecords  

Broader source: Energy.gov (indexed) [DOE]

User Records User Records © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Viewing User Records Purpose The purpose of this job aid is to guide users through the step-by-step process of viewing their records. Each task demonstrates viewing of different records. Task A. View To-Do List Enter the web address (URL) of the user application into your browser Address field and press the Enter key. Enter your user ID in the User ID textbox. Enter your password in the Password textbox. Click Sign In. View To-Do List (filter, view) 7 Steps Task A View Completed Work 8 Steps Task B View Curriculum Status and Details 11 Steps Task C 3 3 1 2 2 1 SuccessFactors Learning v 6.4 User Job Aid Viewing User Records

208

Designing the user in user interfaces  

Science Journals Connector (OSTI)

In the good old days, the human was here, the computer there, and a good living was to be made by designing ways to interface between the two. Now we find ourselves unthinkingly pinching to zoom in on a picture in a paper magazine. User interfaces are ... Keywords: mixed reality, posthuman factors, transhumanism, user interace, virtual reality

Mark Bolas

2014-10-01T23:59:59.000Z

209

V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

6: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users 6: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges January 10, 2013 - 2:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: *Adobe Reader XI (11.0.0) for Windows and Macintosh *Adobe Reader X (10.1.4) and earlier 10.x versions for Windows and Macintosh *Adobe Reader 9.5.2 and earlier 9.x versions for Windows and Macintosh *Adobe Reader 9.5.1 and earlier 9.x versions for Linux *Adobe Acrobat XI (11.0.0) for Windows and Macintosh *Adobe Acrobat X (10.1.4) and earlier 10.x versions for Windows and

210

V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

66: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users 66: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges January 10, 2013 - 2:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: *Adobe Reader XI (11.0.0) for Windows and Macintosh *Adobe Reader X (10.1.4) and earlier 10.x versions for Windows and Macintosh *Adobe Reader 9.5.2 and earlier 9.x versions for Windows and Macintosh *Adobe Reader 9.5.1 and earlier 9.x versions for Linux *Adobe Acrobat XI (11.0.0) for Windows and Macintosh *Adobe Acrobat X (10.1.4) and earlier 10.x versions for Windows and

211

The User Agreement  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Agreement User Agreement Oak Ridge National Laboratory is home to a number of highly sophisticated experimental user facilities. These research facilities, instruments, and laboratories are designed to serve Laboratory researchers, engineers, and technical staff, as well as external researchers from universities, industries, foreign institutions and other government laboratories. Sharing these state-of-the-art facilities with the scientific, industrial, and technical communities provides access to unique and specialized technology, equipment and instrumentation without burdening the user with the astronomical capital costs of building such facilities. Characteristics of User Agreements * User Agreements come in two types; proprietary and non-proprietary. The characteristics of

212

User Facilities | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

USER PORTAL USER PORTAL BTRICBuilding Technologies Research Integration Center CNMSCenter for Nanophase Materials Sciences CSMBCenter for Structural Molecular Biology CFTFCarbon Fiber Technology Facility HFIRHigh Flux Isotope Reactor MDF Manufacturing Demonstration Facility NTRCNational Transportation Research Center OLCFOak Ridge Leadership Computing Facility SNSSpallation Neutron Source Keeping it fresh at the Spallation Neutron Source Nanophase material sciences' nanotech toolbox Home | User Facilities SHARE ORNL User Facilities ORNL is home to a number of highly sophisticated experimental user facilities that provide unmatched capabilities to the broader scientific community, including a growing user community from universities, industry, and other laboratories research institutions, as well as to ORNL

213

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network [OSTI]

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP, 16, 12, 9]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

Dutertre, Bruno

214

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network [OSTI]

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

Doran, Simon J.

215

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network [OSTI]

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a verification method described in [14]. The PVS formalization consists of a semantic embedding of CSP for this purpose [3, 16, 12, 9]. In [14], Schneider presents such a method based on CSP [7]. The approach relies

Dutertre, Bruno

216

Authenticity Issue in Performing Arts using Live Electronics  

E-Print Network [OSTI]

by the production process key elements for future assessment of authenticity. We will present some "case studies we intend to study the production process, and extract from the elements and traces left, the electronic processes are evaluated towards their robustness against changes of instrumentist, changes

Kouroupetroglou, Georgios

217

Robust RFID Authentication Protocol with Formal Proof and Its Feasibility  

E-Print Network [OSTI]

security models compatible with formal security analysis tools. We show that an RFID authentication, such as by letting us reference the price, origin and circulation route of specic goods. On the other hand-in-the-middle adversary and communication fault. We dene model and security proofs via a game-based approach makes our

218

Cryptographic Link Signatures for Spectrum Usage Authentication in Cognitive Radio  

E-Print Network [OSTI]

Cryptographic Link Signatures for Spectrum Usage Authentication in Cognitive Radio Xi Tan, Kapil frequency spectrum was inefficiently utilized. To fully use these spectrums, cognitive radio networks have of cognitive radio is to enable the current fixed spectrum channels assigned by Federal Communica- tions

Du, Wenliang "Kevin"

219

Final report for the mobile node authentication LDRD project.  

SciTech Connect (OSTI)

In hostile ad hoc wireless communication environments, such as battlefield networks, end-node authentication is critical. In a wired infrastructure, this authentication service is typically facilitated by a centrally-located ''authentication certificate generator'' such as a Certificate Authority (CA) server. This centralized approach is ill-suited to meet the needs of mobile ad hoc networks, such as those required by military systems, because of the unpredictable connectivity and dynamic routing. There is a need for a secure and robust approach to mobile node authentication. Current mechanisms either assign a pre-shared key (shared by all participating parties) or require that each node retain a collection of individual keys that are used to communicate with other individual nodes. Both of these approaches have scalability issues and allow a single compromised node to jeopardize the entire mobile node community. In this report, we propose replacing the centralized CA with a distributed CA whose responsibilities are shared between a set of select network nodes. To that end, we develop a protocol that relies on threshold cryptography to perform the fundamental CA duties in a distributed fashion. The protocol is meticulously defined and is implemented it in a series of detailed models. Using these models, mobile wireless scenarios were created on a communication simulator to test the protocol in an operational environment and to gather statistics on its scalability and performance.

Michalski, John T.; Lanzone, Andrew J.

2005-09-01T23:59:59.000Z

220

Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols  

E-Print Network [OSTI]

to privacy of consumers. In recent years, the cryptographic community have made an extensive effort Zahra Ahmadian, Mahmoud Salmasizadeh, and Mohammad Reza Aref Abstract--Privacy is faced to serious years have focused on design and analysis of privacy friendly ultralightweight authentication protocols

Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Secure Password-Based Authenticated Key Exchange for Web Services  

E-Print Network [OSTI]

sign-on, delegation, and identity. The Grid Security Infrastructure (GSI) is the name given so. 1.3 Security in Grid Computing Security is one of the major requirements of Grid computing. Any Grid site deployment must at least provide the basic security mechanisms including authentication

222

SP 800-38B. Recommendation for Block Cipher Modes of Operation: the CMAC Mode for Authentication  

Science Journals Connector (OSTI)

This Recommendation specifies a message authentication code (MAC) algorithm based on a symmetric key block cipher. This block cipher-based MAC algorithm, called CMAC, may be used to provide assurance of the authenticity and, hence, the integrity of binary ... Keywords: Authentication, block cipher, cryptography, information security, integrity, message authentication code, mode of operation.

Morris J. Dworkin

2005-05-01T23:59:59.000Z

223

Argonne CNM: Industrial Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

For Industrial Users For Industrial Users The Center for Nanoscale Materials (CNM) has specific interest in growing the industrial user program and encourages researchers in industry to consider the capabilities and expertise we have to offer. As a CNM user, you have easy access to sophisticated scientific instrumentation geared toward nanoscience and nanotechnology. Moreover, our widely recognized staff researchers offer support in designing your experiments, using the equipment, and analyzing your data. Access to the CNM is through peer review of user proposals. Before you submit your first user proposal, we encourage you to contact any of our staff researchers, group leaders, the User Office, or division management to discuss the feasibility of your intended research using the expertise and facilities at the CNM. We are here to serve you as part of our user community and will be happy to address any questions you might have.

224

Fermilab Users' Meeting, 2009  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Users Meeting Poster Fermilab Users' Meeting Users Meeting Poster Fermilab Users' Meeting June 3-4, 2009 The annual gathering of the Fermilab Users Organization will be held on June 3-4, 2009. This meeting is an opportunity for discussion of new physics results from the laboratory's experimental program, future initiatives at the lab, and thoughtful presentations from leaders of the scientific policy community. The meeting will also feature selected talks from outstanding young physicists. Topics to be covered at the Users Meeting include: Collider Physics Astro-particle Physics Neutrino Physics Future Plans Full Agenda Registration is now closed. NEW!: Pictures from the 2009 Users' Meeting can be found here. A poster session organized by the GSA will be held on June 3rd in the Atrium. The public lecture at this year's Users' Meeting will be given by Prof. Tom Katsouleas

225

NSLS Services | User Accounts  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Accounts User Accounts Operating Accounts (81000 accounts) General Users who are allocated beam time and Participating Research Teams (PRTs) or Contributing Users (CUs) who operate beamlines should establish a BNL operating account to cover the costs of materials while running an experiment, shipping, and/or miscellaneous BNL services (telephone & fax codes), if these needs are anticipated. The term of the purchase order must be specified and names of persons having signature authorization for charges against this account must be listed. Brookhaven's Fiscal Division will bill the user for any charges the user makes to the account. Users are obligated to pay outstanding debts promptly. All users should set up a $1,000 operating account to cover operating expenses while at the NSLS, such as charges for use of trades, shops, and

226

EER of fixed and trainable fusion classifiers: A theoretical study with application to biometric authentication tasks  

E-Print Network [OSTI]

Biometric authentication is a process of verifying an identity claim using a persons behavioural and physiological characteristics. Due to the vulnerability of the system to environmental noise and variation caused by the user, fusion of several biometric-enabled systems is identified as a promising solution. In the literature, various fixed rules (e.g. min, max, median, mean) and trainable classifiers (e.g. linear combination of scores or weighted sum) are used to combine the scores of several base-systems. How exactly do correlation and imbalance nature of base-system performance affect the fixed rules and trainable classifiers? We study these joint aspects using the commonly used error measurement in biometric authentication, namely Equal Error Rate (EER). Similar to several previous studies in the literature, the central assumption used here is that the class-dependent scores of a biometric system are approximately normally distributed. However, different from them, the novelty of this study is to make a direct link between the EER measure and the fusion schemes mentioned. Both synthetic and real experiments (with as many as 256 fusion experiments carried out on the XM2VTS benchmark score-level fusion data sets) verify our proposed theoretical modeling of EER of the two families of combination scheme. In particular, it is found that weighted sum can provide the best generalisation performance when its weights are estimated correctly. It also has the additional advantage that score normalisation prior to fusion is not needed, contrary to the rest of fixed fusion rules.

Norman Poh; Samy Bengio

2005-01-01T23:59:59.000Z

227

EER of Fixed and Trainable Fusion Classifiers: A Theoretical Study with Application to Biometric Authentication Tasks  

E-Print Network [OSTI]

submitted for publication Abstract. Biometric authentication is a process of verifying an identity claim using a persons behavioural and physiological characteristics. Due to the vulnerability of the system to environmental noise and variation caused by the user, fusion of several biometric-enabled systems is identified as a promising solution. In the literature, various fixed rules (e.g. min, max, median, mean) and trainable classifiers (e.g. linear combination of scores or weighted sum) are used to combine the scores of several base-systems. How exactly do correlation and imbalance nature of base-system performance affect the fixed rules and trainable classifiers? We study these joint aspects using the commonly used error measurement in biometric authentication, namely Equal Error Rate (EER). Similar to several previous studies in the literature, the central assumption used here is that the class-dependent scores of a biometric system are approximately normally distributed. However, different from them, the novelty of this study is to make a direct link between the EER measure and the fusion schemes mentioned. Both synthetic and real experiments (with as many as 512 fusion experiments carried out on the XM2VTS benchmark score-level fusion data sets) verify our proposed theoretical modeling of EER of the two families of combination scheme. In particular, it is found that weighted sum can provide the best generalisation performance when its weights are estimated correctly. It also has the additional advantage that score normalisation prior to fusion is not needed, contrary to the rest of fixed fusion rules. 2 IDIAPRR 05-01 1

Norman Poh A; Samy Bengio A; Norman Poh; Samy Bengio

2005-01-01T23:59:59.000Z

228

TRL Computer System Users Guide  

SciTech Connect (OSTI)

We have developed a wiki-based graphical user-interface system that implements our technology readiness level (TRL) uncertainty models. This document contains the instructions for using this wiki-based system.

Engel, David W.; Dalton, Angela C.

2014-01-31T23:59:59.000Z

229

LANSCE | Users | LUG | Topical User Workshop  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

to NNSA's call for major NNSA facility upgrades, as well as new end stations at the Lujan Neutron Scattering Center. All current and potential LANSCE users are encouraged to...

230

STANDARD USER AGREEMENT  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

REV 6/3/2010 REV 6/3/2010 Proprietary User Agreement No. PR-14- BETWEEN UT-BATTELLE, LLC. ("CONTRACTOR") Operator of Oak Ridge National Laboratory (hereinafter "Laboratory") under U.S. Department of Energy (DOE) Contract No. DE-AC05-00OR22725 and NAME OF USER INSTITUTION ("USER") (Collectively, "the Parties") The obligations of the Contractor may be transferred and shall apply to any successor in interest to said Contractor continuing the operation of the DOE facilities involved in this Proprietary User Agreement. ARTICLE I. FACILITIES AND SCOPE OF WORK CONTRACTOR will make available to employees, consultants and representatives of USER

231

Safety for Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Safety for Users Safety for Users Safety for Users Print Safety at the ALS The mission of the ALS is "Support users in doing outstanding science in a safe environment." All users and staff participate in creating a culture and environment where performing research using the proper safeguards and fulfilling all safety requirements result in the success of the facility and its scientific program. The documents and guidance below will assist users and staff to achieve these goals. How Do I...? A series of fact sheets that explain what users need to know and do when preparing to conduct experiments at the ALS. Complete Experiment Safety Documentation? Work with Biological Materials? Work with Chemicals? Work with Regulated Soil? Bring and Use Electrical Equipment at the ALS?

232

ALS User Meeting Archives  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Meeting Archives Print User Meeting Archives Print Past User Meeting Agendas, Workshops, and Awards Year Agenda Workshops David A. Shirley (Science) Klaus Halbach (Instrumentation) Tim Renner (Service) 2012 2012 User Meeting Agenda 2012 User Meeting Workshops 2012 ALS User Meeting Awards Carl Percival, Dudley Shallcross, Craig Taatjes and David Osborn (Sandia), for making the first direct measurements of the reactions of Criegee intermediates, and showing that their impact on tropospheric chemistry and climate may be substantially greater than previously assumed. 2012 ALS User Meeting Awards Jeff Dickert and Simon Morton of Berkeley Lab's Physical Biosciences Division for the invention and implementation of the Compact Variable Collimator (CVC), which has led to a dramatic increase in productivity of protein crystallography.

233

ALS User Meeting Archives  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

ALS User Meeting Archives ALS User Meeting Archives Past User Meeting Agendas, Workshops, and Awards Year Agenda Workshops David A. Shirley (Science) Klaus Halbach (Instrumentation) Tim Renner (Service) 2012 2012 User Meeting Agenda 2012 User Meeting Workshops 2012 ALS User Meeting Awards Carl Percival, Dudley Shallcross, Craig Taatjes and David Osborn (Sandia), for making the first direct measurements of the reactions of Criegee intermediates, and showing that their impact on tropospheric chemistry and climate may be substantially greater than previously assumed. 2012 ALS User Meeting Awards Jeff Dickert and Simon Morton of Berkeley Lab's Physical Biosciences Division for the invention and implementation of the Compact Variable Collimator (CVC), which has led to a dramatic increase in productivity of protein crystallography.

234

NSLS User Access | Training  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Training Training Training for New Users and Users with Expired Training and/or Badges: All new users and users with expired badges must complete or update the training modules shown below prior to access to the experimental floor. The training can be completed online prior to arrival at the NSLS and is strongly recommended to save considerable time during check-in at the Guest, User, Visitor (GUV) Center in Building 400. Please note each training module is followed by an exam which asks for your name and guest number. If you do not already have a guest number, leave this entry blank. All new users and users with expired badges MUST arrive on a weekday (no weekends or holidays) and check in at the GUV Center so that your training can be verified and to receive a photo ID badge (new or updated). The GUV

235

Insight Gained from Simplified Dynamic Analysis  

Broader source: Energy.gov [DOE]

Insight Gained from Simplified Dynamic Analysis ... or Everything Old is New Again October 21, 2014 Greg Mertz Consultant

236

TWOZONE USERS MANUAL  

E-Print Network [OSTI]

The heat sources are the furnace, solar heat gain (throughfurnace load (BTUH) to windows, walls, roof, floor and infiltration. Hours and amount of useful solar

Gadgil, Ashok J.

2010-01-01T23:59:59.000Z

237

TWOZONE USERS MANUAL  

E-Print Network [OSTI]

The heat sources are the furnace, solar heat gain (throughfurnace load (BTUH) to windows, walls, roof, floor and infiltration. Hours and amount of useful solar

Gadgil, Ashok J.

2008-01-01T23:59:59.000Z

238

Hardware device to physical structure binding and authentication  

DOE Patents [OSTI]

Detection and deterrence of device tampering and subversion may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a binding of the hardware device and a physical structure. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generate an internal PUF value. Binding logic is coupled to receive the internal PUF value, as well as an external PUF value associated with the physical structure, and generates a binding PUF value, which represents the binding of the hardware device and the physical structure. The cryptographic fingerprint unit also includes a cryptographic unit that uses the binding PUF value to allow a challenger to authenticate the binding.

Hamlet, Jason R.; Stein, David J.; Bauer, Todd M.

2013-08-20T23:59:59.000Z

239

Improving the security of quantum direct communication with authentication  

E-Print Network [OSTI]

Two protocols of quantum direct communication with authentication [Phys. Rev. A {\\bf 73}, 042305 (2006)] are recently proposed by Lee, Lim and Yang. In this paper we will show that in the two protocols the authenticator Trent should be prevented from knowing the secret message of communication. The first protocol can be eavesdropped by Trent using the the intercept-measure-resend attack, while the second protocol can be eavesdropped by Trent using single-qubit measurement. To fix these leaks, I revise the original versions of the protocols by using the Pauli-Z operation $\\sigma_z$ instead of the original bit-flip operation $X$. As a consequence, the protocol securities are improved.

Zhan-jun Zhang

2006-04-18T23:59:59.000Z

240

APS Users Organization  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

APSUO APSUO By-Laws Steering Commitee Employment Meetings Compton Award Franklin Award APS Users Organization The APSUO is responsible for advising the APS Associate Laboratory Director in the following areas: The Organization will serve as an advocacy group for the Facility and its user community. The Organization will provide advice to the ALD on matters affecting the user community. The Organization will assure good communication between the APS user community and the APS management. APSUO By-Laws The by-laws upon which the APS User Organization is based. List of Steering Committee Members Steering committee for the APS Users Organization. Employment Bulletin Board APS-related employment opportunities. APSUO Steering Committee Meetings Minutes and presentations from the APSUO meetings.

Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

User Financial Account Form  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

URA REVISED 2/20/13 URA REVISED 2/20/13 User Financial Account Form Establish a user financial account at SLAC to procure gases, chemicals, supplies or services to support your experiment at SLAC's user facilities and to send samples, dewars, or other equipment between SLAC and your institution. To open or renew your SLAC user financial account, complete and submit this form along with a Purchase Order (PO) from your institution. The PO should be made to SLAC National Accelerator Laboratory for the amount of estimated expenditures (the suggested minimum is $1,000). Send this form with the PO (or a letter from the financial officer of your institution) to: Jackie Kerlegan (SSRL) or Theresa Wong (LCLS) User Research Administration, MS 99 User Research Administration, MS 99 SLAC National Accelerator Laboratory

242

JGI User Meeting 2007  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Second Annual Second Annual DOE Joint Genome Institute User Meeting Marriott Hotel Walnut Creek, California March 28-30, 2007 The U.S. Department of Energy Joint Genome Institute (JGI) welcomed its users and collaborators, as well as prospective new users, to the second annual JGI User Meeting. This international gathering of researchers with an interest in sequence-based science offered three days of user presentations, tours, workshops, and poster sessions. This was a unique opportunity to meet fellow users and JGI staff. Sessions and posters in the fields of microbial genomics, microbial communities, eukaryotic genomics, and genome technologies were presented. ©2006-2007, The Regents of the University of California. Last updated May 9, 2007. Disclaimer | Webmaster Agenda

243

Zimbra for APS Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Calendar Calendar Zimbra Calendar  ZWC Benefits: - Usable lab-wide, can schedule meetings with users and rooms outside APS - User friendly  Each Zimbra user has a personal calendar - Users migrated from Sun Calendar System optionally elected to migrate data from their personal calendar  With Zimbra, calendar terminology: - Appointments - Events - Meetings  Users can: - Create appointments - Create recurring events - Schedule all day events - Accept/Tentative/Reject an invitation with one click - Create additional calendars - Share their calendars with other users on and off-site - Delegate calendar management - Accept calendar shares - View calendar in various ways and print - Use color for quick calendar recognition - Schedule meetings * View multiple calendars to see potential scheduling

244

User_Login  

Broader source: Energy.gov (indexed) [DOE]

Logging In to SuccessFactors Learning Logging In to SuccessFactors Learning © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Logging In to SuccessFactors Learning Purpose The purpose of this job aid is to guide users through the step-by-step process of logging in to the SuccessFactors Learning Management System (LMS), retrieving your forgotten password and/or user ID, and using the LMS Help system. Task A. Log In to SuccessFactors Learning Enter the web address (URL) of the user application into your browser Address field and press the Enter key. Enter your user ID in the User ID textbox. Enter your password in the Password textbox. Click Sign In. 3 3 Log In to SuccessFactors Learning 5 Steps Task A Retrieve Forgotten Password and/or User

245

User_Navigation  

Broader source: Energy.gov (indexed) [DOE]

Online Learning Center v 6.4 Online Learning Center v 6.4 User Job Aid Navigation © 2012 Department of Energy - 1 - Online Learning Center (OLC) Job Aid: Navigation Purpose The purpose of this job aid is to guide users through the step-by-step process of navigating and identifying areas of the OLC, The Department of Energy's Learning Management System (LMS) user interface, and identifying some commonly used navigation icons. Identify Areas of the User Interface Task A Navigation Tips Task B How to Access in Online Learning Center Task C Online Learning Center v 6.4 User Job Aid Navigation © 2012 Department of Energy - 2 - Online Learning Center (OLC) Task A. Identify Areas of the OLC User Interface (OLC) Top Menu: Use the Home menu options in the top menu to navigate within the Online

246

Authenticated group Diffie-Hellman key exchange: theory and practice  

SciTech Connect (OSTI)

Authenticated two-party Diffie-Hellman key exchange allows two principals A and B, communicating over a public network, and each holding a pair of matching public/private keys to agree on a session key. Protocols designed to deal with this problem ensure A (B resp.)that no other principals aside from B (A resp.) can learn any information about this value. These protocols additionally often ensure A and B that their respective partner has actually computed the shared secret value. A natural extension to the above cryptographic protocol problem is to consider a pool of principals agreeing on a session key. Over the years several papers have extended the two-party Diffie-Hellman key exchange to the multi-party setting but no formal treatments were carried out till recently. In light of recent developments in the formalization of the authenticated two-party Diffie-Hellman key exchange we have in this thesis laid out the authenticated group Diffie-Hellman key exchange on firmer foundations.

Chevassut, Olivier

2002-10-03T23:59:59.000Z

247

ATF Program Advisory & Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

paths for flexibility & efficiency Old documentation not adequate Old hardware (PLC) no longer programmable ATF Program Advisory & Users Meeting, April 2-3,2009 M.Babzien...

248

Programs & User Facilities  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Facilities Programs & User Facilities Enabling remarkable discoveries and tools that transform our understanding of energy and matter and advance national, economic, and energy...

249

User Electrical Equipment Inspections  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Electronic and Electrical Equipment Inspection Criteria In order to be in compliance with NEC, OSHA, and DOE regulations all electronic and electrical equipment at the APS...

250

General User Proposals  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Proposals Print General Users are granted beam time through a peer review proposal process. They may use beamlines and endstations provided by the ALS or the Participating Research...

251

E-Print Network 3.0 - authentic cost calculations Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

cost calculations Search Powered by Explorit Topic List Advanced Search Sample search results for: authentic cost calculations Page: << < 1 2 3 4 5 > >> 1 A Lightweight...

252

E-Print Network 3.0 - authentications algorithms based Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

functionality based... . 2.1 Authentication systems and techniques ... Source: Brunato, Mauro - Dipartimento di Ingegneria e Scienza dell'Informazione, Universit di Trento...

253

E-Print Network 3.0 - authenticated key agreement Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

for authentication and managing and secret-key based proce... . An ... Source: Brunato, Mauro - Dipartimento di Ingegneria e Scienza dell'Informazione, Universit di Trento...

254

New foundations for efficient authentication, commutative cryptography, and private disjointness testing  

E-Print Network [OSTI]

This dissertation presents new constructions and security definitions related to three areas: authentication, cascadable and commutative crytpography, and private set operations. Existing works relevant to each of these ...

Weis, Stephen August, 1978-

2006-01-01T23:59:59.000Z

255

Counterfeit-resistant materials and a method and apparatus for authenticating materials  

DOE Patents [OSTI]

Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters; the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible. Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided.

Ramsey, J. Michael (Knoxville, TN); Klatt, Leon N. (Oak Ridge, TN)

2000-01-01T23:59:59.000Z

256

U-234: Oracle MySQL User Login Security Bypass Vulnerability | Department  

Broader source: Energy.gov (indexed) [DOE]

234: Oracle MySQL User Login Security Bypass Vulnerability 234: Oracle MySQL User Login Security Bypass Vulnerability U-234: Oracle MySQL User Login Security Bypass Vulnerability August 14, 2012 - 7:00am Addthis PROBLEM: Oracle MySQL User Login Security Bypass Vulnerability PLATFORM: Version(s): prior to 5.1.63 and 5.5.25 are vulnerable. ABSTRACT: Oracle MySQL is prone to a security bypass vulnerability Attackers can exploit this issue to bypass certain security restrictions. REFERENCE LINKS: http://www.securityfocus.com/bid/53911/discuss CVE-2012-2122 IMPACT ASSESSMENT: Medium Discussion: Security researchers have released details about a vulnerability in the MySQL server that could allow potential attackers to access MySQL databases without inputting proper authentication credentials.The vulnerability is identified as CVE-2012-2122 and was addressed in MySQL 5.1.63 and 5.5.25 in

257

Nanotechnology User Facility for  

E-Print Network [OSTI]

A National Nanotechnology User Facility for Industry Academia Government #12;The National Institute of Commerce's nanotechnology user facility. The CNST enables innovation by providing rapid access to the tools new measurement and fabrication methods in response to national nanotechnology needs. www

258

AppMonitor: A tool for recording user actions in unmodified Windows applications  

Science Journals Connector (OSTI)

This article describes AppMonitor, a Microsoft Windows-based client-side logging tool that records user actions in unmodified Windows applications. AppMonitor allows researchers to gain insights into many face...

Jason Alexander; Andy Cockburn; Richard Lobb

2008-05-01T23:59:59.000Z

259

U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially...  

Energy Savers [EERE]

and enhancement update U-068:Linux Kernel SGIO ioctl Bug Lets Local Users Gain Elevated Privileges T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update...

260

ARM User Survey Report  

SciTech Connect (OSTI)

The objective of this survey was to obtain user feedback to, among other things, determine how to organize the exponentially growing data within the Atmospheric Radiation Measurement (ARM) Climate Research Facility, and identify users preferred data analysis system. The survey findings appear to have met this objective, having received approximately 300 responses that give insight into the type of work users perform, usage of the data, percentage of data analysis users might perform on an ARM-hosted computing resource, downloading volume level where users begin having reservations, opinion about usage if given more powerful computing resources (including ability to manipulate data), types of tools that would be most beneficial to them, preferred programming language and data analysis system, level of importance for certain types of capabilities, and finally, level of interest in participating in a code-sharing community.

Roeder, LR

2010-06-22T23:59:59.000Z

Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

T-567: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users  

Broader source: Energy.gov (indexed) [DOE]

7: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local 7: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges T-567: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges March 1, 2011 - 6:44pm Addthis PROBLEM: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges . PLATFORM: Linux Kernel 2.4.x, 2.6.x ABSTRACT: A vulnerability was reported in the Linux Kernel. A local user may be able to obtain elevated privileges on the target system. A physically local user can connect a storage device with a specially crafted LDM partition table to trigger a buffer overflow in the ldm_frag_add() function in 'fs/partitions/ldm.c' and potentially execute arbitrary code with elevated privileges. reference LINKS: Security Tracker - Alert ID: 1025128

262

T-567: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users  

Broader source: Energy.gov (indexed) [DOE]

7: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local 7: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges T-567: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges March 1, 2011 - 6:44pm Addthis PROBLEM: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges . PLATFORM: Linux Kernel 2.4.x, 2.6.x ABSTRACT: A vulnerability was reported in the Linux Kernel. A local user may be able to obtain elevated privileges on the target system. A physically local user can connect a storage device with a specially crafted LDM partition table to trigger a buffer overflow in the ldm_frag_add() function in 'fs/partitions/ldm.c' and potentially execute arbitrary code with elevated privileges. reference LINKS: Security Tracker - Alert ID: 1025128

263

2nd Workshop on User Experience of Autonomous Driving  

Science Journals Connector (OSTI)

Autonomous Driving has gained attention from academia and industry over the last decades. Research organizations and companies have developed (semi-) autonomous vehicles and first in-situ studies have been conducted. This workshop follows last year's ... Keywords: Autonomous Vehicles, Autonomy, Human-Autonomy-Interaction, User Experience Design and Research

Alexander Meschtscherjakov, Rabindra Ratan, Manfred Tscheligi, Roderick McCall, Dalila Szostak, Ioannis Politis, Sven Krome

2014-09-01T23:59:59.000Z

264

CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider  

E-Print Network [OSTI]

CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider Department In this paper we consider the nature of machine proofs used in the CSP approach to the veri cation of authentication protocols using the process algebra CSP Hoa85]. The CSP syntax provides a natural and precise way

Doran, Simon J.

265

A Trustful Authentication and Key Exchange Scheme (TAKES) for Ad Hoc Networks  

E-Print Network [OSTI]

A Trustful Authentication and Key Exchange Scheme (TAKES) for Ad Hoc Networks Tony Cheneau National public key distribution scheme adapted to ad hoc networks called TAKES for Trustful Authentication, or even implementing a light naming system can be enabled on top of ad hoc networks. TAKES is formally

Paris-Sud XI, Université de

266

End-to-end aggregate authentication of time-series data  

Science Journals Connector (OSTI)

We consider the problem of providing integrity of aggregate result in the presence of an untrusted data aggregator who may introduce errors into data fusion, causing the final aggregate result to far deviate from the true result determined by participating ... Keywords: aggregate authentication, computation over authenticated data, time-series

Di Ma; Yan Zhu; Mengyang Yu

2013-05-01T23:59:59.000Z

267

Comparative studies on authentication and key exchange methods for 802.11 wireless LAN  

Science Journals Connector (OSTI)

IEEE 802.11 wireless LAN has become one of the hot topics on the design and development of network access technologies. In particular, its authentication and key exchange (AKE) aspects, which form a vital building block for modern security mechanisms, ... Keywords: Authentication, Confidentiality, Key exchange, Security, WLAN

Jun Lei, Xiaoming Fu, Dieter Hogrefe, Jianrong Tan

2007-08-01T23:59:59.000Z

268

eSeal -A System for Enhanced Electronic Assertion of Authenticity and Integrity  

E-Print Network [OSTI]

in the network and a communication protocol. The system is able to control various kinds of integrity settings to claim and assert the authenticity and integrity of goods, documents or other valued objects in storageeSeal - A System for Enhanced Electronic Assertion of Authenticity and Integrity Christian Decker1

Beigl, Michael

269

AUDIO FORENSIC AUTHENTICATION BASED ON MOCC BETWEEN ENF AND REFERENCE SIGNALS  

E-Print Network [OSTI]

AUDIO FORENSIC AUTHENTICATION BASED ON MOCC BETWEEN ENF AND REFERENCE SIGNALS Zhisheng Lv1 of Warwick, Coventry CV4 7AL, UK ABSTRACT This paper proposes a new audio authenticity detection algorithm Frequency) signal and the reference signal. We first extract the ENF signal from a query audio signal

Li, Chang-Tsun

270

North American trade alliance gains support  

Science Journals Connector (OSTI)

North American trade alliance gains support ... A broad trade alliance among the U.S., Canada, and Mexico isn't likely yet, but pacts for specific industrial sectors may be possible; one candidate for agreement is petrochemicals and the effects would be profound ... The idea, now gaining wide and influential support, is the formation of some sort of North American trade alliance. ...

EARL V. ANDERSON

1980-07-14T23:59:59.000Z

271

User_TalentProfile  

Broader source: Energy.gov (indexed) [DOE]

Accessing and Modifying Talent Profile Accessing and Modifying Talent Profile © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Accessing and Modifying Talent Profile Purpose The purpose of this job aid is to guide users through the step-by-step process of accessing their talent profiles, adding information to their profiles, and editing existing talent profile information. Task A. Access Talent Profile Enter the web address (URL) of the user application into your browser Address field and press the Enter key. Enter your user ID in the User ID textbox. Enter your password in the Password textbox. Click Sign In. Access Talent Profile 4 Steps Task A Add Information to Talent Profile Sections 5 Steps Task B Edit Talent Profile Sections

272

REScheck Software User's Guide  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

REScheck Software REScheck Software User's Guide Building Energy Codes Program Table Of Contents Overview ................................................................................... 1 Tutorials ................................................................................. 2 Table Columns and Rows ............................................................. 3 Rows ...................................................................................... 3 Columns ................................................................................. 5 Project Information ..................................................................... 7 Location.................................................................................. 7 Project Type (2006 IECC) ..........................................................

273

JGI Compute User Training  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

JGI Compute JGI Compute User Training Series JGI Compute User Training Series homeh1 Overview NERSC and IT staff will host a series training sessions and open office hours to introduce new services and review best practices for using the Crius cluster. All sessions are hands on, so please bring your laptop. If you are or were a user of any of the following systems, Crius, Rhea, Kronos, Theia, Oceanus or Phoebe, it will be beneficial for you to attend these training sessions. And if you plan to use JGI compute resources in the future, we also encourage you to attend. It will also be an opportunity for JGI compute users to ask questions and give NERSC and IT staff feedback on your requirements. Session 3: February 24th, 2012 1:30-5pm rm 100-101 Agenda 1:30-1:45 - Intro and presentation of the transition schedule we talked

274

Office 2007 User Workshop  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Office 2007 User Workshop Office 2007 User Workshop M. Westbrook, APS-IT June 30, 2010 Goal: Quick Start for New Office 2007 Users Introduce and highlight new Office 2007 program feature (Word, Excel and PowerPoint) Identify sources of help with Office 2007 Provide opportunity for users to share experiences Office 2007: Introduction  Format for today's presentation is that of a workshop rather than training course  Many of the new features presented here apply to multiple Office applications  Sources for more information are identified throughout the presentation  Presenter is no expert, but plans to share what has been learned thus far  Attendees are encouraged to share what you have learned for the benefit of all

275

Bevalac user's handbook  

SciTech Connect (OSTI)

This report is a users manual on the Bevalac accelerator facility. This paper discuses: general information; the Bevalac and its operation; major facilities and experimental areas; and experimental equipment.

Not Available

1990-04-01T23:59:59.000Z

276

User Manual Extended Video  

E-Print Network [OSTI]

User Manual TDS3VID Extended Video Application Module 071-0328-02 *P071032802* 071032802 #12. . . . . . . . . . . . . . . . . . . . . . . . . . . Accessing Extended Video Functions 7. . . . . . . . . . . . Extended Video Conventions 10. . . . . . . . . . . . . . . . . . . Changes to the Video Trigger Menu 11. . . . . . . . . . . . . . Changes to the Display Menu 15

Kleinfeld, David

277

International aeronautical user charges  

E-Print Network [OSTI]

Introduction: 1.1 BACKGROUND AND MOTIVATION Very few issues relating to the international air transportation industry are today as divisive as those pertaining to user charges imposed at international airports and enroute ...

Odoni, Amedeo R.

1985-01-01T23:59:59.000Z

278

User Data Forum Presentations  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

-pcds-user-forum-data-intensive-jun14-1.pdf | pdf | 459 KB T08: ACME - Accelerated Climate Modeling For Energy June 17, 2014 | Author(s): Marcia Branstetter, Katherine Evans, John...

279

User Data Forum Presentations  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

File: T10-Joint-Facilities-User-Forum.pdf | pdf | 7 MB T08: ACME - Accelerated Climate Modeling For Energy June 17, 2014 | Author(s): Marcia Branstetter, Katherine Evans, John...

280

General User Proposals  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Proposals Print Tuesday, 01 June 2010 09:36 General Users are granted beam time through a peer review proposal process. They may use beamlines and endstations provided by the ALS...

Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

User Operation Manual  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

SNS-NSSD-TOF-TD-0002 - R00 SNS-NSSD-TOF-TD-0002 - R00 1 SEQUOIA Operations Manual for Users G.E. Granroth SEQUOIA Lead Instrument Scientist A.I. Kolesnikov SEQUOIA Instrument Scientist L.M. DeBeer-Schmitt SEQUOIA Scientific Associate T.E. Sherline Sample Environment Scientist Revised - May 13, 2013 SNS-NSSD-TOF-TD-0002 - R00 2 Abstract The SEQUOIA Operations Manual for Users presents a description of the SEQUOIA spectrometer located at beamline 17 (BL17) of the Spallation Neutron Source (SNS). It is the intent of this manual to inform the user regarding the SEQUOIA spectrometer and available sample environment, to run experiments, to access and analyze the collected data, and to provide the user with other potentially useful information. The first section serves to describe the components of which the instrument is comprised.

282

VOLTTRON: User Guide  

SciTech Connect (OSTI)

This document is a user guide for the deployment of the Transactional Network platform and agent/application development within the VOLTTRON. The intent of this user guide is to provide a description of the functionality of the Transactional Network Platform. This document describes how to deploy the platform, including installation, use, guidance, and limitations. It also describes how additional features can be added to enhance its current functionality.

Lutes, Robert G.; Katipamula, Srinivas; Akyol, Bora A.; Tenney, Nathan D.; Haack, Jereme N.; Monson, Kyle E.; Carpenter, Brandon J.

2014-04-24T23:59:59.000Z

283

T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

94: IBM solidDB Password Hash Authentication Bypass 94: IBM solidDB Password Hash Authentication Bypass Vulnerability T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability April 4, 2011 - 6:08am Addthis PROBLEM: A vulnerability has been reported in IBM solidDB, which can be exploited by malicious people to bypass certain security restrictions. PLATFORM: IBM solidDB 4.x - IBM solidDB 6.x ABSTRACT: This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability. REFERENCE LINKS: IBM Security Alert Secunia Advisory: SA44030 ZDI Advisory: ZDI-11-115 IBM solidDB Support IMPACT ASSESSMENT: Medium Discussion: The specific flaw exists within the solid.exe process which listens by default on TCP ports 1315, 1964 and 2315. The authentication protocol

284

U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code | Department  

Broader source: Energy.gov (indexed) [DOE]

6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code 6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code November 15, 2011 - 8:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Obtain Information and Let Local Users Bypass Authentication. PLATFORM: iOS 3.0 through 5.0 for iPhone 3GS iPhone 4 and iPhone 4S iOS 3.1 through 5.0 for iPod touch (3rd generation) and later iOS 3.2 through 5.0 for iPad, iOS 4.3 through 5.0 for iPad 2 ABSTRACT: A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system. reference LINKS: Apple Security Article: HT5052 Apple Product Security SecurityTracker Alert ID: 1026311 IMPACT ASSESSMENT:

285

T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

5: Cisco AnyConnect Secure Mobility Client Lets Remote Users 5: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges June 2, 2011 - 4:38pm Addthis PROBLEM: The Cisco AnyConnect Secure Mobility Client is the Cisco next-generation VPN client, which provides remote users with secure IPsec (IKEv2) or SSL Virtual Private Network (VPN) connections to Cisco 5500 Series Adaptive Security Appliances (ASA) and devices that are running Cisco IOS Software. PLATFORM: Cisco AnyConnect Secure Mobility Client Platform & Affected Versions ABSTRACT: Cisco AnyConnect Secure Mobility Client contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a

286

LANSCE | Lujan Center | Industrial Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Industrial Users The Lujan Neutron Scattering Center offers a diverse set of capabilities and instruments for industrial projects. Industrial users are invited to contact the Lujan...

287

Fermilab | Users' Executive Committee | Home  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Users' Office Fermilab Student and Post Doc Association (FSPA) Fermi Research Alliance LLC (FRA) P5 Report HEPAP APS National User Facility Organization (NUFO) Library of...

288

User Charter Rights and Responsibilities of Neutron Sciences Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

-G01182/gim -G01182/gim User Charter Rights and Responsibilities of Neutron Sciences Users Rights of Users: * Be treated with respect and courtesy. * Have details of experiment proposals kept confidential. * Have consultations with instrument staff before proposal submission, during experiment planning, and while evaluating results and analyzing data. * Receive beam time on the basis of external peer evaluation of submitted proposals. Users can

289

Experimental Determination of the Gain Distribution of an Avalanche Photodiode at Low Gains  

E-Print Network [OSTI]

A measurement system for determining the gain distributions of avalanche photodiodes (APDs) in a low gain range is presented. The system is based on an ultralow-noise charge--sensitive amplifier and detects the output carriers from an APD. The noise of the charge--sensitive amplifier is as low as 4.2 electrons at a sampling rate of 200 Hz. The gain distribution of a commercial Si APD with low average gains are presented, demonstrating the McIntyre theory in the low gain range.

Kenji Tsujino; Makoto Akiba; Masahide Sasaki

2008-12-04T23:59:59.000Z

290

T-591: VMware vmrun Utility Lets Local Users Gain Elevated Privileges...  

Broader source: Energy.gov (indexed) [DOE]

on the target system. PLATFORM: VMware Workstation 6.5.5 and 7.1.3 and prior; VIX API for Linux 1.10.2 and prior ABSTRACT: The VMware vmrun utility is susceptible to a local...

291

U-092: Sudo Format String Bug Lets Local Users Gain Elevated...  

Broader source: Energy.gov (indexed) [DOE]

Sudo version 1.8.3p1 may be updated to version 1.8.3p2 via the file sudo-1.8.3p2.patch.gz. For sudo versions 1.8.0-1.8.3, the patch to sudo.c in sudo-1.8.3p2.patch.gz will...

292

V-199: Solaris Bugs Let Local Users Gain Root Privileges, Remote...  

Broader source: Energy.gov (indexed) [DOE]

reported in Solaris REFERENCE LINKS: SecurityTracker Alert ID: 1028802 Oracle Critical Patch Update Advisory - July 2013 CVE-2013-3745 CVE-2013-3746 CVE-2013-3748 CVE-2013-3750...

293

T-671: Red Hat system-config-firewall Lets Local Users Gain Root...  

Office of Environmental Management (EM)

are advised to upgrade to these updated packages, which contain a backported patch to resolve this issue. Running instances of system-config-firewall must be restarted...

294

Students gain work experience at WIPP  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Students Gain Work Experience at WIPP Students Gain Work Experience at WIPP CARLSBAD, N.M., January 10, 2000 -- Students from two Eddy County high schools are gaining valuable experience by spending time with employees of the Westinghouse Waste Isolation Division and Day & Zimmermann, LLC at the Waste Isolation Pilot Plant (WIPP). Six students from Carlsbad High School and four students from Loving High School are participating in the 1999-2000 WIPP Shadow Program. A "shadow" is a student who teams up with an employee to gain hands-on experience in the workplace. This activity helps the students identify career options and develop confidence. Each student spends three days during the school year with a volunteer mentor at the work location. "This program offers our employees the opportunity to share their knowledge and

295

User_RunReports  

Broader source: Energy.gov (indexed) [DOE]

Running Standard Reports Running Standard Reports © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Running Standard Reports Purpose The purpose of this job aid is to guide users through the step-by-step process of running standard reports in SuccessFactors Learning. Task A. Run Standard Report From the Home page, click the Reports easy link. In the Report Name table, locate the report you want to generate. Click the expand icon ( ) to expand the report group. Click the title link. For this example, select the User Curriculum Status Group by Item Details report. Note: Click Help ( ) for additional information on reports. 1 1 2 2 3 3 Run Standard Report 13 Steps Task A SuccessFactors Learning v 6.4 User Job Aid

296

General User Proposal Scores  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

General User Proposal Scores General User Proposal Scores General User Proposal Scores Print Tuesday, 01 June 2010 10:34 Scoring Proposals are scored on a scale of 1 to 5, with 1 being the best score and 5 the worst. Reviewers are requested to use the following ranking schema: Must do High Priority Medium Priority Low priority Don't do Beam time is assigned based on each proposal's score in relation to all other proposals for a given beamline. For beamlines where beamtime requests exceed available beamtime, a cutoff score is assigned after which no beam time is allocated. proposal scores Beam Time Cutoff Scores for the Current Cycle The table below lists the percent of beam time shifts allocated/requested for each beamline, and the cutoff scores, below which no beam time was assigned.

297

User Electrical Inspection Criteria  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Electronic and Electrical Equipment Inspection Criteria User Electronic and Electrical Equipment Inspection Criteria Any electrical or electronic equipment users bring to the APS will have to be inspected. In some cases, this inspection will be quite simple, e.g., if the equipment has already been inspected by a Nationally Recognized Testing Laboratory (NRTL) and is used for its designed purpose. Other equipment will require a more thorough inspection (this may include NRTL inspected equipment if it is assembled into an apparatus with other components). The inspection is based on an eight-part list of criteria. Paraphrased, those criteria are: The equipment must be suitable for its intended use (and if appropriate, installation). For example, a heater controller intended to control a 1000W heater cannot be used to control a 2000W heater. The

298

Science Accelerator : User Login  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Login Login The Science Accelerator ALERTS feature will automatically update you regarding newly available information in your specific area(s) of interest. Simply register for the service, then create a search strategy which will be run against information added to . Select a schedule (weekly, monthly, etc.) for receiving the email Alerts. If you are a new patron, Register to learn how to set up Alerts to meet your needs. If you are an existing patron, enter your user name and password in the boxes to login. Once logged in, you may review or modify your search, add a new search and see recent Alerts results. User Name: Password: Remember Me Remember me on this computer. Login Don't have a user name? Register! Forgot your password? Reset your password Alerts The Alerts function allows you to monitor a topic and receive timely

299

Fermilab Users' Meeting, 2007  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

6-7, 2007 6-7, 2007 The annual gathering of the Fermilab Users Organization will be held on June 6-7, 2007. This meeting is an opportunity for discussion of new physics results from the laboratory's experimental program, future initiatives at the lab, and thoughtful presentations from leaders of the scientific policy community. Topics to be covered at the Users Meeting include: Collider Physics Astro-particle Physics Neutrino Physics Future Plans This year, both an Outreach Workshop and a Grad Students' Meeting / Career Night (sponsored by the GSA) will be held in association with the Users Meeting on June 5. Watch this page for links to more information on those associated meetings as they become available. Registration Reserve Tickets (for the public lecture by Dr. George Smoot)

300

User Science Images  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Science Images User Science Images User Science Images Sort by: Default | Name | Date (low-high) | Date (high-low) | Category NIMROD-1.png FES: NIMROD Simulation February 18, 2010 | Author(s): Dr. Charlson C. Kim (University of Washington) | Category: Fusion Energy | URL: https://nimrodteam.org/ Download Image: NIMROD-1.png | png | 1.5 MB Trajectory of an energetic ion in a Field Reverse Configuration (FRC) magnetic field. Magnetic separatrix denoted by green surface. Spheres are colored by azimuthal velocity. Image courtesy of Charlson Kim, University of Washington; NERSC repos m487, mp21, m1552 Scheibe.png BER: Pore-Scale Fluid Flow for Subsurface Reactive Transport January 1, 2008 | Author(s): Timothy D. Scheibe, PNNL | Category: Environmental Science | URL: http://http://subsurface.pnl.gov/

Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

SOAJ Search : User Login  

Office of Scientific and Technical Information (OSTI)

Login Login The SOAJ Search ALERTS feature will automatically update you regarding newly available information in your specific area(s) of interest. Simply register for the service, then create a search strategy which will be run against information added to . Select a schedule (weekly, monthly, etc.) for receiving the email Alerts. If you are a new patron, Register to learn how to set up Alerts to meet your needs. If you are an existing patron, enter your user name and password in the boxes to login. Once logged in, you may review or modify your search, add a new search and see recent Alerts results. User Name: Password: Remember Me Remember me on this computer. Login Don't have a user name? Register! Forgot your password? Reset your password Alerts The Alerts function allows you to monitor a topic and receive timely

302

APS User News, Issue 73  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

3, September 15, 2011 3, September 15, 2011 CONTENTS DIRECTOR'S CORNER USER MATTERS -- Tweet Time! APS Beamlines Now Tweet Operational Status Info -- Changes to User Electrical Safety Training Requirements -- Groundbreaking for the New Advanced Protein Crystallization Facility -- Meg Vigliocco-Hagen, APS General User Program Administrator, Retires! -- Meet Beverly Knott, New APS Beam Time Access Administrator -- Safety Snippets: Practice Good Housekeeping BRIEFLY NOTED -- 4th Annual Postdoctoral Research Symposium: Registration Deadline September 21 -- 2011 Advanced Light Source Users' Meeting, October 3-5, 2011 -- 2011 SSRL/LCLS Annual Users' Meeting & Workshops, October 22-26, 2011 -- General Users Proposals Now Being Accepted -- Changes to User Training Course Requirements

303

2002 NERSC User Survey Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2 User Survey Results 2 User Survey Results Show All | 1 2 3 4 5 ... 11 | Next » 2002 User Survey Results Table of Contents Response Summary User Information Overall Satisfaction and Importance All Satisfaction Questions and Changes from Previous Years Visualization and Grid Computing Web, NIM, and Communications Hardware Resources Software Training User Services Comments about NERSC Response Summary Many thanks to the 300 users who responded to this year's User Survey -- this represents the highest response level in the five years we have conducted the survey. The respondents represent all five DOE Science Offices and a variety of home institutions: see User Information. You can see the FY 2002 User Survey text, in which users rated us on a 7-point satisfaction scale. Some areas were also rated on a 3-point

304

INSTRUCTIONS FOR USING HSPD-12 AUTHENTICATED OUTLOOK WEB ACCESS (OWA)  

Broader source: Energy.gov (indexed) [DOE]

7/2013 Page 1 7/2013 Page 1 INSTRUCTIONS FOR USING HSPD-12 AUTHENTICATED OUTLOOK WEB ACCESS (OWA) Outlook Web Access provides access to unencrypted email only and is suitable for use from any computer. HSPD-12 OWA REQUIREMENTS:  An EITS provided Exchange email account  A DOE issued HSPD-12 badge  DOEnet or Internet access and a supported web browser  A smart card reader installed* on your computer (*Windows Vista, Windows XP, MAC OS X 10.7 & 10.8, will also require smart card software to be installed in order to read the HSPD-12 badge) HSPD-12 OWA LOGIN PROCEDURE: 1. Insert HSPD-12 badge into card reader

305

Method and system for edge cladding of laser gain media  

DOE Patents [OSTI]

A gain medium operable to amplify light at a gain wavelength and having reduced transverse ASE includes an input surface and an output surface opposing the input surface. The gain medium also includes a central region including gain material and extending between the input surface and the output surface along a longitudinal optical axis of the gain medium. The gain medium further includes an edge cladding region surrounding the central region and extending between the input surface and the output surface along the longitudinal optical axis of the gain medium. The edge cladding region includes the gain material and a dopant operable to absorb light at the gain wavelength.

Bayramian, Andrew James; Caird, John Allyn; Schaffers, Kathleen Irene

2014-03-25T23:59:59.000Z

306

A Reduction for Automated Veri cation of Authentication Scott D. Stoller  

E-Print Network [OSTI]

A Reduction for Automated Veri cation of Authentication Protocols Scott D. Stoller Computer Science of those case studies were not rigorously justi ed. Reduction theorems are needed, which show

Stoller, Scott

307

Integrating an Efficient Authorization Protocol with Trigon-Based Authentication Mechanism for Improving Grid Security  

Science Journals Connector (OSTI)

Security is a vital part of an integrated grid application in which heterogeneous services and resources ... dynamically. Authentication and authorization are the major security concerns in grid environment. Most...

V. Ruckmani; G. Sudha Sadasivam

2010-01-01T23:59:59.000Z

308

Determination of 5-hydroxymethylfurfural after Winkler and by the HPLC method for authentication of honey  

Science Journals Connector (OSTI)

The quality and authenticity of commercially available honey from Slovak market and the development of HPLC method for determination of hydroxymethylfurfural (HMF) content of honey with fine separation efficie...

K. Kukurova; J. Karovi?ov; G. Greif; Z. Kohajdov; J. Lehkoivov

2006-06-01T23:59:59.000Z

309

Subverting value hierarchies : essays on the causes and responses to shifts in demand for authenticity  

E-Print Network [OSTI]

This dissertation includes three essays on the causes and responses to shifts in demand for authenticity. In the first chapter, I answer the question: why do previously cast-off products, practices, or styles abruptly ...

Hahl, Oliver (Oliver Douglas)

2013-01-01T23:59:59.000Z

310

GainSpan Corporation | Open Energy Information  

Open Energy Info (EERE)

GainSpan Corporation GainSpan Corporation Jump to: navigation, search Name GainSpan Corporation Address 121 Albright Way Place Los Gatos, California Zip 95032 Sector Efficiency Product Designs wireless sensor networks for a variety of applications including smart grid Website http://www.gainspan.com/ Coordinates 37.256998°, -121.964456° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":37.256998,"lon":-121.964456,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

311

Gaining creative control over semiconductor nanowires  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Gaining creative control over semiconductor nanowires Gaining creative control over semiconductor nanowires Gaining creative control over semiconductor nanowires Using a microfluidic reactor, Los Alamos researchers transformed the SLS process into a flow-based technique. September 26, 2013 Growth of nanowire precursors in a flowing carrier solvent Growth of nanowire precursors in a flowing carrier solvent The new "flow" solution-liquid-solid method allows scientists to slow down growth and thereby capture mechanistic details as the nanowires grow in solution. A Los Alamos research team has transformed the synthesis process of semiconductor nanowires for use in solar cells, batteries, electronics, sensors and photonics using a solution-liquid-solid (SLS) batch approach to achieve unprecedented control over growth rates, nanowire size and internal

312

Gaines Cavern Wind Project | Open Energy Information  

Open Energy Info (EERE)

Cavern Wind Project Cavern Wind Project Jump to: navigation, search Name Gaines Cavern Wind Project Facility Gaines Cavern Wind Project Sector Wind energy Facility Type Commercial Scale Wind Facility Status In Service Owner General Compression Developer Texas Dispatchable Wind 1 LLC Location Gaines County TX Coordinates 32.688556°, -103.062464° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":32.688556,"lon":-103.062464,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

313

Small Business Customized Excerpts from the Users Guide  

Office of Energy Efficiency and Renewable Energy (EERE)

Small Business Customized Excerpts from the Users Guide, to assist in the process for applying to the Small Business Innovation Research (SBIR) program of the U.S. Department of Energy.

314

NERSC User Group Meeting  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

NERSC User Group Meeting NERSC User Group Meeting Oct 18, 2010 Outline * About OpenMP * Parallel Regions * Worksharing Constructs * Synchronization * Data Scope * Tasks * Using OpenMP at NERSC 2 3 Common Architectures * Shared Memory Architecture - Multiple CPUs share global memory, could have local cache - Uniform Memory Access (UMA) - Typical Shared Memory Programming Model: OpenMP, Pthreads, ... * Distributed Memory Architecture - Each CPU has own memory - Non-Uniform Memory Access (NUMA) - Typical Message Passing Programming Model: MPI, ... * Hybrid Architecture - UMA within one SMP node - NUMA across nodes - Typical Hybrid Programming Model: mixed MPI/OpenMP, ... What is OpenMP * OpenMP is an industry standard API of C/C++ and Fortran for shared memory parallel programming.

315

User_Sup_Registration  

Broader source: Energy.gov (indexed) [DOE]

Registration (Supervisor) Registration (Supervisor) © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Registration (Supervisor) Purpose The purpose of this job aid is to guide supervisor users through the step-by-step process of managing the registration of employees into scheduled offerings within SuccessFactors Learning. Task A. Register Employees in a Scheduled Offering From the Home page, click the My Employees tab. Click the Register/Withdraw Employees Supervisor Link. View Employee's Registrations 3 Steps Task C Withdraw Employees from a Scheduled Offering - 14 Steps Task B Register Employees in a Scheduled Offering - 17 Steps Task A 1 1 2 2 SuccessFactors Learning v 6.4 User Job Aid Registration (Supervisor)

316

NERSC Users Group  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

NUGEX NUGEX NUG Executive Committee (NUGEX) NUGEX is the voice of the user community to NERSC and DOE. While all NUG events are open to all NERSC users, NUGEX members regularly participate in the monthly teleconfernces and the annual face-to-face meeting. NUGEX is consulted on many NERSC policy issues, e.g., batch configurations, disk quotas, services and training offerings. Members of NUGEX also participate in their office's NERSC Requirements Reviews of High Performance Computing and Storage. There are three representatives from each office and three members-at-large. Name Institution Email Address DOE Office Term Expires PI's Project Title Mark Adams Columbia University mark.adams@columbia.edu ASCR Dec 2015 Composable Hierarchically Nested Solvers Anubhav Jain Berkeley Lab

317

NERSC User Environment  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Environment Environment NERSC User Environment Home Directories, Shells and Startup Files All NERSC systems (except PDSF) use global home directories, which are are pre-populated with startup files (also known as dot files) for all available shells. NERSC fully supports bash, csh, and tcsh as login shells. Other shells (ksh, sh, and zsh) are also available. The default shell at NERSC is csh. Changing Your Default Login Shell Use the NERSC Information management (NIM) portal if you want to to change your default login shell. To do this, select Change Shell from the NIM Actions pull-down menu. Managing Your Startup Files The "standard" dot-files are symbolic links to read-only files that NERSC controls. For each standard dot-file, there is a user-writable ".ext" file.

318

User Facility Science Highlights  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

user-facilities/highlights/ The Office of Science user-facilities/highlights/ The Office of Science is the single largest supporter of basic research in the physical sciences in the United States, providing more than 40 percent of total funding for this vital area of national importance. It oversees - and is the principal federal funding agency of - the Nation's research programs in high-energy physics, nuclear physics, and fusion energy sciences. en {611EDD39-818D-4CBA-BFD7-9568495C1566}http://science.energy.gov/bes/highlights/2013/bes-2013-09-a/ The Role of Stripes in Superconducting Behavior Using neutron diffraction, movement of charged atoms arranged as "stripes"

319

User_Sup_Overview  

Broader source: Energy.gov (indexed) [DOE]

Employees (Supervisors) Employees (Supervisors) © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Managing Employees (Supervisors) Purpose The purpose of this job aid is to guide supervisor users through the step-by-step process of managing employees within SuccessFactors Learning. Task A. Open and View a Employee's Record From the Home page, select the My Employees tab. 1 1 Run Reports 5 Steps Task C Approve or Deny Training Requests 9 Steps Task B Open and View an Employee's Record 5 Steps Task A SuccessFactors Learning v 6.4 User Job Aid Managing Employees (Supervisors) © 2011 SuccessFactors, Inc. - 2 - SuccessFactors Learning Confidential. All rights reserved. The My Employees section is designed to

320

User_LaunchSurvey  

Broader source: Energy.gov (indexed) [DOE]

and Completing Assigned Survey and Completing Assigned Survey © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Launching and Completing Assigned Survey Purpose The purpose of this job aid is to guide users through the step-by-step process of launching and completing assigned surveys. Task A. Launch and Complete Assigned Survey From the Home page, filter the To-Do List to show only Surveys. Hover over the course evaluation title. Click Open. 1 2 3 3 2 1 Launch and Complete Assigned Survey 6 Steps Task A SuccessFactors Learning v 6.4 User Job Aid Launching and Completing Assigned Survey © 2011 SuccessFactors, Inc. - 2 - SuccessFactors Learning Complete the survey by selecting the radio button for the appropriate rating

Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

User_LaunchOnline  

Broader source: Energy.gov (indexed) [DOE]

Online Content Online Content © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Launching Online Content Purpose The purpose of this job aid is to guide users through the step-by-step process of identifying and launching online content. Task A. Identify Online Content From the Home page, filter the To-Do List to show Online Courses only. The online icon ( ) in the Type column indicates the content type. 2 1 Launch Online Content 5 Steps Task B Identify Online Content 2 Steps Task A 1 2 SuccessFactors Learning v 6.4 User Job Aid Launching Online Content Task B. Launch Online Content From the To-Do List, hover over the title of the item you wish to launch and then click Go to Content.

322

Graphene as Gain Medium for Broadband Lasers  

E-Print Network [OSTI]

In contrast to conventional structures, efficient non-radiative carrier recombination counteracts the appearance of optical gain in graphene. Based on a microscopic and fully quantum-mechanical study of the coupled carrier, phonon, and photon dynamics in graphene, we present a strategy to obtain a long-lived gain: Integrating graphene into a photonic crystal nanocavity and applying a high-dielectric substrate gives rise to pronounced coherent light emission suggesting the design of graphene-based laser devices covering a broad spectral range.

Jago, Roland; Knorr, Andreas; Malic, Ermin

2014-01-01T23:59:59.000Z

323

Superradiance and collective gain in multimode optomechanics  

E-Print Network [OSTI]

We present a description of a strongly driven multimode optomechanical system that shows the emergence of cooperative effects usually known from systems of atom-light interaction. Our calculations show that under application of a coherent pump field the system's response can be switched from a superradiant regime to a collective gain regime by varying the frequency detuning of the pump. In the superradiant regime, enhanced optical cooling of a single vibrational mode is possible, whereas the collective gain regime would potentially enable one to achieve almost thresholdless phonon laser action. The threshold pumping power scales as 1/N.

T. Kipf; G. S. Agarwal

2014-09-25T23:59:59.000Z

324

U-044: HP Operations Agent and Performance Agent Lets Local Users Access a  

Broader source: Energy.gov (indexed) [DOE]

44: HP Operations Agent and Performance Agent Lets Local Users 44: HP Operations Agent and Performance Agent Lets Local Users Access a Restricted Directory U-044: HP Operations Agent and Performance Agent Lets Local Users Access a Restricted Directory November 23, 2011 - 8:00am Addthis PROBLEM: HP Operations Agent and Performance Agent Lets Local Users Access a Restricted Directory. PLATFORM: HP Operations Agent v11.00 and Performance Agent v4.73, v5.0 for AIX, HP-UX, Linux, and Solaris ABSTRACT: A local user can access a directory on the target system. reference LINKS: HP Security Bulletin Document ID: c03091656 CVE-2011-4160 SecurityTracker Alert ID: 1026345 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP Operations Agent and Performance Agent. A local user can access data on the target system. A local user can gain

325

ORPS User Registration Form  

Broader source: Energy.gov (indexed) [DOE]

DEPARTMENT OF ENERGY DEPARTMENT OF ENERGY OPERATIONAL EVENT INFORMATION SYSTEMS REGISTRATION FORM User Registration For: ORPS SUBMIT TO: U.S. DOE: PHONE: 800-473-4375 HSS InfoCenter, HS-1.22, 270CC FAX: 301-903-9823 1000 Independence Ave., SW Washington, DC 20585-0270 (Type or Print) 1. Name__________________________________________________________________________Birth date_______/_______ (Last) (First) (Middle Initial) (Month) (Day) 2.JobTitle_______________________________________________________________________________________________ 3. Company Name________________________________________________________________________________________ 4. Address________________________________________________ Mail Stop______________________________________

326

T-692: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated  

Broader source: Energy.gov (indexed) [DOE]

2: VMware vFabric tc Server Lets Remote Users Login Using 2: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated Passwords T-692: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated Passwords August 12, 2011 - 3:47pm Addthis PROBLEM: A vulnerability was reported in VMware vFabric tc Server. A remote user can login using an obfuscated version of their password. PLATFORM: Version(s): vFabric tc Server 2.0.0.RELEASE to 2.0.5.SR01, 2.1.0.RELEASE to 2.1.1.SR01 ABSTRACT: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated Passwords. reference LINKS: SecurityTracker Alert ID: 1025923 VMware VFabric Download CVE-2011-0527 IMPACT ASSESSMENT: Medium Discussion: If the system stores passwords used for JMX authentication in an obfuscated form, a remote user can use the password in obfuscated form (or in plain

327

U-024: IBM Lotus Sametime Configuration Servlet Lets Remote Users Obtain  

Broader source: Energy.gov (indexed) [DOE]

024: IBM Lotus Sametime Configuration Servlet Lets Remote Users 024: IBM Lotus Sametime Configuration Servlet Lets Remote Users Obtain Configuration Data U-024: IBM Lotus Sametime Configuration Servlet Lets Remote Users Obtain Configuration Data November 1, 2011 - 8:15am Addthis PROBLEM: IBM Lotus Sametime Configuration Servlet Lets Remote Users Obtain Configuration Data. PLATFORM: All Sametime Platforms : 7.0, 7.5, 7.5.1, 7.5.1.1, 7.5.1.2, 8.0, 8.0.1, 8.0.2, 8.5, 8.5.1, 8.5.1.1, 8.5.2 ABSTRACT: A remote user can obtain configuration information. reference lINKS: IBM Sametime Security Bulletin SecurityTracker Alert ID: 1026255 CVE-2011-1370 IMPACT ASSESSMENT: Medium Discussion: The Sametime server contains a configuration servlet that is accessed by several Sametime server processes. By default, this servlet does not require authentication, which could potentially allow an unauthorized user

328

Biomass Feedstock National User Facility  

Broader source: Energy.gov [DOE]

Breakout Session 1BIntegration of Supply Chains I: Breaking Down Barriers Biomass Feedstock National User Facility Kevin L. Kenney, Director, Biomass Feedstock National User Facility, Idaho National Laboratory

329

MagLab - User Awards  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Users Hub Arrow User Awards Scientists who do research at the MagLab are often honored for their excellent work. Christopher Reddy 2014 C.C. Patterson Award (December 2013) Chris...

330

U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

29: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote 29: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access November 8, 2011 - 8:00am Addthis PROBLEM: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access. PLATFORM: HP TCP/IP Services for OpenVMS v5.6 and v5.7 on iTanium and ALPHA Servers. ABSTRACT: A remote user can gain unauthorized access reference LINKS: HP Support document ID: c01908983 SecurityTracker Alert ID: 1026279 CVE-2011-3168 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in TCP/IP Services for OpenVMS. A remote user can gain unauthorized access. On systems running POP or IMAP servers, a remote user can gain unauthorized access.

331

Gain International Work Experience in China  

E-Print Network [OSTI]

Gain International Work Experience in China www.StudyCLI.org "The CLI internship gave me a huge boost both personally and professionally. At 21 years old, I've lived in China and can speak basic city of Guilin, China. CLIinternsengageinadynamicrangeofprojects: Y Establishnewrelationshipswith

Virginia Tech

332

Energy: efficiency gains alone won't  

E-Print Network [OSTI]

). DonaldE.HirschPOBox196,West BoothbayHarbor,Maine04575,USA e-mail:dehirsch1924@yahoo.com Big data: open complicated. Handling and analysing big data sets is becoming more and more challenging. WikiEnergy: efficiency gains alone won't reduce emissions SIR -- Your News Feature `Electricity without

Cai, Long

333

U-030: Apache Tomcat Lets Untrusted Web Applications Gain Elevated...  

Broader source: Energy.gov (indexed) [DOE]

0: Apache Tomcat Lets Untrusted Web Applications Gain Elevated Privileges U-030: Apache Tomcat Lets Untrusted Web Applications Gain Elevated Privileges November 9, 2011 - 8:30am...

334

A user interface management system  

Science Journals Connector (OSTI)

The design and construction of the user interface to interactive systems is receiving increased attention. This paper describes a user interface management system that allows a designer/developer to focus on the logical functionality of an application ... Keywords: User interface management

David J. Kasik

1982-07-01T23:59:59.000Z

335

Prism users guide.  

SciTech Connect (OSTI)

Prism is a ParaView plugin that simultaneously displays simulation data and material model data. This document describes its capabilities and how to use them. A demonstration of Prism is given in the first section. The second section contains more detailed notes on less obvious behavior. The third and fourth sections are specifically for Alegra and CTH users. They tell how to generate the simulation data and SESAME files and how to handle aspects of Prism use particular to each of these codes.

Weirs, V. Gregory

2012-03-01T23:59:59.000Z

336

SSRL Users' Organization | Stanford Synchrotron Radiation Lightsource  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

concerned with representing the interests of the SSRL users (see Charter). Users elect members to serve on the Users' Executive Committee (UEC) to carry out the business of...

337

User_ApproveTrainingRequest  

Broader source: Energy.gov (indexed) [DOE]

Approving User Training Requests Approving User Training Requests © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Approving User Training Requests Purpose The purpose of this job aid is to guide users through the step-by-step process of approving a user training request. Task A. Approve a User Training Request From the Home Page, click the You have pending approval requests link in the Alerts box. The Pending Reviews and Approvals page displays and defaults open to the pending approval. Click the expand icon ( ) next to the user's name and/or click the Title link for additional information on the request. Select the Enter Reasons for Approvals or Denials checkbox to allow for comments. Select the Approve radio

338

EMSL User Executive Committe Meeting  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Executive User Executive Committee Meeting July 13, 2011 Recommendations Valerie Copie, UEC Chair User Meetings/Workshops EUC Comments & Recommendations: The UEC supports EMSL's focus on specific areas for User meetings and workshops rather than organizing a generalized User Meeting Focused meetings may provide opportunities for users to visit EMSL more often and to participate in team building as envisaged by the new vision of EMSL2.0 The UEC would like EMSL to have broad representations at these workshops to avoid having too many internal participants. The Pore-scale workshop may be a good model to follow for focused workshops While the UEC supports focused workshops, the entire user community should be welcome to attend them and informed about these activities

339

2001 NERSC User Survey Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

1 User Survey Results 1 User Survey Results Show All | 1 2 3 4 5 ... 11 | Next » 2001 User Survey Results Table of Contents Response Summary User Information Overall Satisfaction and Importance All Satisfaction Questions and Changes from Previous Years NERSC Information Management (NIM) System Web and Communications Hardware Resources Software Training User Services Comments about NERSC Response Summary NERSC extends its thanks to the 237 users who participated in this year's survey; this compares with 134 respondents last year. The respondents represent all five DOE Science Offices and a variety of home institutions: see User Information. Your responses provide feedback about every aspect of NERSC's operation, help us judge the quality of our services, give DOE information on how well

340

2006 NERSC User Survey Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

6 User Survey Results 6 User Survey Results Show All | 1 2 3 4 5 ... 15 | Next » 2006 User Survey Results Table of Contents Survey Results Users are invited to provide overall comments about NERSC: Here are the survey results: Respondent Demographics Overall Satisfaction and Importance All Satisfaction, Importance and Usefulness Ratings All Usefulness Topics Hardware Resources Software Visualization and Data Analysis HPC Consulting Services and Communications Web Interfaces Training Comments about NERSC Survey Results Many thanks to the 256 users who responded to this year's User Survey. This represents a response rate of about 13 percent of the active NERSC users. The respondents represent all six DOE Science Offices and a variety of home institutions: see Respondent Demographics. The survey responses provide feedback about every aspect of NERSC's

Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Photovoltaics information user study  

SciTech Connect (OSTI)

The results of a series of telephone interviews with groups of users of information on photovoltaics (PV) are described. These results, part of a larger study on many different solar technologies, identify types of information each group needed and the best ways to get information to each group. The report is 1 of 10 discussing study results. The overall study provides baseline data about information needs in the solar community. It covers these technological areas: photovoltaics, passive solar heating and cooling, active solar heating and cooling, biomass energy, solar thermal electric power, solar industrial and agricultural process heat, wind energy, ocean energy, and advanced energy storage. An earlier study identified the information user groups in the solar community and the priority (to accelerate solar energy commercialization) of getting information to each group. In the current study only high-priority groups were examined. Results from seven PV groups respondents are analyzed in this report: DOE-Funded Researchers, Non-DOE-Funded Researchers, Researchers Working for Manufacturers, Representatives of Other Manufacturers, Representatives of Utilities, Electric Power Engineers, and Educators.

Belew, W.W.; Wood, B.L.; Marie, T.L.; Reinhardt, C.L.

1980-10-01T23:59:59.000Z

342

Gaines, Michigan: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

Gaines, Michigan: Energy Resources Gaines, Michigan: Energy Resources Jump to: navigation, search Equivalent URI DBpedia Coordinates 42.8725303°, -83.9141254° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":42.8725303,"lon":-83.9141254,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

343

Information Gains from Cosmic Microwave Background Experiments  

E-Print Network [OSTI]

To shed light on the fundamental problems posed by Dark Energy and Dark Matter, a large number of experiments have been performed and combined to constrain cosmological models. We propose a novel way of quantifying the information gained by updates on the parameter constraints from a series of experiments which can either complement earlier measurements or replace them. For this purpose, we use the Kullback-Leibler divergence or relative entropy from information theory to measure differences in the posterior distributions in model parameter space from a pair of experiments. We apply this formalism to a historical series of Cosmic Microwave Background experiments ranging from Boomerang to WMAP, SPT, and Planck. Considering different combinations of these experiments, we thus estimate the information gain in units of bits and distinguish contributions from the reduction of statistical errors and the `surprise' corresponding to a significant shift of the parameters' central values. For this experiment series, we...

Seehars, Sebastian; Refregier, Alexandre; Paranjape, Aseem; Akeret, Jol

2014-01-01T23:59:59.000Z

344

Roof Coating Procedures and Their Productivity Gains  

E-Print Network [OSTI]

Roof Coating Procedures and their Productivity Gains John Bonaby and Dr. Diane Schaub, University of Florida As building envelope improvements are realized in organizations as ways to insulate businesses from high energy costs, the relative... benefit of the installation of different roof coating technologies and comparable application procedures of these technologies are ambiguous. The focal point of this research is to determine the effective correlation between various commercially...

Bonaby, J.; Schaub, D.

2006-01-01T23:59:59.000Z

345

Survey of Gain-Scheduling Analysis & Design WE.Leithead  

E-Print Network [OSTI]

ranging from aerospace to process control. Despite the wide application of gain-scheduling controllers of gain-scheduling controllers and a diverse academic literature relating to gain- scheduling extendingSurvey of Gain-Scheduling Analysis & Design D.J.Leith WE.Leithead Department of Electronic

Duffy, Ken

346

Automatic detection of users' skill levels using high-frequency user interface events  

Science Journals Connector (OSTI)

Computer users have different levels of system skills. Moreover, each user has different levels of skill across different applications and even in different portions of the same application. Additionally, users' skill levels change dynamically as users ... Keywords: Adaptive user interfaces, Expertise, GOMS, Graphical user interfaces, Intelligent user interfaces, Machine learning, Skill, User modeling

Arin Ghazarian; S. Majid Noorhosseini

2010-06-01T23:59:59.000Z

347

User' Software Manual  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

MM-Group Home MM-Group Home MMG Advisory Committees 4-ID-D Home Recent Publications Beamline Info Optics Instrumentation Software User Info FAQs 4-ID-D Beamline Software Manual Introduction Beamline 4-ID-D uses the EPICS platform for beamline control. This is a distributed client-server software where seperate server computers (IOCs) are used to control and monitor different portions of the beamline, and a separate client computer is used for data aquisition and display information. The client computer controls the other IOCs via the local ethernet network. The EPICS client "MEDM" is used for graphically displaying information about the beamline. The command line driven program SPEC is used for scanning adn other data acquisition fruncitons. More information on each of these is found below.

348

Fermilab Users' Executive Committee  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Outreach Subcommittee Outreach Subcommittee Purpose: Work with Fermilab and with external institutions to increase public awareness of the physics being done at Fermilab. Subcommittee Members 2012-2013 Name Organization Email Mandy Rominsky, Chair Fermilab rominsky AT fnal.gov Mary Anne Cummings Muons, Inc macc AT fnal.gov Daniel Kaplan Illinois Institute of Technology kaplan AT iit.edu Ryan Patterson California Institute of Technology rbpatter AT caltech.edu Breese Quinn University of Mississippi quinn AT phy.olemiss.edu Lee Roberts Boston University roberts AT bu.edu Nikos Varelas (ex-officio) University of Illinois at Chicago varelas AT uic.edu Fermilab User University Profiles Fermilab Outreach Fermilab Office of Communication Fermilab Guided Tours Ask a Scientist Program Physics for Everyone Lecture Series

349

users-guide  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Contents Contents Contents Contents ARGONNE NATIONAL LABORATORY 9700 South Cass Avenue Argonne, IL 60439 in ANL/MCS-TM-234 Users Guide for ROMIO: A High-Performance, Portable MPI-IO Implementation by Rajeev Thakur, Robert Ross, Ewing Lusk, William Gropp, Robert Latham Mathematics and Computer Science Division Technical Memorandum No. 234 Revised May 2004, November 2007, April 2010 This work was supported by the Mathematical, Information, and Computational Sciences Division subprogram of the Office of Advanced Scientific Computing Research, U.S. Department of Energy, under Contract W-31-109-Eng-38; and by the Scalable I/O Initiative, a multiagency project funded by the Defense Advanced Research Projects Agency (Contract DABT63-94-C-0049), the Department of Energy, the National Aeronautics and Space Administration,

350

End User Perspective - Industrial  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Solid State Research Center Solid State Research Center DOE Fuel Cell Portable Power Workshop End User Perspective - Industrial Consumer Electronics Power (< 20-50W) Department of Energy Fuel Cell Portable Power Workshop Jerry Hallmark Manager Energy Technologies Lab Motorola Labs Solid State Research Center DOE Fuel Cell Portable Power Workshop Outline * Energy & Power of Portable Devices * Fuel Cell Applications & Cost * Key Requirements & Challenges * Fuels for Portable Fuel Cells * Fuel Transportation Regulations and Standards * Methanol Fuel Cells - Direct Methanol Fuel Cells - Reformed Methanol Fuel Cells * Technical Challenges 2 Solid State Research Center DOE Fuel Cell Portable Power Workshop Portable Electronics Yearly Energy Usage  :KU 1990 1980  :KU

351

User_Self_Register  

Broader source: Energy.gov (indexed) [DOE]

Registering in a Scheduled Offering Registering in a Scheduled Offering © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Self-Registering in a Scheduled Offering Purpose The purpose of this job aid is to guide users through the step-by-step process of locating scheduled offerings and self-registering from the To-Do List, Calendar of Offerings, and the catalog. Each task below demonstrates a different method of registration. Task A. Register from the To-Do List From the Home page, filter the To-Do List to show All Learning. 1 1 Register from the Advanced Catalog Search - 10 Steps Task C Register from To-Do List 6 Steps Task A Register from the Calendar of Offerings 8 Steps Confirm Registration 3 Steps

352

Lujan Center User Guide  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

3 3 High-Pressure Preferred Orientation Neutron Diffractometer (HIPPO) HIPPO is the first third-generation neutron time- of-flight powder diffractometer constructed in the United States. It achieves very high neutron count rates by virtue of a short (9 m) initial flight path on a high-intensity water moderator and 1360 3 He detector tubes covering 4.8 m 2 of detector area from 10° - 150° in scattering angles. HIPPO was designed and manufactured as a joint effort between LANSCE and the University of California with the goal of doing world-class science by making neutron powder diffractometry an accessible tool to the national user community. D-spacing ranges from 0.12 - 4.80 Å (1.31 - 52.4 Å -1 ) to 1.2 - 47.5 Å (0.13 - 5.3 Å -1 ) are available to support studies of crystal orientation

353

Compensated gain control circuit for buck regulator command charge circuit  

DOE Patents [OSTI]

A buck regulator command charge circuit includes a compensated-gain control signal for compensating for changes in the component values in order to achieve optimal voltage regulation. The compensated-gain control circuit includes an automatic-gain control circuit for generating a variable-gain control signal. The automatic-gain control circuit is formed of a precision rectifier circuit, a filter network, an error amplifier, and an integrator circuit.

Barrett, David M. (Albuquerque, NM)

1996-01-01T23:59:59.000Z

354

Compensated gain control circuit for buck regulator command charge circuit  

DOE Patents [OSTI]

A buck regulator command charge circuit includes a compensated-gain control signal for compensating for changes in the component values in order to achieve optimal voltage regulation. The compensated-gain control circuit includes an automatic-gain control circuit for generating a variable-gain control signal. The automatic-gain control circuit is formed of a precision rectifier circuit, a filter network, an error amplifier, and an integrator circuit. 5 figs.

Barrett, D.M.

1996-11-05T23:59:59.000Z

355

National Library of Energy : User Account  

Office of Scientific and Technical Information (OSTI)

Reset your password Enter either your User Name or Email Address to reset your password. User Name: Email Address: Go...

356

POWGEN Users | ORNL Neutron Sciences  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Information User Information Announcement: POWGEN has started a new partnership with beam line 11A at the Advanced Photon Source where users can get x-ray data if they have an approved POWGEN proposal. Become a POWGEN User POWGEN Experiment Guide: A - Z POWGEN Mail In Program Guide Shipping Addresses for Samples For more detailed information, please visit the ORNL User Facilities Sample Handling and Shipping page. Non-activated samples coming to SNS: Attention: Special requirements (like refrigeration) To: Neutron Sciences User Sample IPTS # XXXX Oak Ridge National Laboratory / SNS Site Chestnut Ridge, Bldg 8920 Oak Ridge, TN 37830 Activated samples (these will also be brought to SNS but must go through check-in procedures at another on-site location): Attention: Special requirements (like refrigeration)

357

APS User News, Issue 76  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

6, February 21, 2012 6, February 21, 2012 CONTENTS DIRECTOR'S CORNER Special Announcement: George Srajer Appointed Project Director for the APS Upgrade and Deputy ALD USER MATTERS -- Registration Open for 2012 APS/CNM/EMC Users Meeting: Our User Science Shapes the Future! -- CALLING ALL VIDEO MAKERS! Submit Your Films for the "Usies Awards"! -- LCLS-II New Instruments Workshops March 19-22, 2012 -- NUFO Goes To Washington! -- Tax Presentation Available BRIEFLY NOTED -- Recognitions and Honors -- Users Meeting Satellite Workshop: "SAXS Software Packages Irena and Nika" -- New Web Page Offers Quick Help Links for Users -- New Mural Graces the Wall near Viewing Area -- General User Proposal Deadline for 2012-2 Run: March 9, 2012 =====================================================

358

1999 NERSC User Survey Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

9 User Survey Results 9 User Survey Results Show All | 1 2 3 4 5 ... 11 | Next » 1999 User Survey Results Table of Contents Respondent Summary Overall Satisfaction User Information Visualization Consulting and Account Support Information Technology and Communication Hardware Resources Software Training Comments about NERSC All Satisfaction Questions and FY 1998 to FY 1999 Changes Respondent Summary NERSC would like to thank all the users who participated in this year's survey. Your responses provide feedback about every aspect of NERSC's operation, help us judge the quality of our services, give DOE information on how well NERSC is doing, point us to areas we can improve, and show how we compare to similar facilities. This year 177 users responded to our survey, compared with 138 last year.

359

User Calendar | Advanced Photon Source  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

APS User Calendar Date Event November 19, 2013 Proposal Review Panel Meetings December 10, 2013 Beamtime Allocation Committee Meeting January 22, 2014 Joint APSUO Steering Committee and Partner User Council Meeting March 7, 2014 Proposal Deadline Run Cycle 2014-2 March 11-13, 2014 Scientific Advisory Committee Meeting May 12-15, 2014 APS/CNM/EMC Users Meeting May 13, 2014 Partner User Council Meeting May 14, 2014 APSUO Steering Committee Meeting July 9, 2014 Joint APSUO Steering Committee and Partner User Council Meeting July 11, 2014 Proposal Deadline Run Cycle 2014-3 September 17, 2014 Joint APSUO Steering Committee and Partner User Council Meeting November 4-6, 2014 Scientific Advisory Committee Meeting March 16-18, 2015 Scientific Advisory Committee Meeting

360

2000 NERSC User Survey Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

0 User Survey Results 0 User Survey Results Show All | 1 2 3 4 5 ... 10 | Next » 2000 User Survey Results Table of Contents Response Summary User Information Overall Satisfaction and Importance All Satisfaction Questions and FY 1999 to FY 2000 Changes Consulting and Account Support Web and Communications Hardware Resources Software Resources Training User Comments Response Summary NERSC extends its thanks to all the users who participated in this year's survey. Your responses provide feedback about every aspect of NERSC's operation, help us judge the quality of our services, give DOE information on how well NERSC is doing, and point us to areas we can improve. Every year we institute changes based on the survey; the FY 1999 survey resulted in the following changes: We created a long-running queue (12 hours maximum) for jobs using up

Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

User_Sup_AssignDelegate  

Broader source: Energy.gov (indexed) [DOE]

Delegates (Supervisor) Delegates (Supervisor) © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Assigning Delegates (Supervisor) Purpose The purpose of this job aid is to guide you through the step-by-step process of using the delegate feature within SuccessFactors Learning. A delegate is another user who you identify to act on the work that you need to complete in the user interface. When you identify a user as a delegate through the Delegates area in your Options and Settings screen, the system adds that user's name to the Delegators list. Typically, you identify a user as a delegate when you want the user to perform some of your tasks. You can use the Delegates area to add or edit the permissions for a delegate, which you might want to do, for example, if you plan to take an

362

2013 ALS User Meeting Highlights  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2013 ALS User Meeting Highlights 2013 ALS User Meeting Highlights 2013 ALS User Meeting Highlights Print This year's ALS User Meeting launched with a welcome from Users' Executive Committee Chair Corie Ralston and LBNL Director Paul Alivisatos. ALS Director Roger Falcone followed with a "state of the ALS" presentation that began with a reminder of the ALS mission, which he noted remains true even in the midst of a government shutdown: "Supporting users in doing outstanding science in a safe environment." Falcone gave the 414 meeting attendees an update on the ALS beamlines, which included good news about increased user numbers thanks to the new RAPIDD access system, enhanced robotics, and remote capabilities. Falcone reflected that ALS metrics continue to represent our highly productive users-the number of journal articles and papers per user that come from ALS research have continued to grow in the past year. Looking forward, Falcone touched on how a proposed ALS upgrade to a diffraction-limited light source would increase scientific capabilities.

363

2013 ALS User Meeting Highlights  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2013 ALS User Meeting Highlights 2013 ALS User Meeting Highlights 2013 ALS User Meeting Highlights Print Thursday, 24 October 2013 09:06 This year's ALS User Meeting launched with a welcome from Users' Executive Committee Chair Corie Ralston and LBNL Director Paul Alivisatos. ALS Director Roger Falcone followed with a "state of the ALS" presentation that began with a reminder of the ALS mission, which he noted remains true even in the midst of a government shutdown: "Supporting users in doing outstanding science in a safe environment." Falcone gave the 414 meeting attendees an update on the ALS beamlines, which included good news about increased user numbers thanks to the new RAPIDD access system, enhanced robotics, and remote capabilities. Falcone reflected that ALS metrics continue to represent our highly productive users-the number of journal articles and papers per user that come from ALS research have continued to grow in the past year. Looking forward, Falcone touched on how a proposed ALS upgrade to a diffraction-limited light source would increase scientific capabilities.

364

User Facility | Argonne National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Materials Center for Nanoscale Materials More Electron Microscopy Center More The Nanoscience and Technology Division hosts the following user facility: The Center for Nanoscale...

365

Library Terms That Users Understand  

E-Print Network [OSTI]

University of Newfoundland Libraries Test methods: user taskUsability of the Academic Library Web Site: ImplicationsDesign," College & Research Libraries (July Library Website

Kupersmith, John

2012-01-01T23:59:59.000Z

366

Fermilab | Users' Executive Committee | History  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Date Established: December 1967 Purpose: To conduct the business affairs of the Fermilab Users Organization between meetings of the general membership. Meeting Pattern: As...

367

Scatter secure code authentication for efficient reprogramming in wireless sensor networks  

Science Journals Connector (OSTI)

Currently proposed solutions to secure code dissemination in wireless sensor networks (WSNs) involve the use of expensive public-key digital signatures. In this work, we present Scatter, a secure code dissemination protocol that enables sensor nodes to authenticate the program image efficiently. To achieve this, we use a scheme that offers source authentication in the group setting like a public-key signature scheme, but with signature and verification times much closer to those of a MAC (message authentication code). In this way, Scatter avoids the use of elliptic curve cryptography and manages to surpass all previous attempts for secure code dissemination in terms of energy consumption, memory and time efficiency. Besides the design and theoretical analysis of the protocol, we also report the experimental evaluation of Scatter in two different hardware platforms, Mica2 and MicaZ, which proves its efficiency in practice.

Ioannis Krontiris; Tassos Dimitriou

2011-01-01T23:59:59.000Z

368

PAP: A privacy and authentication protocol for passive RFID tags Alex X. Liu *, LeRoy A. Bailey  

E-Print Network [OSTI]

people about consumer privacy protection and other security loopholes that make RFID tags an easy targetPAP: A privacy and authentication protocol for passive RFID tags Alex X. Liu *, LeRoy A. Bailey 2009 Accepted 20 March 2009 Available online 31 March 2009 Keywords: RFID Privacy Authentication

Liu, Alex X.

369

Running Jobs Scott French" NERSC User Services Group" New User...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Scott French" NERSC User Services Group" " New User Training" October 30, 2014 Jobs at NERSC * Most j obs a re p arallel, u sing 1 0s t o 1 00,000+ c ores * Produc8on r uns e...

370

UAL USER GUIDE.  

SciTech Connect (OSTI)

The Unified Accelerator Libraries (UAL) provide a modularized environment for applying diverse accelerator simulation codes. Development of UAL is strongly prejudiced toward1 importing existing codes rather than developing new ones. This guide provides instructions for using this environment. This includes instructions for acquiring and building the codes, then for launching and interpreting some of the examples included with the distribution. In some cases the examples are general enough to be applied to different accelerators by mimicking input files and input parameters. The intention is to provide just enough computer language discussion (C++ and Perl) to support the use and understanding of the examples and to help the reader gain a general understanding of the overall architecture. Otherwise the manual is ''documentation by example.'' Except for an appendix concerning maps, discussion of physics is limited to comments accompanying the numerous code examples. Importation of codes into UAL is an ongoing enterprise and when a code is said to have been Imported it does not necessarily mean that all features are supported. Other than this, the original documentation remains applicable (and is not duplicated here.)

MALITSKY,N.; TALMAN,R.

2003-01-09T23:59:59.000Z

371

Theory of laser-amplifier linear gain  

Science Journals Connector (OSTI)

The theory of small-signal laser amplification is developed for homogeneously broadened systems in which the three main decay rates, for the collective atomic dipole moment, the population inversion, and the field in the laser cavity, have arbitrary relative magnitudes. The calculations extend previous work on class-A and -B lasers, where the dipole decay rate greatly exceeds the other two rates, to class-C lasers, where the dipole decay rate is comparable to the others. The free-running laser is assumed to excite a single longitudinal mode of the cavity, whose frequency generally differs from that of the coupled atomic transition. The linear gains of the laser are derived for input signals whose frequencies are close to that of the lasing mode or to one of its adjacent nonlasing longitudinal modes. Divergences in the gain that occur for these two arrangements are associated with the previously studied single-mode and multimode instabilities of the free-running laser, respectively.

J. Jahanpanah and R. Loudon

1997-09-01T23:59:59.000Z

372

Determining window solar heat gain coefficient  

SciTech Connect (OSTI)

The solar heat gain characteristics of fenestration systems impact daytime building energy performance, occupant comfort and utility load demands. A measure of the fraction of available solar energy entering a building interior per unit window area is defined as the solar heat gain coefficient (SHGC). Together with a window's thermal transmittance (U-value), the SHGC is used to compare fenestration products, and it allows for the calculation of energy rating number and annual energy performance. The need to measure and compared advances in window technology has led to the development of experimental and analytical methods for the determination of SHGC performance. Several test facilities currently or previously capable of performing SHGC measurements exist worldwide. Results experimentally determined using these facilities have provided design data for handbook tables, and have been instrumental in the development and validation of predictive analytical methods and computer simulation tools. However, these facilities have operated without a standard test procedure for SHGC performance. Consequently, recent efforts have been focused on developing consensus test procedures for the evaluation of window energy performance.

Harrison, S.J.; Wonderen, S.J. van (Queen's Univ., Kingston, Ontario (Canada). Solar Calorimetry Lab.)

1994-08-01T23:59:59.000Z

373

Fermilab Users' Executive Committee  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2012-2013 UEC and GSA Members at October meeting 2012-2013 UEC and GSA Members at October meeting Current Members of the Fermilab Users Executive Committee 2012-2013 Name and Organization Term Email Nikos Varelas, Chair University of Illinois at Chicago 9/11 - 8/13 varelas AT uic.edu Mary Anne Cummings Muons, Inc. 9/12 - 8/14 macc AT fnal.gov Craig Group University of Virginia 9/12 - 8/14 group AT fnal.gov Sergo Jindariani Fermilab 9/11 - 8/13 sergo AT fnal.gov Daniel Kaplan Illinois Institute of Technology 9/11 - 8/13 kaplan AT iit.edu Ryan Patterson California Institute of Technology 9/11 - 8/13 rbpatter AT caltech.edu Greg Pawloski University of Minnesota 9/11 - 8/13 pawloski AT umn.edu Breese Quinn University of Mississippi 9/12 - 8/14 quinn AT phy.olemiss.edu Lee Roberts Boston University 9/12 - 8/14 roberts AT bu.edu Mandy Rominsky

374

NSLS Industrial User Program  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Jun Wang Physicist, Industrial Program Coordinator Phone: 344-2661 Email: junwang@bnl.gov Jun Wang is an Industrial Program Coordinator in the Photon Science Directorate at Brookhaven National Laboratory. She is working closely with industrial researchers as well as beamline staff to identify and explore new opportunities in industrial applications using synchrotron radiation. She has been leading the industrial research program including consultation, collaboration and outreach to the industrial user groups. Before joining BNL in 2008, Jun Wang was a Lead Scientist for a high-resolution high throughput powder diffraction program at the Advanced Photon Source (APS). As a Physicist at BNL, her research focuses on materials structure determination and evolution. Her expertise covers wide range x-ray techniques such as thin film x-ray diffraction and reflectivity, powder diffraction, small angle x-ray scattering, protein solution scattering and protein crystallography, as well as x-ray imaging. Currently she is the project leader of a multi-million dollar project on transmission x-ray microscopy recently funded by the U.S. DOE and the spokesperson for this new imaging beamline at the NSLS. She has also been collaborating with universities and industries for several projects on energy research at the NSLS.

375

Numerical control user experience  

SciTech Connect (OSTI)

AUTOCON is an acronym for Automatic Contouring, a program which generates a contour toolpath for the external profile of printed writing boards (PWB) using ICEM DDN. AUTOCON originates from the Computer Aided Process Planning (CAPP) Procedure developed by Electrical Manufacturing at Allied Bendix. The CAPP program uses electronically transmitted graphics files received from a design agency to generate automatic panel layouts and travellers for Process Engineers. The objective of AUTOCON is to utilize the information from the CAPP program to generate Numerical Control tapes. If the CAPP program can be utilized to its full potential, it is estimated that a good portion of the 60 to 90 PWB tapes shipped each month from our Numerical Control Department could be eliminated from conventional N/C Programming. The purpose of AUTOCON is to automatically generate a toolpath around the external profile of a PWB with no user intervention. The Process Engineer can generate a profile contour N/C tape after he has completed the panel layout and traveller through CAPPS for a part. After the layout and traveller illustrations have been completed, the same geometry can then be utilized again for the N/C tape. An N/C Analysist then reviews the listing for a final checkout of the job. 13 figs.

Butler, J.

1985-10-01T23:59:59.000Z

376

Register with the User Office  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Register with the User Office Print Register with the User Office Print The following registration process MUST be completed online by new and returning users at least TWO WEEKS prior to arrival at the ALS. Not a U.S. citizen? Please look at Documents for Foreign Nationals well ahead of your visit. Bring all relevant documents to the ALS in order to complete your registration. Step 1: Two Weeks Prior to Coming to the ALS New Users: complete and submit an ALS Participating Guest Registration Form - you will automatically receive a registration submission number when the form is submitted. Returning Users: complete and submit a returning user form - you will need your guest (badge) number, which can be found in the Lab Directory, under your name. Notify the ALS User Office of your arrival: This e-mail address is being protected from spambots. You need JavaScript enabled to view it the day and approximate time of your arrival and whether you will travel by car or shuttle bus to the ALS. Please include your registration submission number. The User Office will inform the main gate of your arrival and will prepare your paperwork so there will be no delay on arrival.

377

Register with the User Office  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Register with the User Office Print Register with the User Office Print The following registration process MUST be completed online by new and returning users at least TWO WEEKS prior to arrival at the ALS. Not a U.S. citizen? Please look at Documents for Foreign Nationals well ahead of your visit. Bring all relevant documents to the ALS in order to complete your registration. Step 1: Two Weeks Prior to Coming to the ALS New Users: complete and submit an ALS Participating Guest Registration Form - you will automatically receive a registration submission number when the form is submitted. Returning Users: complete and submit a returning user form - you will need your guest (badge) number, which can be found in the Lab Directory, under your name. Notify the ALS User Office of your arrival: This e-mail address is being protected from spambots. You need JavaScript enabled to view it the day and approximate time of your arrival and whether you will travel by car or shuttle bus to the ALS. Please include your registration submission number. The User Office will inform the main gate of your arrival and will prepare your paperwork so there will be no delay on arrival.

378

Register with the User Office  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Register with the User Office Print Register with the User Office Print The following registration process MUST be completed online by new and returning users at least TWO WEEKS prior to arrival at the ALS. Not a U.S. citizen? Please look at Documents for Foreign Nationals well ahead of your visit. Bring all relevant documents to the ALS in order to complete your registration. Step 1: Two Weeks Prior to Coming to the ALS New Users: complete and submit an ALS Participating Guest Registration Form - you will automatically receive a registration submission number when the form is submitted. Returning Users: complete and submit a returning user form - you will need your guest (badge) number, which can be found in the Lab Directory, under your name. Notify the ALS User Office of your arrival: This e-mail address is being protected from spambots. You need JavaScript enabled to view it the day and approximate time of your arrival and whether you will travel by car or shuttle bus to the ALS. Please include your registration submission number. The User Office will inform the main gate of your arrival and will prepare your paperwork so there will be no delay on arrival.

379

User experience with memory management  

SciTech Connect (OSTI)

Effects on computer users of the introduction of CMM at NOS1.3(485) at Sandia National Laboratories, Albuquerque are reported. Background information on the configuration, operating environment, users, and kinds of applications run on the different machines is given. Then some of the problems associated with CMM are described. Although they were overcome, they were more numerous than anticipated. (RWR)

Lane, G.L.

1980-01-01T23:59:59.000Z

380

Help:User page | Open Energy Information  

Open Energy Info (EERE)

A user page is a page about a wiki user; someone who registered on the A user page is a page about a wiki user; someone who registered on the wiki, and is (most probably) a contributor. If you have registered, you can create your own user page. Your user page is linked in the top right. More importantly, others will see links to your user page from various places which assist wiki collaboration. This includes the "Recent changes" and "page history" displays (See Help:Tracking changes). You can also link to your user page within text of a wiki page, which is mainly useful on talk pages when you sign your name. Contents 1 What to put on your user page 1.1 User scratchpad / development area 2 Other people's user pages 2.1 User Contributions 2.2 Editing someone else's page 2.3 User talk pages What to put on your user page

Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

APS User News, Issue 70  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

70, July 7, 2011 70, July 7, 2011 CONTENTS 1. DIRECTOR'S CORNER USER MATTERS 2. More User Mysteries Solved! 3. Several APS Users Recognized in Inaugural Class of New American Crystallographic Association Fellows Program 4. Congratulations to Keith Moffat, Winner of the ACA 2011 Patterson Award 5. Paul Fenter Wins Warren Award for X-ray Diffraction Studies 6. Energy, Enthusiasm, Cooperation, and Commitment Characterize NUFO Annual Meeting BRIEFLY NOTED -- Heads Up: User Participation in Upcoming Reviews -- Upcoming General User Proposal Deadlines -- Reminder: Registration for 2011 X-ray Science Gordon Research Conference & Seminar Closes July 9, 2011 -- Shanghai Institute of Applied Physics Workshop on Science with Free-Electron Lasers on August 20-21, 2011 =====================================================

382

APS User News, Issue 82  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2, November 6, 2012 2, November 6, 2012 CONTENTS DIRECTOR'S CORNER USER MATTERS -- APS User Wins Nobel Prize in Chemistry -- Physics, Picasso, and House Paint: X-rays Solve a Mystery -- CALL FOR: APS Workshop Proposals and Invited Speaker Suggestions--Due January 11, 2013! --"There's an app for APS!" BRIEFLY NOTED -- Welcome Susan White-DePace, Associate Manager for User Programs -- Nature.com Launches Scientific Reports -- Sidewalk Construction Begins from APS to Building 314 -- Newly Reduced Speed Limit in 201 Area -- Upcoming Meetings of Interest -- General User Proposal Deadline for Run 2013-2: March 8, 2013 -- Current APS Job Openings -- Save the Date: 2013 APS/CNM/EMC Users Meeting Set for May 6-9, 2013 ==================================================== Instructions for subscribing, unsubscribing, and submitting info

383

2004 NERSC User Survey Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

4 User Survey Results 4 User Survey Results Show All | 1 2 3 4 5 ... 13 | Next » 2004 User Survey Results Table of Contents Response Summary Respondent Demographics Overall Satisfaction and Importance All Satisfaction, Importance and Usefulness Ratings Hardware Resources Software Security and One Time Passwords Visualization and Data Analysis HPC Consulting Services and Communications Web Interfaces Training Comments about NERSC Response Summary Many thanks to the 209 users who responded to this year's User Survey. The respondents represent all six DOE Science Offices and a variety of home institutions: see Respondent Demographics. The survey responses provide feedback about every aspect of NERSC's operation, help us judge the quality of our services, give DOE information on how well NERSC is doing, and point us to areas we can improve. The

384

2005 NERSC User Survey Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

5 User Survey Results 5 User Survey Results Show All | 1 2 3 4 5 ... 10 | Next » 2005 User Survey Results Table of Contents Response Summary Respondent Demographics All Satisfaction, Importance and Usefulness Ratings Hardware Resources Software Visualization and Data Analysis Services and Communications Web Interfaces Training Comments about NERSC Response Summary Many thanks to the 201 users who responded to this year's User Survey. The respondents represent all six DOE Science Offices and a variety of home institutions: see Respondent Demographics. The survey responses provide feedback about every aspect of NERSC's operation, help us judge the quality of our services, give DOE information on how well NERSC is doing, and point us to areas we can improve. The survey results are listed below.

385

Sensitivity of fenestration solar gain to source spectrum and angle of incidence  

SciTech Connect (OSTI)

The solar heat gain coefficient (SHGC) is the fraction of solar radiant flux incident on a fenestration system entering a building as heat gain. In general it depends on both the angle of incidence and the spectral distribution of the incident solar radiation. In attempts to improve energy performance and user acceptance of high-performance glazing systems, manufacturers are producing glazing systems with increasing spectral selectivity. This poses potential difficulties for calculations of solar heat gain through windows based upon the use of a single solar spectral weighting function. The sensitivity of modern high-performance glazing systems to both the angle of incidence and the shape of the incident solar spectrum is examined using a glazing performance simulation program. It is found that as the spectral selectivity of the glazing system increases, the SHGC can vary as the incident spectral distribution varies. The variations can be as great as 50% when using several different representative direct-beam spectra. These include spectra having low and high air masses and a standard spectrum having an air mass of 1.5. The variations can be even greater if clear blue diffuse skylight is considered. It is recommended that the current broad-band shading coefficient method of calculating solar gain be replaced by one that is spectral based.

McCluney, W.R. [Florida Solar Energy Center, Cocoa, FL (United States)

1996-12-31T23:59:59.000Z

386

NMG documentation, part 1: user`s guide  

SciTech Connect (OSTI)

This is the first of a three-part report documenting NMG, the Numerical Mathematics Guide. Part I is aimed at the user of the system. It contains an introduction, with an outline of the complete report, and Chapter 1, User`s Point of View. Part II is aimed at the programmer and contains Chapter 2, How It Works. Part III is aimed at the maintainer of NMG and contains Chapter 3, Maintenance, and Chapter 4, Validation. Each chapter has its own page numbering and table of contents.

Fritsch, F.N.; Dickinson, R.P. Jr.

1996-07-01T23:59:59.000Z

387

Gain Scheduled Control Using the Dual Youla Parameterization  

E-Print Network [OSTI]

Stability is a critical issue in gain-scheduled control problems in that the closed loop system may not be stable during the transitions between operating conditions despite guarantees that the gain-scheduled controller stabilizes the plant model...

Chang, Young Joon

2011-08-08T23:59:59.000Z

388

Financing Renewable Energy - No Pain, No Gain  

Broader source: Energy.gov (indexed) [DOE]

newresourcebank.com newresourcebank.com Financing Renewable Energy "No Pain, No Gain" New Resource Bank: A Radical Idea Our mission is to promote sustainable living in our community with everything we do. Where Does Your Money Spend The Night? 9/4/2012 2 Renewable Energy Projects Anaerobic Manure Digester This anaerobic manure digester improves manure management and sustainability for partner dairies while generating renewable electricity for sale to a local public utility. Anaerobic digestion is a natural process that converts a portion of the organic carbon in manure (and other waste streams) into methane and carbon dioxide. o Production of renewable energy (Biogas) o Carbon offsets o Reduction of greenhouse gas emissions o Potential pathogen reduction in manure

389

TRADE COSTS AND THE GAINS FROM TRADE IN CROP AGRICULTURE  

E-Print Network [OSTI]

costs, trade liberalization. JEL codes: F18, Q17, Q54. Although the theoretical case for the gains from

Tullos, Desiree

390

U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

3: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote 3: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges August 13, 2012 - 7:00am Addthis PROBLEM: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges PLATFORM: Oracle Database Server versions 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, 11.2.0.3 ABSTRACT: A remote authenticated user with 'Create Table' privileges can gain 'SYS' privileges on the target system. Reference LINKS: Oracle Security Alert Oracle Security Alert - CVE-2012-3132 Risk Matrices SecurityTracker Alert ID: 1027367 CVE-2012-3132 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Oracle Database. This vulnerability is not

391

U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote...  

Energy Savers [EERE]

11.2.0.2 and 11.2.0.3 are not affected on systems that have the July 2012 Critical Patch Update. Impact: A remote authenticated user with 'Create Table' privileges can gain...

392

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

was reported in RSA Authentication Manager. July 8, 2013 V-194: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host...

393

Fermilab Users' Outreach Workshop, 2009  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Fermilab Users' Outreach Workshop Fermilab Users' Outreach Workshop June 4 & 5, 2009 The Fermilab Users’ Organization will host an Outreach Workshop on June 4th and 5th, 2009, in association with the annual Users Meeting. The workshop will be an opportunity to exchange ideas on effective and practical ways to communicate the excitement of physics and what we do as scientists to students, the general public and government officials. We hope the sessions will encourage members of the Users' community to become engaged in outreach activities. Activities Tesla Coils June 3rd 9:30PM, Parking Lot Lab 3: While enjoying the traditional Users Meeting Festa, see the Tesla Coil show. Directions June 4th During coffee breaks and lunch on the second day of the Users Meeting proper, browse posters and demonstrations showcasing sucessful educational outreach programs. Also featured, posters from students enrolled in the Saturday Morning Physics program detailing what the outreach program meant to them. Instructions for Poster Presenters, follow this link.

394

Design of Gain-Scheduled Strictly Positive Real Controllers  

E-Print Network [OSTI]

Design of Gain-Scheduled Strictly Positive Real Controllers Using Numerical Optimization the linear SPR controllers, which compose the gain-scheduled controller. Second, we formulate the optimization problem associ- ated with the gain-scheduled controller itself. Restricting our in- vestigation

Damaren, Christopher J.

395

Multielemental Fingerprinting as a Tool for Authentication of Organic Wheat, Barley, Faba Bean, and Potato  

Science Journals Connector (OSTI)

Multielemental Fingerprinting as a Tool for Authentication of Organic Wheat, Barley, Faba Bean, and Potato ... Potato peels were also manually removed by a ceramic peeler on selected subsamples to allow comparison with automatically peeled potatoes. ... Analysis of automatically and manually peeled potatoes as well as potato peels confirmed that the automatic peeling process did not induce any systematic and significant contamination. ...

Kristian H. Laursen; Jan K. Schjoerring; Jrgen E. Olesen; Margrethe Askegaard; Ulrich Halekoh; Sren Husted

2011-03-21T23:59:59.000Z

396

Reliable and Semi-reliable Communication with Authentication in Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Reliable and Semi-reliable Communication with Authentication in Mobile Ad Hoc Networks Falko of wireless ad hoc sensor networks is the error-proneness and, therefore, the unreliability of communication describe a new approach and an according protocol for usage in ad hoc networks that provides reliable

Breu, Ruth

397

Project List 1. Project Name: Efficient Anonymous Private Authentication Protocol for RFID Systems  

E-Print Network [OSTI]

based authentication. Publication: · Md. Endadul Hoque, Farzana Rahman, and Sheikh I. Ahamed, "Anon's geocoding and mapping API. Publication: ···· Farzana Rahman, Casey O'Brien, Sheikh I. Ahamed, He Zhang'Brien, Kristine Manning, Jason Cowdy, Sheikh Iqbal Ahamed, "Let EcoDrive be Your Guide: Development of a Mobile

Brylow, Dennis

398

Heart-to-Heart (H2H): Authentication for Implanted Medical Devices  

E-Print Network [OSTI]

Heart-to-Heart (H2H): Authentication for Implanted Medical Devices Masoud Rostami Rice University Rice University Houston, TX farinaz@rice.edu ABSTRACT We present Heart-to-Heart (H2H), a system patients to over-the-air attack and physical harm. H2H makes use of ECG (heartbeat data

399

Distillation Codes and Applications to DoS Resistant Multicast Authentication  

E-Print Network [OSTI]

Distillation Codes and Applications to DoS Resistant Multicast Authentication Chris Karlof UC We introduce distillation codes, a method for streaming and storing data. Like erasure codes, distillation codes allow information to be decoded from a sufficiently large quorum of symbols. In contrast

Perrig, Adrian

400

Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks  

E-Print Network [OSTI]

Sciences Temple University Philadelphia, PA 19122 Email: jiewu@temple.edu Abstract--Message authentication by the degree of the polynomial: when the number of messages transmitted is larger than this threshold allows any node to transmit an unlimited number of messages without suffering the threshold problem

Wu, Jie

Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Hardware Acceleration of the SRP Authentication Protocol Peter Groen1,2  

E-Print Network [OSTI]

Hardware Acceleration of the SRP Authentication Protocol Peter Groen1,2 , Panu H¨am¨al¨ainen2 , Ben employed is the Secure Remote Password (SRP) authenti- cation protocol [15]. It makes extensive use of hash that can be called from soft- ware routines in the SRP protocol. This paper is structured as follows

Kuzmanov, Georgi

402

ECG-Based Authentication Fahim Sufi, Ibrahim Khalil, and Jiankun Hu  

E-Print Network [OSTI]

ECG-Based Authentication Fahim Sufi, Ibrahim Khalil, and Jiankun Hu 17 Contents 17.1 Background of ECG . . . . . . . . . . . . . . . . . . . . . . 310 17.1.1 Physiology of ECG . . . . . . . . . . . . . . . . . . 310 17.1.2 Rhythm Analysis . . . . . . . . . . . . . . . . . . . . 312 17.2 What Can ECG Based

Hu, Jiankun

403

T-721:Mac OS X Directory Services Lets Local Users View User Password  

Broader source: Energy.gov (indexed) [DOE]

21:Mac OS X Directory Services Lets Local Users View User 21:Mac OS X Directory Services Lets Local Users View User Password Hashes T-721:Mac OS X Directory Services Lets Local Users View User Password Hashes September 20, 2011 - 8:45am Addthis PROBLEM: Mac OS X Directory Services Lets Local Users View User Password Hashes. PLATFORM: Mac OS X Lion (10.7) ABSTRACT: A local user can view user password hashes. reference LINKS: SecurityTracker Alert ID: 1026067 Apple Support Downloads Apple Security Updates Apple OS X Lion v10.7.1 Update IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Mac OS X. A local user can view user password hashes. A local user can invoke the following Directory Services command line command to view the password hash for the target user: dscl localhost -read /Search/Users/[target user] A local user can change their

404

Project-Role Pair user_tokens  

E-Print Network [OSTI]

OSAC Users (U) Domains (D) Roles (R) User Assignment (UA) Permission Assignment (PA) Project Ownership (PO) Project-Role Pair (PRP) Projects (P) Tokens (T) User Ownership (UO) Services (S) user_tokens token_project Groups (G) Group Ownership (GO) User Group (UG) Group Assignment (GA) token_roles PERMS

Sandhu, Ravi

405

Information gain versus coupling strength in quantum measurements  

E-Print Network [OSTI]

We investigate the relationship between the information gain and the interaction strength between the quantum system and the measuring device. A strategy is proposed to calculate the information gain of the measuring device as the coupling strength is a variable. For qubit systems, we prove that the information gain increases monotonically with the coupling strength. It is obtained that the information gain of the projective measurement along the x-direction reduces with the increasing of the measurement strength along the z-direction, and a complementarity of information gain in the measurements along those two directions is presented.

Xuanmin Zhu; Yuxiang Zhang; Quanhui Liu; Shengjun Wu

2012-03-10T23:59:59.000Z

406

U-135: HP WBEM Discloses Diagnostic Data to Remote and Local Users |  

Broader source: Energy.gov (indexed) [DOE]

35: HP WBEM Discloses Diagnostic Data to Remote and Local Users 35: HP WBEM Discloses Diagnostic Data to Remote and Local Users U-135: HP WBEM Discloses Diagnostic Data to Remote and Local Users March 28, 2012 - 7:00am Addthis PROBLEM: HP WBEM Discloses Diagnostic Data to Remote and Local Users PLATFORM: HP-UX 11.11, 11.23, and 11.31 ABSTRACT: Two vulnerabilities were reported in HP WBEM. A remote or local user can gain access to diagnostic data. REFERENCE LINKS: SecurityTracker Alert ID: 1026849 CVE-2012-0125 CVE-2012-0126 iIMPACT ASSESSMENT Medium Discussion: A potential security vulnerability has been identified with certain HP-UX WBEM components. The vulnerability could be exploited remotely in HP-UX 11.11 and HP-UX 11.23 to gain unauthorized access to diagnostic data. The vulnerability could be exploited locally in HP-UX 11.31 to gain

407

U-135: HP WBEM Discloses Diagnostic Data to Remote and Local Users |  

Broader source: Energy.gov (indexed) [DOE]

5: HP WBEM Discloses Diagnostic Data to Remote and Local Users 5: HP WBEM Discloses Diagnostic Data to Remote and Local Users U-135: HP WBEM Discloses Diagnostic Data to Remote and Local Users March 28, 2012 - 7:00am Addthis PROBLEM: HP WBEM Discloses Diagnostic Data to Remote and Local Users PLATFORM: HP-UX 11.11, 11.23, and 11.31 ABSTRACT: Two vulnerabilities were reported in HP WBEM. A remote or local user can gain access to diagnostic data. REFERENCE LINKS: SecurityTracker Alert ID: 1026849 CVE-2012-0125 CVE-2012-0126 iIMPACT ASSESSMENT Medium Discussion: A potential security vulnerability has been identified with certain HP-UX WBEM components. The vulnerability could be exploited remotely in HP-UX 11.11 and HP-UX 11.23 to gain unauthorized access to diagnostic data. The vulnerability could be exploited locally in HP-UX 11.31 to gain

408

User Facilities for Industry 101  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Satellite!Workshop!10!-!User!Facilities!for!Industry!101! Satellite!Workshop!10!-!User!Facilities!for!Industry!101! Organizers:+Andreas+Roelofs+(CNM),+Jyotsana+Lal+(APS),+Katie+Carrado+Gregar+(CNM),+and+Susan+Strasser+ (APS)! ! In! order! to! increase! awareness! of! the! industrial! community! to! Argonne! National! Laboratory! user! facilities,!the!Advanced!Photon!Source!(APS),!the!Center!for!Nanoscale!Materials!(CNM)!and!the!Electron! Microscopy!Center!(EMC)!welcomed!industrial!scientists,!engineers!and!related!professionals!to!a!oneC day! workshop! to! learn! more! about! Argonne's! National! Laboratory! and! the! capabilities/techniques! available! for! their! use.! The! workshop! showcased! several! successful! industrial! user! experiments,! and! explained! the! different! ways! in! which! industrial! scientists! can! work! at! Argonne! or! with! Argonne!

409

APS USER TRAINING HISTORY Background  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

USER TRAINING HISTORY USER TRAINING HISTORY Background The User Program Division Director has delegated to the CATs the authority to authorize the conduct of experiments because the CATs have accepted responsibility for: * identifying and evaluating the hazards posed by the experiment, * specifying controls appropriate to the hazards, and * verifying that controls are in place. One form of hazard control frequently made mandatory by law and laboratory policy is worker knowledge. The accepted means of verifying that a worker has the required knowledge is ensuring that the worker has completed appropriate training. With CAT input, the APS has developed the APS User Training History. This web-based tool enables designated CAT personnel to examine data characterizing ES&H training courses

410

CCD Astronomy Software User's Guide  

E-Print Network [OSTI]

CCDSoft CCD Astronomy Software User's Guide Version 5 Revision 1.11 Copyright © 1992­2006 SantaSky Astronomy Software, and AutomaDome are trademarks of Software Bisque. WindowsTM is a trademark of Microsoft

411

Lisa Gerhardt NERSC User Services"  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Gerhardt " NERSC User Services" September 10, 2013" Getting Started at NERSC: Running Jobs Jobs at NERSC * Most j obs a re p arallel, u sing 1 0s t o 1 00,000+ c ores * Produc8on r...

412

Kirsten Fagnan NERSC User Services"  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Kirsten Fagnan " NERSC User Services" February 15, 2013" Running Parallel Jobs Outline * Parallel P rogramming M odels * NERSC S ystems a nd S ample S cripts * Queues a nd P...

413

Midwest Hydro Users Group Meeting  

Broader source: Energy.gov [DOE]

The Midwest Hydro Users Group will be holding their annual Fall meeting on November 12th and 13th in Wausau, Wisconsin. An Owners-only meeting on the afternoon of the 12th followed by a full...

414

USDA Global Agricultural Information Network (GAIN) | Open Energy  

Open Energy Info (EERE)

USDA Global Agricultural Information Network (GAIN) USDA Global Agricultural Information Network (GAIN) Jump to: navigation, search Tool Summary Name: USDA Global Agricultural Information Network (GAIN) Agency/Company /Organization: United States Department of Agriculture Sector: Land Focus Area: Agriculture Topics: Co-benefits assessment, GHG inventory, Market analysis Resource Type: Dataset Website: gain.fas.usda.gov/Pages/Default.aspx USDA Global Agricultural Information Network (GAIN) Screenshot References: GAIN[1] Overview "USDA'S Global Agriculture Information Network (GAIN) provides timely information on the agricultural economy, products and issues in foreign countries since 1995 that are likely to have an impact on United States agricultural production and trade. U.S. Foreign Service officers working at

415

User Experience | Security | Advertising Picture CAPTCHA  

E-Print Network [OSTI]

User Experience | Security | Advertising Picture CAPTCHA #12;Context: CAPTCHAs · A test are solved/day · User Attention · Complete user attention while solving the CAPTCHA · Advertisers love

Militzer, Burkhard

416

User:Woodjr/Sandbox | Open Energy Information  

Open Energy Info (EERE)

icon Twitter icon User:WoodjrSandbox < User:Woodjr Jump to: navigation, search Test link: Dataset 40 Retrieved from "http:en.openei.orgwindex.php?titleUser:Woodjr...

417

Progress toward high-gain laser fusion  

SciTech Connect (OSTI)

A 1985-1986 Review of the US inertial confinement fusion program by the National Academy of Sciences concluded that five more years might be required to obtain enough data to determine the future course of the program. Since then, data from the Nova laser and from the Halite/Centurion program have resolved most of the outstanding problems identified by the NAS review. In particular, we now believe that we can produce a sufficiently uniform target; that we can keep the energy content in hot electrons and high-energy photons low enough (/approximately/1--10% of drive energy, depending on target design) and achieve enough pulse-shaping accuracy (/approximately/10%, with a dynamic range of 100:1) to keep the fuel on a near-Fermi-degenerate adiabat; that we can produce an /approximately/100-Mbar pressure pulse of sufficient uniformity (/approximately/1%), and can we control hydrodynamic instabilities so that the mix of the pusher into the hot spot is low enough to permit marginal ignition. These results are sufficiently encouraging that the US Department of Energy is planning to complete a 10-MJ laboratory microfusion facility to demonstrate high-gain ICF in the laboratory within a decade. 22 refs., 1 fig.

Storm, E.

1988-09-28T23:59:59.000Z

418

Electric top drives gain wide industry acceptance  

SciTech Connect (OSTI)

Since its introduction, the top drive drilling system has gained acceptance as a productive and safe method for drilling oil and gas wells. Originally, the system was used mostly for offshore and higher cost land drilling, and it had to be installed as a permanent installation because of its enormous weight and size. Essentially, a top drive replaces the kelly and rotary table as the means of rotating drillpipe on oil, gas and geothermal rigs and is considered to be 15% to 40% more efficient than a kelly drive. Top drive systems allow the operator to drill and maintain directional orientation for triple stands and provide tripping efficiency because of the ability to ream and circulate with triple stands, to reduce the risk of stuck pipe or lost wells, and to improve well control and pipe handling safety. The paper describes electric top drives with DC motors, top drives with AC motors, top drives with permanent magnet motors, and top drives with permanent magnet brushless synchronous motors.

Riahi, M.L.

1998-05-01T23:59:59.000Z

419

U-193: NetBSD System Call Return Value Validation Flaw Lets Local Users  

Broader source: Energy.gov (indexed) [DOE]

3: NetBSD System Call Return Value Validation Flaw Lets Local 3: NetBSD System Call Return Value Validation Flaw Lets Local Users Gain Elevated Privileges U-193: NetBSD System Call Return Value Validation Flaw Lets Local Users Gain Elevated Privileges June 18, 2012 - 8:00am Addthis PROBLEM: A vulnerability was reported in NetBSD. A local user can obtain elevated privileges on the target system. PLATFORM: Version(s): 4.0.*, 5.0.*, 5.1, 6.0 Beta ABSTRACT: On Intel CPUs, the sysret instruction can be manipulated into returning to specific non-canonical addresses, which may yield a CPU reset. We cannot currently rule out with utter confidence that this vulnerability could not also be used to execute code with kernel privilege instead of crashing the system. reference LINKS: Vendor Advisory Security Tracker ID 1027178 CVE-2012-0217

420

Making Global Illumination User Friendly  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Making Global Illumination User Friendly Making Global Illumination User Friendly Title Making Global Illumination User Friendly Publication Type Conference Paper LBNL Report Number LBL-37860 Year of Publication 1995 Authors Ward, Gregory J. Conference Name 6th Eurographics Workshop on Rendering Date Published 06/1995 Conference Location Dublin, Ireland Call Number LBL-37860 Abstract Global illumination researchers tend to think in terms of mesh density and sampling frequency, and their software reflects this in its user interface. Advanced rendering systems are rife with long command lines and parameters for tuning the sample densities, thresholds and other algorithm-specific variables, and the novice user is quickly lost in a sea of possibilities. This paper details a successful effort of making one such global illumination system usable by people who understand their problems, even if they do not understand the methods needed to solve them, through an assisted oracle approach. A single program is introduced to map a small set of intuitive control variables to the rendering commands and parameter settings needed to produce the desired output in a reasonable time. This new executive program then serves as the basis for a graphical user interface that is both friendly in its appearance and reliable in its performance. Finally, we conclude with some future directions for improving this interface.

Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Oak Ridge National Laboratory - User Facilities  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Facilities Oak Ridge National Laboratory is home to a number of highly sophisticated experimental user facilities. These research laboratories are designed to serve staff...

422

APS User News-at-a-Glance  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Calendar of Events APS News User News Article Archives APS Brochure Annual Reports Posters Podcasts Image Gallery external site Video Library Syndicated Feeds (RSS) APS User...

423

New User Guide | Argonne Leadership Computing Facility  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Documentation Feedback Please provide feedback to help guide us as we continue to build documentation for our new computing resource. Feedback Form New User Guide USER TIP:...

424

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

February 28, 2012 February 28, 2012 U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases. February 27, 2012 U-111: IBM AIX ICMP Processing Flaw Lets Remote Users Deny Service A remote user can send a specially crafted ICMP packet to cause the target service to crash. February 24, 2012 U-110: Samba Bug Lets Remote Users Execute Arbitrary Code A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. February 21, 2012 U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service

425

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 5, NO. 9, SEPTEMBER 2006 2569 Mutual Authentication and Key Exchange Protocols  

E-Print Network [OSTI]

compromise and service abuse, etc. Several authentication Manuscript received February 3, 2005; revised May}@bbcr.uwaterloo.ca). Digital Object Identifier 10.1109/TWC.2006.05063. Internet B's home network, home agent (H) Fixed Internet

Shen, Xuemin "Sherman"

426

ID-based One-pass Authenticated Key Establishment M. Choudary Gorantla Colin Boyd Juan Manuel Gonzalez Nieto  

E-Print Network [OSTI]

ID-based One-pass Authenticated Key Establishment M. Choudary Gorantla Colin Boyd Juan Manuel Gonz, Brisbane, QLD 4001, Australia. Email: mc.gorantla@isi.qut.edu.au, {c.boyd

Boyd, Colin

427

User Agreements | Stanford Synchrotron Radiation Lightsource  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Agreements Agreements Institutional Agreements Required to Access DOE National User Facilities In recognition of the nation's expanding need to engage businesses and universities in the areas of commercial and basic science research, the Department of Energy (DOE) has developed two special types of agreements for use at all DOE National Laboratories with approved designated user facilities, see http://www.gc.doe.gov/1002.htm. Non-Proprietary User Agreement (PDF) (General User Agreement; no cost for general users) Proprietary User Agreement (PDF) (For Confidential or Proprietary Research; also requires advance payment) A User Agreement is required for all users and must be executed by the appropriate institutional officer(s) at the user's institution. A single User Agreement covers all experimenters from that institution (User

428

PIA - Advanced Test Reactor National Scientific User Facility...  

Energy Savers [EERE]

Advanced Test Reactor National Scientific User Facility Users Week 2009 PIA - Advanced Test Reactor National Scientific User Facility Users Week 2009 PIA - Advanced Test Reactor...

429

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

January 25, 2013 January 25, 2013 V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication A remote user can gain administrative access to the target system. January 24, 2013 V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code A remote authenticated user can execute arbitrary code on the target system. A remote authenticated user can modify the configuration on the target system. A remote user can cause denial of service conditions. January 23, 2013 V-075: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code Two vulnerabilities were reported in EMC AlphaStor. January 22, 2013 V-074: IBM Informix Genero libpng Integer Overflow Vulnerability

430

Gain properties of dye-doped polymer thin films  

E-Print Network [OSTI]

The demonstration of an electrically pumped organic laser remains a major issue of organic optoelectronics for several decades. Nowadays, hybrid pumping seems a promising compromise where the organic material is optically pumped by an electrically pumped inorganic device on chip. This technical solution requires therefore an optimization of the organic gain medium under optical pumping. Here, we report a detailed study of gain features of dye-doped polymer thin films, in particular we introduce the gain efficiency $K$, in order to facilitate comparison between material and experimental conditions. First, we measure the bulk gain by the means of a pump-probe setup, and then present in details several factors which modify the actual gain of the layer, namely the confinement factor, the pump polarization, the molecular anisotropy, and the re-absorption. The usual model to evaluate the gain leads to an overestimation by more than one order of magnitude, which stresses the importance to design the devices accordin...

Gozhyk, I; Rabbani, H; Djellali, N; Forget, S; Chenais, S; Ulysse, C; Brosseau, A; Gauvin, S; Zyss, J; Lebental, M

2014-01-01T23:59:59.000Z

431

Use of a photonic crystal for optical amplifier gain control  

DOE Patents [OSTI]

An optical amplifier having a uniform gain profile uses a photonic crystal to tune the density-of-states of a gain medium so as to modify the light emission rate between atomic states. The density-of-states of the gain medium is tuned by selecting the size, shape, dielectric constant, and spacing of a plurality of microcavity defects in the photonic crystal. The optical amplifier is particularly useful for the regeneration of DWDM signals in long optical fibers.

Lin, Shawn-Yu (Albuquerque, NM); Fleming, James G. (Albuquerque, NM); El-Kady, Ihab (Albuquerque, NM)

2006-07-18T23:59:59.000Z

432

Gain spectra and temperature characteristics of quantum cascade lasers  

Science Journals Connector (OSTI)

We have developed a theory describing the operation of lasers based on intersubband transitions in a quantum well. The theory combines a first-principles description of the intersubband lineshape and the optical gain with kinetic models for carrier heating. ... Keywords: carrier heating, gain spectra, intersubband lineshape, intersubband transitions, kinetic models, laser theory, optical gain, quantum cascade lasers, quantum well, quantum well lasers, room-temperature high-power operation, temperature characteristics

V. Gorfinkel; S. Luryi; B. Gelmont

1995-11-01T23:59:59.000Z

433

APS User News, Issue 71  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

1, August 18, 2011 1, August 18, 2011 CONTENTS 1. DIRECTOR'S CORNER USER MATTERS 2. How to Wow! "Secrets" for a Successful Proposal 3. Sweet Dreams Mean Safer Work 4. XSD's Linda Young Elected DAMOP Vice Chair 5. Successful 2011 APS/IIT Summer XAFS School BRIEFLY NOTED -- John Quintana Appointed Argonne's Deputy COO -- 2011 X-Ray Spectroscopy of Magnetic Solids Workshop Set for October 22-23 -- Workshops on Hard X-ray Instrumentation at the SwissFEL -- Next GUP Deadline is October 28, 2011 ===================================================== Instructions for subscribing, unsubscribing, and submitting info http://www.aps.anl.gov/Users/Communications/User_News/ ===================================================== DIRECTOR'S CORNER During the last week of July, we had the annual review of APS organized by

434

APS User News, Issue 65  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

5, November 1, 2010 5, November 1, 2010 CONTENTS DIRECTOR'S CORNER SCIENCE NEWS 1. Science Highlights USER MATTERS 2. New Badges for APS Users 3. APSUO Goes to Washington! 4. New Biosafety Web Page Available 5. Two New ANL Procedures: Injuries and Illnesses and Incident Notification FACILITY NEWS 6.Call for Workshop Proposals for APS/CNM/EMC Users Meeting 7. Cross-cut Review of APS X-ray Interface and Liquid Surface Scattering Science Held on October 6 8. APS SAC Meets, Sets Review Process for Scientific Priorities in APS-U 9. APS Upgrade on You Tube BRIEFLY NOTED -- Second Annual Meeting of the Prairie Section of the American Physical Society, November 18-20, 2010 -- PhD Scholarship on Virus Surrogate in New Zealand ===================================================== Instructions for subscribing, unsubscribing, and submitting info

435

Cray XC30 User Documentation  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cray XC30 Cray XC30 Documentation Cray XC30 User Documentation L Cray XC30 Documentation Search Preferences | Advanced Search Home Browse Books Man Pages Glossary Platforms Cray XC30 Cray XE and Cray XK Cray XT Cray Sonexion Cray X2 Cray X1 Knowledge Base by Category by Date by Platform by Title by User Release Announcements @Twitter Cray XC30 System Documentation This site map also contains legacy documentation. Always consult the latest version of documentation for your site-specific configuration and ask your Cray Customer Service representative for additional guidance on the latest software documents. Getting Started Cray Linux Environment (CLE) Software Release Overview Programming Environment Cray Programming Environments User Guide Cray Compiling Environment (CCE) Cray Fortran Reference Manual

436

Cray XC30 User Documentation  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Documentation Documentation Cray XC30 User Documentation L Cray XC30 Documentation Search Preferences | Advanced Search Home Browse Books Man Pages Glossary Platforms Cray XC30 Cray XE and Cray XK Cray XT Cray Sonexion Cray X2 Cray X1 Knowledge Base by Category by Date by Platform by Title by User Release Announcements @Twitter Cray XC30 System Documentation This site map also contains legacy documentation. Always consult the latest version of documentation for your site-specific configuration and ask your Cray Customer Service representative for additional guidance on the latest software documents. Getting Started Cray Linux Environment (CLE) Software Release Overview Programming Environment Cray Programming Environments User Guide Cray Compiling Environment (CCE) Cray Fortran Reference Manual

437

APS User News, Issue 58  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

8, November 11, 2009 8, November 11, 2009 CONTENTS MESSAGE FROM MURRAY SCIENCE NEWS 1. Fast CCD Detector Collaboration 2. Science & Research Highlights The Power of Proteins: Prion Diseases Demystified Bacterium Helps in the Formation of Gold Getting to the Roots of Lethal Hairs Creating a Precise Atomic-Scale Map of Quantum Dots USER MATTERS 3. Users and the Flu Season 4. Workshop on the Role of Synchrotron Radiation in Solving Scientific Challenges in Advanced Nuclear Energy Systems 5. First Experiment at the Linac Coherent Light Source 6. New Postings Available on Employment Bulletin Board FACILITY NEWS 7. Recent SAC Meeting Focuses on APS Upgrade 8. The Life Sciences Council at the APS 9. Fitness Center Now Open in New Location AWARDS AND HONORS 10. APS Users Awarded 2009 Nobel Prize in Chemistry

438

ORISE: CDC Travelers' Health Mobile App, Designed by ORISE, Gains...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Can I Eat This? Mobile App Helps International Travelers Make Safe Dining Choices CDC Travelers' Health app, designed by ORISE, gains attention on multiple websites How ORISE is...

439

Interaction Junk: User Interaction-Based Evaluation of Visual Analytic Systems  

SciTech Connect (OSTI)

With the growing need for visualization to aid users in understanding large, complex datasets, the ability for users to interact and explore these datasets is critical. As visual analytic systems have advanced to leverage powerful computational models and data analytics capabilities, the modes by which users engage and interact with the information are limited. Often, users are taxed with directly manipulating parameters of these models through traditional GUIs (e.g., using sliders to directly manipulate the value of a parameter). However, the purpose of user interaction in visual analytic systems is to enable visual data exploration where users can focus on their task, as opposed to the tool or system. As a result, users can engage freely in data exploration and decision-making, for the purpose of gaining insight. In this position paper, we discuss how evaluating visual analytic systems can be approached through user interaction analysis, where the goal is to minimize the cognitive translation between the visual metaphor and the mode of interaction (i.e., reducing the Interactionjunk). We motivate this concept through a discussion of traditional GUIs used in visual analytics for direct manipulation of model parameters, and the importance of designing interactions the support visual data exploration.

Endert, Alexander; North, Chris

2012-10-14T23:59:59.000Z

440

Comparative studies on authentication and key exchange methods for 802.11 wireless LAN  

Science Journals Connector (OSTI)

IEEE 802.11 wireless LAN has become one of the hot topics on the design and development of network access technologies. In particular, its authentication and key exchange (AKE) aspects, which form a vital building block for modern security mechanisms, deserve further investigation. In this paper we first identify the general requirements used for WLAN authentication and key exchange (AKE) methods, and then classify them into three levels (mandatory, recommended, and additional operational requirements). We present a review of issues and proposed solutions for AKE in 802.11 WLANs. Three types of existing methods for addressing AKE issues are identified, namely, the legacy, layered and access control-based AKE methods. Then, we compare these methods against the identified requirements. Based on the analysis, a multi-layer AKE framework is proposed, together with a set of design guidelines, which aims at a flexible, extensible and efficient security as well as easy deployment.

Jun Lei; Xiaoming Fu; Dieter Hogrefe; Jianrong Tan

2007-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Sentence Completion for Understanding Users and Evaluating User Experience  

Science Journals Connector (OSTI)

......Music and Video and Games Touch screen Not good for quick/rough everyday use Useful...users have access to a computer and the internet and are able to understand and write in...negative replies saying that using it is not good, the problem is quality and when using......

Sari Kujala; Tanja Walsh; Piia Nurkka; Marian Crisan

2014-05-01T23:59:59.000Z

442

Questioning the Meaning of Authenticity in Martin Heidegger's Being and Time  

E-Print Network [OSTI]

the proper context for authenticity will be to clarify those existential structures that describe what it means for Dasein to exist concretely in the world. Since Heidegger provides a fairly comprehensive account of the ontological constitution... the ontological and the ontic, and the existential and the existentiell. As a result, the traditional notions of selfhood and subjectivity get split between this new landscape of categories and subsequently lose their meaning. As Francois Raffoul points out...

Liwinski, Thomas

2011-10-21T23:59:59.000Z

443

Designing a minimum-functionality neutron and gamma measurement instrument with a focus on authentication  

SciTech Connect (OSTI)

During the design and construction of the Next-Generation Attribute-Measurement System, which included a largely commercial off-the-shelf (COTS), nondestructive assay (NDA) system, we realized that commercial NDA equipment tends to include numerous features that are not required for an attribute-measurement system. Authentication of the hardware, firmware, and software in these instruments is still required, even for those features not used in this application. However, such a process adds to the complexity, cost, and time required for authentication. To avoid these added authenticat ion difficulties, we began to design NDA systems capable of performing neutron multiplicity and gamma-ray spectrometry measurements by using simplified hardware and software that avoids unused features and complexity. This paper discusses one possible approach to this design: A hardware-centric system that attempts to perform signal analysis as much as possible in the hardware. Simpler processors and minimal firmware are used because computational requirements are kept to a bare minimum. By hard-coding the majority of the device's operational parameters, we could cull large sections of flexible, configurable hardware and software found in COTS instruments, thus yielding a functional core that is more straightforward to authenticate.

Karpius, Peter J [Los Alamos National Laboratory; Williams, Richard B [Los Alamos National Laboratory

2009-01-01T23:59:59.000Z

444

STATEMENT OF CONSIDERATIONS Waiver For Certain Proprietary Users of the Advanced Photon Source at  

Broader source: Energy.gov (indexed) [DOE]

Laboratory , Contract Number W-31-109-ENG-38; CH1049, Laboratory , Contract Number W-31-109-ENG-38; CH1049, W(A)-C-00-006 Thlis class waiver is intended to apply to certain proprietary users of the Advanced Photon Source (APS) at Argonne National Laboratory. Specifically, the waiver is targeted to industrial concerns desiring access to the APS, but because of particular considerations, do not have the technical capabilities and means to gain direct access to the APS. A previous class waiver entitled "Class Waiver for Proprietary Users of Energy Research Designated User Facilities" ((C)-91-005), was granted in 1991 to private organizations, using in a proprietary mode, certain designated user facilities of the Department of Energy, including the APS. There now exists a certain class of organizations who desire access to the APS but lack financial and technical means and

445

STATEMENT OF CONSIDERATIONS Waiver For Certain Proprietary Users of the Advanced Photon Source at  

Broader source: Energy.gov (indexed) [DOE]

Laboratory, Contract Number W-31-109-ENG-38; CH1049, Laboratory, Contract Number W-31-109-ENG-38; CH1049, W(A)-C-00-006 This class waiver is intended to apply to certain proprietary users of the Advanced Photon Source (APS) at Argonne National Laboratory. Specifically, the waiver is targeted to industrial concerns desiring access to the APS, but because of particular considerations, do not have the technical capabilities and means to gain direct access to the APS. A previous class waiver entitled "Class Waiver for Proprietary Users of Energy Research Designated User Facilities" ((C)-91-005), was granted in 1991 to private organizations, using in a proprietary mode, certain designated user facilities of the Department of Energy, including the APS. There now exists a certain class of organizations who desire access to the APS but lack financial and technical means and

446

DOE VPN Client User Guide  

Broader source: Energy.gov (indexed) [DOE]

VPN Client VPN Client User Guide November 2013 U.S. Department of Energy Table of Contents Introduction ................................................................... 3 System Requirements ................................................... 3 Microsoft Windows ........................................................ 3 Mac OS X...................................................................... 4 Windows ......................................................................... 5 Installation for the Cisco AnyConnect Client ................... 5 Disconnecting from the Cisco AnyConnect Client ........... 8 Reconnecting to the Cisco AnyConnect Client ................ 9 Mac OS X ...................................................................... 10

447

Efficient Applications in User Transparent  

E-Print Network [OSTI]

Chapter 7 Efficient Applications in User Transparent Parallel Image Processing "Thy will by my parallel image processing. First, in Chapter 2 we have discussed the need for the availability is a sustainable software library consisting of an extensive set of operations commonly applied in state

Seinstra, Frank J.

448

LOCUS User's Guide Steve Scott  

E-Print Network [OSTI]

LOCUS User's Guide Steve Scott March, 2005 Last updated November 22, 2005 LOCUS is a database of the listed options, e.g. `Y' to define the variable to be plotted on the y-axis or `PL' to plot the data of items, e.g. a list of constraints, entering a semi-colon (";") terminates the list. For example, SET? X

Princeton Plasma Physics Laboratory

449

Special Issue: Organic User Interfaces  

Science Journals Connector (OSTI)

......of materials selected to foster organic designs, the authors paint an interesting portrait of the task of conveying OUI to the...M., Lee J. MoleBot: An Organic Usert-Interface-Based Robot That Provides Users with Richer Kinetic Interactions. Interact......

Audrey Girouard; Roel Vertegaal; Ivan Poupyrev

2013-03-01T23:59:59.000Z

450

DOE's BestPractices Steam End User Training Steam End User Training  

E-Print Network [OSTI]

DOE's BestPractices Steam End User Training Steam End User Training Steam Distribution Losses Module 1 June 29, 2010 Steam EndUser Training Steam Distribution System Losses Module Slide 1 pressure. #12;DOE's BestPractices Steam End User Training Steam End User Training Steam Distribution

Oak Ridge National Laboratory

451

DOE's BestPractices Steam End User Training Steam End User Training  

E-Print Network [OSTI]

DOE's BestPractices Steam End User Training Steam End User Training Welcome Module - 1 8/27/2010 Steam End User Training Welcome Module Slide 1 ­ Steam End User Training Welcome to the Department of Energy's Industrial Technologies Program BestPractices Steam End-User Training. The Department of Energy

Oak Ridge National Laboratory

452

Gaines County Solid Waste Management Act (Texas) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Gaines County Solid Waste Management Act (Texas) Gaines County Solid Waste Management Act (Texas) Gaines County Solid Waste Management Act (Texas) < Back Eligibility Commercial Construction Industrial Investor-Owned Utility Local Government Municipal/Public Utility Rural Electric Cooperative Tribal Government Utility Program Info State Texas Program Type Environmental Regulations Provider Gaines County Solid Waste Management District This Act establishes the Gaines County Solid Waste Management District, a governmental body to develop and carry out a regional water quality protection program through solid waste management and regulation of waste disposal. The District has the power to prepare, adopt plans for, purchase, obtain permits for, construct, acquire, own, operate, maintain, repair, improve, and extend inside and outside the boundaries of the district any works,

453

Foreign direct investment in emerging markets and acquirers value gains  

Science Journals Connector (OSTI)

Abstract We investigate the shareholder wealth effects of 306 foreign direct investment (FDI) announcements by UK firms in seventy-five emerging markets (EM). Our results show that acquirers enjoy highly significant gains during the announcement period of FDI. Perhaps surprisingly, the highest gains are accrued to acquirers investing in countries with high political risk and high corruption ratings. The type of asset acquired has also a significant effect on the gains of acquirers shareholders, with the highest gains accrued to acquirers of physical assets. Also, investments in physical assets in EM with a high corruption rating elicit the highest gains. We contend that UK firms following resource-seeking strategies in EM with a high corruption rating are facilitated access to resources on favorable terms and this is viewed positively by the market participants. Our results are robust to alternative model specifications and the endogenous choice to expand internationally.

Leonidas Barbopoulos; Andrew Marshall; Cameron MacInnes; Patrick McColgan

2014-01-01T23:59:59.000Z

454

Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

the beamline should return with you when your beamtime is over, and a statement to this effect should be included with the list of substances. The list of substances and a list...

455

SLAC Lightsource User Access Guidelines and Agreement  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Lightsource User Access Guidelines & Agreement Lightsource User Access Guidelines & Agreement August 3, 2011 SLAC-I-030-306-001-00-R002 1 SLAC Lightsource User Access Guidelines and Agreement LCLS / SSRL User Research Administration approval (signature/date): LCLS Safety Office approval (signature/date): SSRL Safety Office approval (signature/date): XFO Operations approval (signature/date): Revision Record Revision Date Revised Section(s) Affected Description of Change R001 October 4 th , 2010 User Form Updated SLAC Lightsource User Access Agreement Form R000 Sept 14, 2009 Original Release SLAC Lightsource User Access Guidelines & Agreement August 3, 2011 SLAC-I-030-306-001-00-R002 1 SLAC LIGHTSOURCE USER ACCESS GUIDELINES & AGREEMENT Introduction Welcome to SSRL and LCLS, SLAC's lightsource user facilities. We hope that your stay here will be

456

Users Search Behavior Graph for Aiding Personalized Web Search  

Science Journals Connector (OSTI)

The www is a dynamic environment and it is difficult to capture the user preferences and interests without interfering with the normal activity of the user. Hence to improve user searching in the World Wide We...

S. Sendhilkumar; T. V. Geetha

2007-01-01T23:59:59.000Z

457

A Security Solution for IEEE 802.11's Ad-hoc Mode:Password-Authentication and Group Diffie-Hellman Key Exchange  

SciTech Connect (OSTI)

The IEEE 802 standards ease the deployment of networkinginfrastructures and enable employers to accesscorporate networks whiletraveling. These standards provide two modes of communication calledinfrastructure and ad-hoc modes. A security solution for the IEEE802.11's infrastructure mode took several years to reach maturity andfirmware are still been upgraded, yet a solution for the ad-hoc modeneeds to be specified. The present paper is a first attempt in thisdirection. It leverages the latest developments in the area ofpassword-based authentication and (group) Diffie-Hellman key exchange todevelop a provably-secure key-exchange protocol for IEEE 802.11's ad-hocmode. The protocol allows users to securely join and leave the wirelessgroup at time, accommodates either a single-shared password orpairwise-shared passwords among the group members, or at least with acentral server; achieves security against dictionary attacks in theideal-hash model (i.e. random-oracles). This is, to the best of ourknowledge, the first such protocol to appear in the cryptographicliterature.

Emmanuel, Bresson; Olivier, Chevassut; David, Pointcheval

2005-10-01T23:59:59.000Z

458

User_Sup_AssignDelegate  

Broader source: Energy.gov (indexed) [DOE]

an Alternate Supervisor (Supervisor) an Alternate Supervisor (Supervisor) © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Assigning an Alternate Supervisor (Supervisor) Purpose The purpose of this job aid is to guide you through the step-by-step process of managing alternate supervisors within SuccessFactors Learning. When employees work for an extended period on a project where they report to a different manager or supervisor, you may want to transfer responsibility for completing the primary supervisor's tasks, for example, a performance review or competency assessment, to an alternate supervisor. The Manage Alternate Supervisors function allows you to identify other users as alternate supervisors and assign primary responsibility to them. After you assign a user as an alternate supervisor, the system

459

APS User News, Issue 62  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2, June 21, 2010 2, June 21, 2010 CONTENTS MESSAGE FROM MURRAY SCIENCE NEWS 1. Jaramillo Recognized for Techniques to Study Quantum Effects at High Pressure 2. Science Highlights USER MATTERS 3. APS Upgrade Seminar Series Scheduled for Summer Months 4. APS Beam Time Request System Goes Full Time FACILITY NEWS 5. Proposal Deadline July 9, for 2010-3 Run Cycle 6. Twenty Years of Groundbreaking Science and Beyond! 7. Workshop Summaries from the 2010 APS/EMC Users Meeting Available Online 8. New APSUO Members Elected 9. NUFO Report BRIEFLY NOTED -- First North American Core Shell Spectroscopy Conference: August 2-6, 2010 -- The 10th International Conference on X-ray Microscopy: August 15-20, 2010 -- Short Course on High Pressure Synchrotron Techniques: September 15-18, 2010 -- 16th Pan-American Synchrotron Radiation Instrumentation Conference:

460

User account | OpenEI  

Open Energy Info (EERE)

User account User account Create new account Log in Request new password Account information Username: * Spaces are allowed; punctuation is not allowed except for periods, hyphens, and underscores. E-mail address: * A valid e-mail address. All e-mails from the system will be sent to this address. The e-mail address is not made public and will only be used if you wish to receive a new password or wish to receive certain news or notifications by e-mail. Confirm e-mail address: * Please re-type your e-mail address to confirm it is accurate. Password: * Confirm password: * Please choose a password for your account; it must be at least 6 characters. Personal information Name: * Business Phone: * The content of this field is kept private and will not be shown publicly. Word verification: * Type the characters you see in this picture. (verify

Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

User Manual 1 INTRODUCTION 3  

E-Print Network [OSTI]

AoC Admin User Manual #12;2 Contents 1 INTRODUCTION 3 1.1 AGE OF COMPUTERS HISTORY 3 1.2 AOC ADMIN 3 1.3 AOC GAME OBJECTS 3 2 LOGIN 6 3 COMMON 7 3.1 MENU BAR 7 3.1.1 FILE 7 3.1.2 VIEW 8 3.1.3 HELP 8 a short introduction to Age of Computers, AoC Admin and the objects used throughout these applications

Natvig, Lasse

462

Fifteenth LAMPF users group meeting  

SciTech Connect (OSTI)

The Fifteenth LAMPF Users Group Meeting was held November 2-3, 1981 at the Clinton P. Anderson Meson Physical Facility. The program of papers scheduled to be presented was amended to include a Report from Washington by Clarence R. Richardson, US Department of Energy. The general meeting ended with a round-table working group discussion concerning the Planning for a Kaon Factory. Individual items from the meeting were prepared separately for the data base.

Cochran, D.R.F. (comp.)

1982-03-01T23:59:59.000Z

463

Evaluating User Privacy in Bitcoin  

E-Print Network [OSTI]

Abstract. Bitcoin is quickly emerging as a popular digital payment system. However, in spite of its reliance on pseudonyms, Bitcoin raises a number of privacy concerns due to the fact that all of the transactions that take place are publicly announced in the system. In this paper, we investigate the privacy guarantees of Bitcoin in the setting where Bitcoin is used as a primary currency for the daily transactions of individuals. More specifically, we evaluate the privacy that is provided by Bitcoin (i) by analyzing the genuine Bitcoin system and (ii) through a simulator that faithfully mimics the operation of Bitcoin in the context where Bitcoin is used for all transactions within a university. In this setting, our results show that the profiles of almost 40 % of the users can be, to a large extent, recovered even when users adopt privacy measures recommended by Bitcoin. To the best of our knowledge, this is the first work that comprehensively analyzes, and evaluates the privacy implications of Bitcoin. As a by-product, we have designed and implemented the first simulator of Bitcoin; our simulator can be used to model the interaction between Bitcoin users in generic settings. 1

Elli Androulaki; Ghassan O. Karame; Marc Roeschlin; Tobias Scherer

464

Dynamic user profiles for web personalisation  

Science Journals Connector (OSTI)

Abstract Web personalisation systems are used to enhance the user experience by providing tailor-made services based on the users interests and preferences which are typically stored in user profiles. For such systems to remain effective, the profiles need to be able to adapt and reflect the users changing behaviour. In this paper, we introduce a set of methods designed to capture and track user interests and maintain dynamic user profiles within a personalisation system. User interests are represented as ontological concepts which are constructed by mapping web pages visited by a user to a reference ontology and are subsequently used to learn short-term and long-term interests. A multi-agent system facilitates and coordinates the capture, storage, management and adaptation of user interests. We propose a search system that utilises our dynamic user profile to provide a personalised search experience. We present a series of experiments that show how our system can effectively model a dynamic user profile and is capable of learning and adapting to different user browsing behaviours.

Ahmad Hawalah; Maria Fasli

2015-01-01T23:59:59.000Z

465

2008/2009 NERSC User Survey Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

8/2009 User Survey Results 8/2009 User Survey Results Show All | 1 2 3 4 5 ... 9 | Next » 2008/2009 User Survey Results Table of Contents Response Survey Respondent Demographics Overall Satisfaction and Importance All Satisfaction and Importance Ratings Hardware Resources Software HPC Consulting Services and Communications Comments Response Survey Many thanks to the 421 users who responded to this year's User Survey. The response rate is comparable to last year's and both are significantly increased from previous years: 77.4 percent of users who had used more than 250,000 XT4-based hours when the survey opened responded 36.6 percent of users who had used between 10,000 and 250,000 XT4-based hours responded The overall response rate for the 3,134 authorized users during the survey period was 13.4%.

466

2007/2008 NERSC User Survey Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

7/2008 User Survey Results 7/2008 User Survey Results Show All | 1 2 3 4 5 ... 10 | Next » 2007/2008 User Survey Results Table of Contents Response Summary Overall Satisfaction and Importance All Satisfaction, Importance and Usefulness Ratings Hardware Resources Software Visualization and Data Analysis HPC Consulting Services and Communications Web Interfaces Comments about NERSC Response Summary Many thanks to the 467 users who responded to this year's User Survey. The response rate has significantly increased from previous years: 70 percent of users who had used more than 1 million MPP hours when the survey opened responded 43 percent of users who had used between 10,000 and 1 million MPP hours responded The overall response rate for the 2,804 authorized users during the survey period was 16.3%.

467

User Financial Accounts | Stanford Synchrotron Radiation Lightsource  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Financial Accounts Financial Accounts Why Have a User Financial Account? Each user group should establish a user financial account to procure gases, chemicals, supplies or services to support your experiment at SLAC's user facilities and to send samples, dewars, or other equipment between SLAC and your institution. Establishing/Renewing a User Financial Account The most common method of establishing or renewing a user financial account is by providing a purchase order (PO) (or a letter from the financial officer of the user institution). The PO should be made to SLAC National Accelerator Laboratory for the amount of estimated expenditures (the suggested minimum is $1,000). The PO should include the expiration date, user names, funding agency, grant/contract number and whether expenditures

468

A linguistic approach to user interface design  

Science Journals Connector (OSTI)

... 2001 Elsevier Science B.V. All rights...Articles A linguistic approach to user interface...User Interface Management Systems 1992 Morgan-Kaufman...object-oriented approach to distributed data management, The Journal of Systems......

Rumen Dimov Andreev

2001-05-01T23:59:59.000Z

469

New User Training: July 15, 2014  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Training New User Training: July 15, 2014 July 15, 2014 NERSC will present a three-hour training for new users on July 15, 2014 from 09:00 to 12:00 PDT. This event is targeted to...

470

New User Training: July 15, 2014  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Training: 10302014 New User Training: October 30, 2014 October 30, 2014 NERSC will present a three-hour training for new users on October 30, 2014 from 09:00 to 12:00 PDT. This...

471

User:Harris | Open Energy Information  

Open Energy Info (EERE)

Harris Jump to: navigation, search Name harris Location Houston, Texas Edits 2 Friends User Edits DWC Bot 12006 Retrieved from "http:en.openei.orgwindex.php?titleUser:Harris&o...

472

MEASURING USER MOUNIA LALMAS, YAHOO! LABS  

E-Print Network [OSTI]

-of-brand-engagement-on-pinterest-come-from-users/ 51032/ http://iactionable.com/user-engagement/ http://www.cio.com.au/article/459294/ heart_foundation_uses_gamification

Lalmas, Mounia

473

Direct Combination: A New User Interaction  

Science Journals Connector (OSTI)

Direct Combination (DC) is a recently introduced user interaction principle. The principle (previously applied to desktop computing) can greatly reduce the degree of search, time, and attention required to operate user interfaces. We argue that Direct ...

Simon Holland; David R. Morse; Henrik Gedenryd

2002-09-01T23:59:59.000Z

474

User:Joebloggs | Open Energy Information  

Open Energy Info (EERE)

search Doofenshmirtz biteguard.png Name Joe Bloggs Location World Edits 3 This is a test user from someone on the OpenEI team. This user will simulate various spam to make sure...

475

NIF and Jupiter User Group Meeting 2015  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

5 Registration Opens November 21, 2014 Information on the NIF User Facility About the NIF and Jupiter Laser Facility User Group Meeting The NIF and Jupiter Laser Facility (JLF)...

476

National Library of Energy : User Account  

Office of Scientific and Technical Information (OSTI)

Create User Account User Name: Email Address: I want to: Always receive emails Receive emails if there are new results Never receive emails Email Format: HTML Text New Password:...

477

Managing Your User Account at NERSC  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Managing Managing Your Account Managing Your User Account Use the NERSC Information Management (NIM) system to customize your user account and keep your personal information up-to-date. See the NIM User's Guide, especially the "Managing Your User Account with NIM" section. Applying for your first NERSC Allocation Starting a new Allocation Request Renewing an Allocation Request Tips and Instructions for Filling out Allocation Request Form

Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

User:Nmatin | Open Energy Information  

Open Energy Info (EERE)

Nmatin Jump to: navigation, search Retrieved from "http:en.openei.orgwindex.php?titleUser:Nmatin&oldid658628"...

482

DOE Program Offers Participants Unique Opportunity to Gain Carbon Capture  

Broader source: Energy.gov (indexed) [DOE]

Program Offers Participants Unique Opportunity to Gain Carbon Program Offers Participants Unique Opportunity to Gain Carbon Capture and Storage Knowledge DOE Program Offers Participants Unique Opportunity to Gain Carbon Capture and Storage Knowledge February 8, 2011 - 12:00pm Addthis Washington, DC - Future leaders and innovators in the area of carbon capture and storage (CCS) can gain a unique and intensive tutorial on the subject by participating in the U.S. Department of Energy's (DOE) Research Experience in Carbon Sequestration (RECS) program. Supported by the Office of Fossil Energy (FE), the program for graduate students and early career professionals is currently accepting applications for RECS 2011, scheduled for June 5-15, in Birmingham, AL, and the deadline to apply is April 15. An intensive science-based program, RECS 2011 will combine classroom

483

Gain scheduling for geometrically nonlinear flexible space structures  

E-Print Network [OSTI]

A gain-scheduling approach for the control of geometrically nonlinear structures is developed. The objective is to improve performance over current linear design techniques that are applied to the same control problem. The ...

Yung, Jeremy Hoyt, 1971-

2002-01-01T23:59:59.000Z

484

GAINS An Interactive Tool for Assessing International GHG Mitigation Regimes  

Science Journals Connector (OSTI)

Mitigating greenhouse gases (GHGs) is key to reducing the long-term impacts of climate change. In this paper we present the GAINS system, i.e. a data warehouse with an online integrated assessment model that is a...

Thanh Binh Nguyen; Fabian Wagner

2011-01-01T23:59:59.000Z

485

Mechanisms of intron gain and loss in Cryptococcus  

E-Print Network [OSTI]

Background: Genome comparisons across deep phylogenetic divergences have revealed that spliceosomal intron gain and loss are common evolutionary events. However, because of the deep divergences involved in these comparisons, ...

Neafsey, Daniel E.

486

Speech waveform encoding using contour gain vector quantization  

E-Print Network [OSTI]

SPEECH WAVEFORM ENCODING USING CONTOUR GAIN VECTOR QUANTIZATION A Thesis by KEVIN THOMAS MALONE Submitted to the Graduate College of Texas A k M University in partial fulfillment of the requirement for the degree of MASTER OF SCIENCE May... 1985 Major Subject: Electrical Engineering SPEECH WAVEFORM ENCODING USING CONTOUR GAIN VECTOR QUANTIZATION A Thesis by KEVIN THOMAS MALONE Approved as to style and content by: Thomas R. Fischer (Chairman of Committee) Noel R. Strader (Member...

Malone, Kevin Thomas

2012-06-07T23:59:59.000Z

487

Optical Filter Design: Gain Analysis and Tolerance Analysis  

E-Print Network [OSTI]

OPTICAL FILTER DESIGN: GAIN ANALYSIS AND TOLERANCE ANALYSIS A Thesis by VIVEK VANDRASI Submitted to the O ce of Graduate Studies of Texas A&M University in partial ful llment of the requirements for the degree of MASTER OF SCIENCE August... 2010 Major Subject: Electrical Engineering OPTICAL FILTER DESIGN: GAIN ANALYSIS AND TOLERANCE ANALYSIS A Thesis by VIVEK VANDRASI Submitted to the O ce of Graduate Studies of Texas A&M University in partial ful llment of the requirements...

Vandrasi, Vivek

2011-10-21T23:59:59.000Z

488

IDAHO WATER USER RECOMMENDATIONS MAINSTEM PLAN  

E-Print Network [OSTI]

IDAHO WATER USER RECOMMENDATIONS ON THE MAINSTEM PLAN COLUMBIA RIVER BASIN FISH AND WILDLIFE PROGRAM SUBMITTED ON BEHALF OF THE COMMITTEE OF NINE AND THE IDAHO WATER USERS ASSOCIATION JUNE 15, 2001 and Flow Augmentation Policy in the Columbia River Basin #12;1 IDAHO WATER USER RECOMMENDATIONS

489

New recommended heat gains for commercial cooking equipment  

SciTech Connect (OSTI)

Radiant heat gain from cooking equipment can significantly impact the air-conditioning load and/or human comfort in a commercial kitchen. This paper presents and discusses updated heat gain data for several types of commercial cooking equipment based on recent testing by gas and electric utility research organizations. The cooking equipment was tested under exhaust-only, wall-canopy hoods. The fundamentals of appliance heat gain are reviewed and the new data are compared with data published in the 1993 ASHRAE Handbook--Fundamentals, chapter 26, nonresidential cooling and heating load calculations. These updated data are now incorporated in the 1997 ASHRAE Handbook--Fundamentals, chapter 28, nonresidential cooling and heating load calculations. The paper also discusses appliance heat gain with respect to sizing air-conditioning systems for commercial kitchens and presents representative radiant factors that may be used to estimate heat gain from other sizes or types of gas and electric cooking equipment when appliance specific heat gain data are not avoidable.

Fisher, D.R. [Fisher Consultants, Danville, CA (United States)

1998-12-31T23:59:59.000Z

490

Manufactured Home Energy Audit user`s manual  

SciTech Connect (OSTI)

The Manufactured Home Energy Audit (MHEA) is a software tool that predicts manufactured home energy consumption and recommends weatherization retrofit measures. It was developed to assist local weatherization agencies working with the US Department of Energy (DOE) Weatherization Assistance Program. Whether new or experienced, employed within or outside the Weatherization Assistance Program, all users can benefit from incorporating MHEA into their manufactured home weatherization programs. DOE anticipates that the state weatherization assistance programs that incorporate MHEA into their programs will find significant growth in the energy and cost savings achieved from manufactured home weatherization. The easy-to-use MHEA displays a colorful, graphical interface for entering simple inputs and provides understandable, usable results. The user enters information about the manufactured home construction, heating equipment, cooling equipment, and weather site. MHEA then calculates annual energy consumption using a simplified building energy analysis technique. MHEA stands apart from other building energy analysis tools in many ways. Calculations incorporated into the computer code specifically address manufactured home heating and cooling load trends. The retrofit measures evaluated by MHEA are all applicable to manufactured homes. Help messages describe common manufactured home weatherization practices as well as provide hints on how to install retrofit measures. These and other features help make MHEA easy to use when evaluating energy consumption and the effects of weatherization retrofit measures for manufactured homes.

NONE

1997-09-01T23:59:59.000Z

491

User's guide to DOE facilities  

SciTech Connect (OSTI)

The Department of Energy's research laboratories represent valuable, often unique, resources for university and industrial scientists. It is DOE policy to make these laboratories and facilities available to qualified scientists. The answers to such questions as who are eligible, what and where are the facilities, what is the cost, when can they be used, are given. Data sheets are presented for each facility to provide information such as location, user contact, description of research, etc. A subject index refers to areas of research and equipment available.

Not Available

1984-01-01T23:59:59.000Z

492

MRDAP User/Developer Documentation  

SciTech Connect (OSTI)

The Multi-Reactor Design and Analysis Platform (MRDAP) is designed to simplify the creation, transfer and processing of data between computational codes. MRDAP accomplishes these objectives with three parts: 1. allows each integrated code, through a plugin, to specify the required input for execution and the required output needed, 2. creates an interface for execution and data transfer, 3. enables the creation of Graphical User Interfaces (GUI) to assist with input preparation and data visualization. Ultimately, the main motivation of this work is to enable analysts (who perform reactor physics calculations routinely), by providing a tool that increases efficiency and minimizes the potential for errors or failed executions.

Joshua Cogliati; Michael Milvich

2009-09-01T23:59:59.000Z

493

DOE's BestPractices Steam End User Training Steam End User Training  

E-Print Network [OSTI]

DOE's BestPractices Steam End User Training Steam End User Training Navigational Tutorial - 1 8/27/2010 Steam End User Training Navigational Tutorial Module Slide 1 ­ Introduction Hello, and welcome to the Steam End User Training. I would like to take a few minutes to show you how to navigate through

Oak Ridge National Laboratory

494

DOE's BestPractices Steam End User Training Steam End User Training  

E-Print Network [OSTI]

DOE's BestPractices Steam End User Training Steam End User Training Introduction Module - 1 8/27/2010 Steam End User Training Introduction Module Slide 1 - Introduction Title Page Hello, and welcome to the Steam System End User training. In this training, we will investigate how to assess, evaluate

Oak Ridge National Laboratory

495

SLAC Linac Coherent Light Source User Site  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Welcome to the LCLS User Resources Site Welcome to the LCLS User Resources Site User Portal | Agreements | Data Collection & Analysis | Logistics | Policies | Proposals | Safety | Schedules | Shipping The Linac Coherent Light Source (LCLS) encourages scientists from diverse fields to submit proposals for experiments that utilize the LCLS's unique capabilities. Interested scientists are encouraged to learn more about the latest developments by contacting LCLS staff scientists and by reviewing the instrument descriptions. Step-By-Step Instructions to Working at LCLS Review LCLS Policies Review Machine FAQ & Parameters Register and Submit Proposals Confirm User Agreement Reserve Accommodations Complete Safety Training Request Computer Account Establish User Account Ship Samples/Equipment Review Check-in Procedures

496

SLAC Linac Coherent Light Source User Site  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Schedules Schedules Schedule of Experiments for the Current Run | User Support Requests | Changes to the Operating Schedule LCLS Operations Schedules Step-By-Step Instructions to Working at LCLS Review LCLS Policies Review Machine FAQ & Parameters Register at User Portal Confirm User Agreement Reserve Accommodations Complete Safety Training Request Computer Account Establish User Account Ship Samples/Equipment Review Check-in Procedures Provide Feedback Inform us of Publications Participate in LCLS Users' Organization Tentative Long-Range Operating Plans Experiments Scheduled March to August 2014 Experiments Scheduled July 2013 to March 2014 Experiments Scheduled January to July 2013 Experiments Scheduled June to December 2012 Experiments Scheduled November 2011 to May 2012

497

Software Quality Engineering: The Leverage for Gaining Maturity  

Science Journals Connector (OSTI)

For users, a software product frequently corresponds to a black box that must effectively support their business processes. Consequently, what a stakeholder seeks is a software product that possesses both require...

Witold Suryn

2008-01-01T23:59:59.000Z

498

Microsoft Word - NSRC precompetitive User Agreement amended 1...  

Broader source: Energy.gov (indexed) [DOE]

NSRC precompetitive User Agreement amended 1-18-07.doc Microsoft Word - NSRC precompetitive User Agreement amended 1-18-07.doc Microsoft Word - NSRC precompetitive User Agreement...

499

Office of Science User Facilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Office of Science User Facilities Office of Science User Facilities This presentation summarizes the information on the Office of Science User Facilities, which was given during...

500

Help:Blocking users | Open Energy Information  

Open Energy Info (EERE)

Blocking users Blocking users Jump to: navigation, search Blocking users is an action that sysops can perform upon users or IP addresses to prevent them from editing the wiki. Contents 1 Blocking 2 Unblocking 3 What it means to be blocked 4 See Also Blocking Blocking users is fairly straightforward, visit Special:BlockIP and follow these steps: IP Address or username: Enter in the username, IP address, or IP range to block in the "User" field. If blocking a username, make sure to check the spelling since nonexistent users can be blocked as well. Instead of typing this information in manually, it is also possible to click on a "block" link in recent changes, contributions pages, or history pages, which will automatically fill in this field with the appropriate username