Powered by Deep Web Technologies
Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated 2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates February 28, 2012 - 8:45am Addthis PROBLEM: A vulnerability was reported in PostgreSQL. PLATFORM: Version(s): prior to 8.3.18, 8.4.11, 9.0.7, 9.1.3 ABSTRACT: A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases. reference LINKS: Vendor Advisory Security Tracker ID 1026744 CVE-2012-0866 IMPACT ASSESSMENT: Medium Discussion: For trigger functions marked SECURITY DEFINER, a remote authenticated user can execute a trigger function and gain elevated privileges CVE-2012-0866.

2

U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

84: Cisco Digital Media Manager Lets Remote Authenticated Users 84: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges January 19, 2012 - 9:00am Addthis PROBLEM: A remote authenticated user can gain elevated privileges on the target system. PLATFORM: Cisco Digital Media Manager: Version(s) 5.22 and prior, 5.2.3 ABSTRACT: The system does not properly validate unreferenced URLs. REFERENCE LINKS: Vendor Advisory SecurityTracker Alert ID: 1026541 CVE-2012-0329 IMPACT ASSESSMENT: medium Discussion: Cisco Show and Share is not directly affected by this vulnerability, but a user can exploit the Cisco Digital Media Manager to gain full access to Cisco Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port

3

U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Cisco Digital Media Manager Lets Remote Authenticated Users 4: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges January 19, 2012 - 9:00am Addthis PROBLEM: A remote authenticated user can gain elevated privileges on the target system. PLATFORM: Cisco Digital Media Manager: Version(s) 5.22 and prior, 5.2.3 ABSTRACT: The system does not properly validate unreferenced URLs. REFERENCE LINKS: Vendor Advisory SecurityTracker Alert ID: 1026541 CVE-2012-0329 IMPACT ASSESSMENT: medium Discussion: Cisco Show and Share is not directly affected by this vulnerability, but a user can exploit the Cisco Digital Media Manager to gain full access to Cisco Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port

4

T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP Virtual Server Environment Lets Remote Authenticated 8: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges April 22, 2011 - 7:47am Addthis PROBLEM: A vulnerability was reported in HP Virtual Server Environment. A remote authenticated user can obtain elevated privileges on the target system. PLATFORM: HP Virtual Server Environment prior to v6.3 ABSTRACT: A potential security vulnerability has been identified in HP Virtual Server Environment for Windows. The vulnerability could be exploited remotely to elevate privileges. reference LINKS: HP Document ID: c02749050 SecurityTracker Alert ID: 1025429 CVE-2011-1724 HP Insight Software media set 6.3 HP Technical Knowledge Base Discussion: System management and security procedures must be reviewed frequently to

5

U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the target system. A remote authenticated user can execute SQL commands on the underlying database. A remote user can spoof connections in certain cases. Solution: The vendor has...

6

V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: RSA Authentication Agent Lets Remote Users Bypass 3: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements March 4, 2013 - 12:27am Addthis PROBLEM: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements PLATFORM: RSA Authentication Agent 7.1, 7.1.1 for Microsoft Windows ABSTRACT: A vulnerability was reported in RSA Authentication Agent. REFERENCE LINKS: RSA SecurCare SecurityTracker Alert ID: 1028230 CVE-2013-0931 IMPACT ASSESSMENT: Medium DISCUSSION: On systems configured for Quick PIN Unlock, the system will request a PIN instead of a full Passcode when the session is activated from an active screensaver after the Quick PIN Unlock timeout has expired. RSA Authentication Agent on Windows Vista, Windows 7, Windows 2008, and

7

User Authentication Policy | Argonne Leadership Computing Facility  

NLE Websites -- All DOE Office Websites (Extended Search)

Eureka / Gadzooks Eureka / Gadzooks Policies Pullback Policy ALCF Acknowledgment Policy Account Sponsorship & Retention Policy Accounts Policy Data Policy INCITE Quarterly Report Policy Job Scheduling Policy on BG/P Job Scheduling Policy on BG/Q Refund Policy Software Policy User Authentication Policy Documentation Feedback Please provide feedback to help guide us as we continue to build documentation for our new computing resource. [Feedback Form] User Authentication Policy Users of the Argonne production systems are required to use a CRYPTOCard one time password, multifactor authentication system. This document explains the policies users must follow regarding CRYPTOCard tokens for accessing the Argonne resources. MultiFactor Authentication "Authentication systems are frequently described by the authentication

8

Quantum Key Distribution Protocol with User Authentication  

E-Print Network (OSTI)

We propose a quantum key distribution protocol with quantum based user authentication. User authentication is executed by validating the correlation of GHZ states. Alice and Bob can distribute a secure key using the remaining GHZ states after authentication. This secret key does not leak even to the arbitrator by the properties of the entanglement. We will show that our protocol is secure against the cloning attack.

Lee, H; Lee, D; Lim, J; Yang, H J; Lee, Hwayean; Lee, Sangjin; Lee, Donghoon; Lim, Jongin; Yang, HyungJin

2005-01-01T23:59:59.000Z

9

V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache VCL Input Validation Flaw Lets Remote Authenticated 0: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges May 7, 2013 - 12:01am Addthis PROBLEM: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges PLATFORM: Apache VCL Versions: 2.1, 2.2, 2.2.1, 2.3, 2.3.1 ABSTRACT: A vulnerability was reported in Apache VCL. REFERENCE LINKS: Apache Securelist SecurityTracker Alert ID: 1028515 CVE-2013-0267 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated administrative user with minimal administrative privileges (i.e., nodeAdmin, manageGroup, resourceGrant, or userGrant) can send specially crafted data via the web interface or XMLRPC API to gain additional administrative privileges.

10

T-608: HP Virtual Server Environment Lets Remote Authenticated...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated...

11

Challenges and architectural approaches for authenticating mobile users  

Science Conference Proceedings (OSTI)

This paper casts an architectural eye at existing work on security and privacy in mobile computing. Specifically, it focuses on authentication as it leads up to access control from two points of view: servicer providers granting access to users, and ... Keywords: access control, anonymity, authentication, mobile computing, trust, ubiquitous computing, user mobility

Joăo Pedro Sousa

2008-05-01T23:59:59.000Z

12

V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Barracuda SSL VPN Bug Lets Remote Users Bypass 7: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication January 25, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Barracuda SSL VPN. PLATFORM: The vulnerability has been verified to exist in Barracuda SSL VPN version 2.2.2.203 ABSTRACT: A remote user can gain administrative access to the target system. REFERENCE LINKS: SecurityTracker Alert ID: 1028039 Barracuda Networks Advisory IMPACT ASSESSMENT: High DISCUSSION: A remote user can set a specially crafted Java system property (via 'setSysProp.jsp') to bypass access restrictions and gain access to the API functionality. This can be exploited to download configuration files, download database dumps, shutdown the system, and set new administrative

13

V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apache Tomcat FORM Authenticator Lets Remote Users Conduct 5: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks May 14, 2013 - 12:08am Addthis PROBLEM: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks PLATFORM: Tomcat 6.0.21 to 6.0.36, 7.0.0 to 7.0.32 ABSTRACT: A vulnerability was reported in Apache Tomcat. REFERENCE LINKS: Apache Tomcat SecurityTracker Alert ID: 1028534 CVE-2013-2067 IMPACT ASSESSMENT: High DISCUSSION: A remote user can repeatedly send a specially crafted request for a resource requiring authentication while the target user is completing the login form to cause the FORM authentication process to execute the remote user's request with the privileges of the target user.

14

U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: JBoss Operations Network LDAP Authentication Bug Lets Remote 0: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication March 21, 2012 - 7:00am Addthis PROBLEM: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication PLATFORM: JBoss Operations Network 2.x ABSTRACT: A vulnerability was reported in JBoss Operations Network. A remote user can login with an arbitrary password in certain cases. reference LINKS: SecurityTracker Alert ID: 1026826 Secunia Advisory SA48471 CVE-2012-1100 IMPACT ASSESSMENT: Medium Discussion: The vulnerability is caused due to an error within the Lightweight Directory Access Protocol (LDAP) authentication when handling invalid bind account credentials, which can be exploited to log-in to LDAP-based

15

V-195: RSA Authentication Manager Lets Local Users View the Administrative  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

95: RSA Authentication Manager Lets Local Users View the 95: RSA Authentication Manager Lets Local Users View the Administrative Account Password V-195: RSA Authentication Manager Lets Local Users View the Administrative Account Password July 9, 2013 - 12:51am Addthis PROBLEM: RSA Authentication Manager Lets Local Users View the Administrative Account Password PLATFORM: RSA Authentication Manager 7.1, 8.0 ABSTRACT: A vulnerability was reported in RSA Authentication Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1028742 CVE-2013-3273 RSA IMPACT ASSESSMENT: Medium DISCUSSION: When the RSA Authentication Manager Software Development Kit (SDK) is used to develop a custom application that connects with RSA Authentication Manager and the trace logging is set to verbose, the administrative account password used by the custom application is written in clear text to trace

16

V-063: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Adobe ColdFusion Bugs Let Remote Users Gain Access and 3: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information V-063: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information January 7, 2013 - 1:00am Addthis PROBLEM: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information PLATFORM: ColdFusion 10, 9.0.2, 9.0.1 and 9.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe has identified three vulnerabilities affecting ColdFusion for Windows, Macintosh and UNIX REFERENCE LINKS: Adobe Security Bulletin APSA13-01 SecurityTracker Alert ID: 1027938 CVE-2013-0625 CVE-2013-0629 CVE-2013-0631 IMPACT ASSESSMENT: High DISCUSSION: A remote user can bypass authentication and take control of the target system [CVE-2013-0625]. Systems with password protection disabled or with no password set are affected.

17

U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apache CXF Lets Remote Authenticated Users Execute 6: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions September 24, 2012 - 6:00am Addthis PROBLEM: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions PLATFORM: This vulnerability affects all released versions of Apache CXF. ABSTRACT: A vulnerability was reported in Apache CXF reference LINKS: SecurityTracker Alert ID: 1027554 Apache CXF Security Advisories Apache CXF Advisory - CVE-2012-3451 CVE-2012-3451 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache CXF. A remote authenticated user can execute unauthorized commands on the target web service. Impact: A remote authenticated user can execute potentially unauthorized actions on

18

U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apache CXF Lets Remote Authenticated Users Execute 6: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions September 24, 2012 - 6:00am Addthis PROBLEM: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions PLATFORM: This vulnerability affects all released versions of Apache CXF. ABSTRACT: A vulnerability was reported in Apache CXF reference LINKS: SecurityTracker Alert ID: 1027554 Apache CXF Security Advisories Apache CXF Advisory - CVE-2012-3451 CVE-2012-3451 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache CXF. A remote authenticated user can execute unauthorized commands on the target web service. Impact: A remote authenticated user can execute potentially unauthorized actions on

19

V-223: RSA Authentication Agent for PAM Allows Remote Users to Make  

NLE Websites -- All DOE Office Websites (Extended Search)

3: RSA Authentication Agent for PAM Allows Remote Users to Make 3: RSA Authentication Agent for PAM Allows Remote Users to Make Unlimited Login Attempts V-223: RSA Authentication Agent for PAM Allows Remote Users to Make Unlimited Login Attempts August 21, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in RSA Authentication Agent for PAM PLATFORM: RSA Authentication Agent for PAM 7.0.2 and prior ABSTRACT: A remote user can make unlimited login attempts REFERENCE LINKS: Security Tracker Alert ID 1028930 CVE-2013-3271 IMPACT ASSESSMENT: Medium DISCUSSION: The system does not restrict the number of login attempts made via the agent IMPACT: System Access SOLUTION: Vendor has issued a fix Addthis Related Articles U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability

20

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: RSA Adaptive Authentication Bugs Let Remote Users Bypass 1: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls December 14, 2011 - 8:17am Addthis PROBLEM: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may be able to bypass certain security controls. reference LINKS: SecurityTracker Alert ID: 1026420 Security Focus: ESA-2011-036 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA Adaptive Authentication (On-Premise). A remote user may be able to bypass certain security controls. A remote user can send specially crafted data elements to affect the Device

Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

704: RSA enVision Lets Remote Users View Files and Remote 704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password August 29, 2011 - 3:45am Addthis PROBLEM: Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT: RSA enVision lets remote users view files and remote authenticated users obtain password. reference LINKS: SecurityTracker Alert ID: 1025979 CVE-2011-2736 CVE-2011-2737 RSA enVision Product Security IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA enVision. A remote user can view files on the target system. A remote authenticated user can obtain

22

T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: RSA enVision Lets Remote Users View Files and Remote 4: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password August 29, 2011 - 3:45am Addthis PROBLEM: Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT: RSA enVision lets remote users view files and remote authenticated users obtain password. reference LINKS: SecurityTracker Alert ID: 1025979 CVE-2011-2736 CVE-2011-2737 RSA enVision Product Security IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA enVision. A remote user can view files on the target system. A remote authenticated user can obtain

23

V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-057: eXtplorer "ext_find_user()" Authentication Bypass V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis December 28 2012 - 6:00am PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory SA51636 eXtplorer 2.1.3 Security Release IMPACT ASSESSMENT: Medium DISCUSSION: eXtplorer was notified of a problem within the authentication system of eXtplorer Versions 2.1.2, 2.1.1, 2.1.0 and 2.1.0RC5 that have been found to be vulnerable to an authentication bypass bug.

24

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

25

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

26

V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

or userGrant) can send specially crafted data via the web interface or XMLRPC API to gain additional administrative privileges. IMPACT: A remote authenticated user can...

27

U-268: Oracle Database Authentication Protocol Discloses Session...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Bug Lets Remote Authenticated Users Gain Elevated Privileges V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code T-535: Oracle Critical Patch Update -...

28

U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

54: Webmin Flaws Let Remote Authenticated Users Execute 54: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files September 10, 2012 - 6:00am Addthis PROBLEM: Webmin Multiple Input Validation Vulnerabilities PLATFORM: The vulnerabilities are reported in version 1.580. Other versions may also be affected. ABSTRACT: An authenticated attacker may be able to execute arbitrary commands. reference LINKS: Webmin Security Alerts Bugtraq ID: 55446 Secunia Advisory SA50512 SecurityTracker Alert ID: 1027507 US CERT Vulnerability Note VU#788478 CVE-2012-2981 CVE-2012-2982 CVE-2012-2983 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities have been reported in Webmin, which can be exploited by malicious users to compromise a vulnerable system and by

29

T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: OpenLDAP back-ndb Lets Remote Users Authenticate Without a 5: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password March 11, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in OpenLDAP. A remote user can authenticate without a valid password. PLATFORM: Open LDAP version(s) 2.4.12 - 2.2.24 ABSTRACT: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password. reference LINKS: SecurityTracker Alert ID:1025190 Secunia Advisory:SA43331 OpenLDAP Issue OpenLDAP Download CVE-2011-1025 IMPACT ASSESSMENT: Medium Discussion: A remote user with knowledge of the target distinguished name can provide an arbitrary password to successfully authenticate on systems using the NDB back-end. Impact: Some vulnerabilities have been reported in OpenLDAP, which can be exploited

30

V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: eXtplorer "ext_find_user()" Authentication Bypass 7: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory SA51636 eXtplorer 2.1.3 Security Release IMPACT ASSESSMENT: Medium DISCUSSION: eXtplorer was notified of a problem within the authentication system of eXtplorer Versions 2.1.2, 2.1.1, 2.1.0 and 2.1.0RC5 that have been found to be vulnerable to an authentication bypass bug. IMPACT: An error within the "ext_find_user()" function in users.php can be

31

U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

System Multiple Vulnerabilities U-255: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code...

32

U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: McAfee Email Gateway Lets Remote Users Bypass Authentication 4: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks August 27, 2012 - 7:00am Addthis PROBLEM: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks PLATFORM: McAfee Email Gateway (MEG) 7.0.0 and 7.0.1 (MEG 6.7.x is NOT affected.) McAfee Email and Web Security (EWS) 5.6 Patch 3 and earlier McAfee Email and Web Security (EWS) 5.5 Patch 6 and earlier ABSTRACT: Several vulnerabilities were reported in McAfee Email Gateway. reference LINKS: McAfee Security Bulletin ID: SB10026 SecurityTracker Alert ID: 1027444

33

U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

44: McAfee Email Gateway Lets Remote Users Bypass Authentication 44: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks August 27, 2012 - 7:00am Addthis PROBLEM: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks PLATFORM: McAfee Email Gateway (MEG) 7.0.0 and 7.0.1 (MEG 6.7.x is NOT affected.) McAfee Email and Web Security (EWS) 5.6 Patch 3 and earlier McAfee Email and Web Security (EWS) 5.5 Patch 6 and earlier ABSTRACT: Several vulnerabilities were reported in McAfee Email Gateway. reference LINKS: McAfee Security Bulletin ID: SB10026 SecurityTracker Alert ID: 1027444

34

An efficient remote user authentication and key agreement protocol for mobile client-server environment from pairings  

Science Conference Proceedings (OSTI)

With the continue evaluation of mobile devices in terms of the capabilities and services, security concerns increase dramatically. To provide secured communication in mobile client-server environment, many user authentication protocols from pairings ... Keywords: Bilinear pairing, ID-based, Key agreement, Mobile device, Mutual authentication, Provable security

Debiao He

2012-08-01T23:59:59.000Z

35

U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

an authentication flaw and gain access to the target user's account CVE-2011-3416. A remote user can exploit a flaw in the handling of cached content when Forms Authentication...

36

V-101: McAfee VirusScan Enterprise Lets Local Users Gain Elevated...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ID: 1028209 IMPACT ASSESSMENT: Medium DISCUSSION: When Access Protection has been disabled, a local user can gain full control of the target application IMPACT: A local user...

37

U-092: Sudo Format String Bug Lets Local Users Gain Elevated...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Sudo Format String Bug Lets Local Users Gain Elevated Privileges U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges January 31, 2012 - 5:45am Addthis...

38

T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Red Hat Directory Server Bugs Let Local Users Gain Elevated 3: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service February 23, 2011 - 7:00am Addthis PROBLEM: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service. PLATFORM: Red Hat Directory Server v8 EL4, Red Hat Directory Server v8 EL5 ABSTRACT: Several vulnerabilities were reported in Red Hat Directory Server. A local user can obtain elevated privileges on the target system. A remote user can cause denial of service conditions. A local user can cause denial of service conditions. A remote user can send multiple simple paged search requests to cause the

39

U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0:HP Onboard Administrator Unspecified Flaw Lets Remote Users 0:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access October 13, 2011 - 8:15am Addthis PROBLEM: HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access PLATFORM: Onboard Administrator (OA) 3.21 through 3.31 ABSTRACT: A remote user can gain access to the target system reference LINKS: HP Support document ID: c03048779 SecurityTracker Alert ID: 1026158 CVE-2011-3155 IMPACT ASSESSMENT: Medium Discussion: A potential security vulnerability has been identified with HP Onboard Administrator (OA). The vulnerability could be exploited remotely to gain unauthorized access. Impact: A remote user can gain access to the target system. Solution: Onboard Administrator (OA) v3.32 is available.

40

U-194: Symantec LiveUpdate Administrator Lets Local Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Symantec LiveUpdate Administrator Lets Local Users Gain 4: Symantec LiveUpdate Administrator Lets Local Users Gain Elevated Privledges U-194: Symantec LiveUpdate Administrator Lets Local Users Gain Elevated Privledges June 19, 2012 - 7:00am Addthis PROBLEM: Symantec LiveUpdate Administrator Lets Local Users Gain Elevated Privileges . PLATFORM: Version(s): 2.3 and prior versions Abstract: Users Gain Elevated Privileges reference LINKS: Vendor Advisory SecurityTracker Alert ID: 1027182 CVE-2012-0304 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Symantec LiveUpdate Administrator. A local user can obtain elevated privileges on the target system.The default installation of Symantec LiveUpdate Administrator installs files with full control privileges granted to the 'Everyone' group.A local user can exploit

Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

U-040: HP-UX System Administration Manager Lets Local Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: HP-UX System Administration Manager Lets Local Users Gain 0: HP-UX System Administration Manager Lets Local Users Gain Elevated Privileges U-040: HP-UX System Administration Manager Lets Local Users Gain Elevated Privileges November 17, 2011 - 8:00am Addthis PROBLEM: HP-UX System Administration Manager Lets Local Users Gain Elevated Privileges. PLATFORM: HP-UX B.11.11, B.11.23, B.11.31; running Enterprise Mobility Suite (EMS) prior to A.04.20.11.04_01 ABSTRACT: A local user can obtain elevated privileges on the target system. reference LINKS: HP Support Center Document ID: c03089106 CVE-2011-4159 SecurityTracker Alert ID: 1026331 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP-UX System Administration Manager. A local user can obtain elevated privileges on the target system. A local user can gain full control of the target system.

42

U-040: HP-UX System Administration Manager Lets Local Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

40: HP-UX System Administration Manager Lets Local Users Gain 40: HP-UX System Administration Manager Lets Local Users Gain Elevated Privileges U-040: HP-UX System Administration Manager Lets Local Users Gain Elevated Privileges November 17, 2011 - 8:00am Addthis PROBLEM: HP-UX System Administration Manager Lets Local Users Gain Elevated Privileges. PLATFORM: HP-UX B.11.11, B.11.23, B.11.31; running Enterprise Mobility Suite (EMS) prior to A.04.20.11.04_01 ABSTRACT: A local user can obtain elevated privileges on the target system. reference LINKS: HP Support Center Document ID: c03089106 CVE-2011-4159 SecurityTracker Alert ID: 1026331 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP-UX System Administration Manager. A local user can obtain elevated privileges on the target system. A local user can gain full control of the target system.

43

V-101: McAfee VirusScan Enterprise Lets Local Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: McAfee VirusScan Enterprise Lets Local Users Gain Elevated 1: McAfee VirusScan Enterprise Lets Local Users Gain Elevated Privileges V-101: McAfee VirusScan Enterprise Lets Local Users Gain Elevated Privileges February 28, 2013 - 12:05am Addthis PROBLEM: McAfee VirusScan Enterprise Lets Local Users Gain Elevated Privileges PLATFORM: VSE 8.8 Patch 2 with Access Protection, including Self Protection, turned off ABSTRACT: A vulnerability was reported in McAfee VirusScan Enterprise. REFERENCE LINKS: McAfee Security Bulletins ID: SB10038 SecurityTracker Alert ID: 1028209 IMPACT ASSESSMENT: Medium DISCUSSION: When Access Protection has been disabled, a local user can gain full control of the target application IMPACT: A local user can obtain elevated privileges on the target system. SOLUTION: The vendor has issued a fix (8.8 Patch 2 with HF778101, 8.8 Patch 3)

44

V-101: McAfee VirusScan Enterprise Lets Local Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: McAfee VirusScan Enterprise Lets Local Users Gain Elevated 1: McAfee VirusScan Enterprise Lets Local Users Gain Elevated Privileges V-101: McAfee VirusScan Enterprise Lets Local Users Gain Elevated Privileges February 28, 2013 - 12:05am Addthis PROBLEM: McAfee VirusScan Enterprise Lets Local Users Gain Elevated Privileges PLATFORM: VSE 8.8 Patch 2 with Access Protection, including Self Protection, turned off ABSTRACT: A vulnerability was reported in McAfee VirusScan Enterprise. REFERENCE LINKS: McAfee Security Bulletins ID: SB10038 SecurityTracker Alert ID: 1028209 IMPACT ASSESSMENT: Medium DISCUSSION: When Access Protection has been disabled, a local user can gain full control of the target application IMPACT: A local user can obtain elevated privileges on the target system. SOLUTION: The vendor has issued a fix (8.8 Patch 2 with HF778101, 8.8 Patch 3)

45

U-056: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root 6: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root Privileges U-056: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root Privileges December 9, 2011 - 8:00am Addthis PROBLEM: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root Privileges. PLATFORM: Linux kernel ABSTRACT: A vulnerability was reported in the Linux Kernel. reference LINKS: The Linux Kernel Archives SecurityTracker Alert ID: 1026395 CVE-2011-4330 IMPACT ASSESSMENT: Medium Discussion: When a specially crafted Hierarchical File System (HFS) file system is mounted, a local user can to trigger a buffer overflow and execute arbitrary code on the target system with root privileges. The vulnerability resides in the hfs_mac2asc() function. Impact: A local user can obtain root privileges on the target system.

46

V-093: Symantec PGP Desktop Buffer Overflows Let Local Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Symantec PGP Desktop Buffer Overflows Let Local Users Gain 3: Symantec PGP Desktop Buffer Overflows Let Local Users Gain Elevated Privileges V-093: Symantec PGP Desktop Buffer Overflows Let Local Users Gain Elevated Privileges February 18, 2013 - 12:53am Addthis PROBLEM: Symantec PGP Desktop Buffer Overflows Let Local Users Gain Elevated Privileges PLATFORM: Symantec PGP Desktop 10.2.x,10.1.x,10.0.x Symantec Encryption Desktop 10.3.0 ABSTRACT: Two vulnerabilities were reported in Symantec PGP Desktop. REFERENCE LINKS: Symantec Security Advisory SYM13-001 Bugtraq ID: 57170 SecurityTracker Alert ID: 1028145 CVE-2012-4351 CVE-2012-4352 IMPACT ASSESSMENT: Medium DISCUSSION: A local user can trigger an integer overflow in 'pgpwded.sys' to execute arbitrary code on the target system [CVE-2012-4351]. On Windows XP and Windows Sever 2003, a local user can trigger a buffer

47

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

42: HP Onboard Administrator Bugs Let Remote Users Gain Access, 42: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks April 6, 2012 - 7:00am Addthis PROBLEM: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks PLATFORM: HP Onboard Administrator (OA) up to and including v3.32 ABSTRACT: A remote user can obtain potentially sensitive information. reference LINKS: HP Support Document ID: c03263573 SecurityTracker Alert ID: 1026889 CVE-2012-0128, CVE-2012-0129, CVE-2012-0130 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Onboard Administrator. A remote

48

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Onboard Administrator Bugs Let Remote Users Gain Access, 2: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks April 6, 2012 - 7:00am Addthis PROBLEM: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks PLATFORM: HP Onboard Administrator (OA) up to and including v3.32 ABSTRACT: A remote user can obtain potentially sensitive information. reference LINKS: HP Support Document ID: c03263573 SecurityTracker Alert ID: 1026889 CVE-2012-0128, CVE-2012-0129, CVE-2012-0130 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Onboard Administrator. A remote

49

T-671: Red Hat system-config-firewall Lets Local Users Gain Root Privileges  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Red Hat system-config-firewall Lets Local Users Gain Root 1: Red Hat system-config-firewall Lets Local Users Gain Root Privileges T-671: Red Hat system-config-firewall Lets Local Users Gain Root Privileges July 19, 2011 - 2:42pm Addthis PROBLEM: A vulnerability was reported in Red Hat system-config-firewall. A local user can obtain root privileges on the target system. PLATFORM Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server EUS (v. 6.1.z) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: Red Hat system-config-firewall Lets Local Users Gain Root Privileges reference LINKS: RHSA-2011:0953-1 SecurityTracker Alert ID: 1025793 CVE-2011-2520 Red hat Article ID: 11259 IMPACT ASSESSMENT: Medium Discussion: The system-config-firewall utility uses the Python pickle module in an

50

T-591: VMware vmrun Utility Lets Local Users Gain Elevated Privileges |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: VMware vmrun Utility Lets Local Users Gain Elevated 1: VMware vmrun Utility Lets Local Users Gain Elevated Privileges T-591: VMware vmrun Utility Lets Local Users Gain Elevated Privileges March 30, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in VMware. A local user can obtain elevated privileges on the target system. PLATFORM: VMware Workstation 6.5.5 and 7.1.3 and prior; VIX API for Linux 1.10.2 and prior ABSTRACT: The VMware vmrun utility is susceptible to a local privilege escalation in non-standard configurations. reference LINKS: VM Advisory ID:VMSA-2011-0006 Secunia Advisory: SA43885 SecurityTracker Alert ID: 1025270 CVE-2011-1126 VM Post IMPACT ASSESSMENT: Medium Discussion: A security issue has been reported in VMware Workstation, which can be exploited by malicious, local users to gain potentially escalated

51

V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP Service Manager Unspecified Flaw Lets Remote Users Gain 8: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access August 15, 2013 - 1:30am Addthis PROBLEM: A potential security vulnerability has been identified with HP Service Manager. The vulnerability could be exploited to allow remote unauthenticated access and elevation of privilege. PLATFORM: HP Service Manager v9.31, v9.30, v9.21, v7.11, v6.2.8 ABSTRACT: The vulnerabilities are reported in versions 9.31 and prior. REFERENCE LINKS: SecurityTracker Alert ID: 1028912 CVE-2013-4808 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in HP Service Manager. A remote user can gain unauthorized access on the target system. IMPACT: User access via network

52

V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP Service Manager Unspecified Flaw Lets Remote Users Gain 8: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access August 15, 2013 - 1:30am Addthis PROBLEM: A potential security vulnerability has been identified with HP Service Manager. The vulnerability could be exploited to allow remote unauthenticated access and elevation of privilege. PLATFORM: HP Service Manager v9.31, v9.30, v9.21, v7.11, v6.2.8 ABSTRACT: The vulnerabilities are reported in versions 9.31 and prior. REFERENCE LINKS: SecurityTracker Alert ID: 1028912 CVE-2013-4808 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in HP Service Manager. A remote user can gain unauthorized access on the target system. IMPACT: User access via network

53

U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated 8:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges December 23, 2011 - 8:45am Addthis PROBLEM: Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server AUS (v. 6.2) Red Hat Enterprise Linux Server EUS (v. 6.2.z) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: A local privileged user on the guest operating system can obtain elevated privileges on the target system. reference LINKS: Red Hat kernel security and bug fix update SecurityTracker Alert ID: 1026453 SecurityTracker Alert ID: 1026454

54

U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Sudo Format String Bug Lets Local Users Gain Elevated 2: Sudo Format String Bug Lets Local Users Gain Elevated Privileges U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges January 31, 2012 - 5:45am Addthis PROBLEM: A vulnerability was reported in Sudo. A local user can obtain elevated privileges on the target system. PLATFORM: Linux (Any) Version(s): 1.8.0 - 1.8.3p1 ABSTRACT: A local user can supply a specially crafted command line argument to trigger a format string flaw and execute arbitrary commands on the target system with root privileges. reference LINKS: CVE-2012-0809 SecurityTracker Alert ID: 1026600 Vendor Site IMPACT ASSESSMENT: Medium Discussion: The vulnerability resides in the sudo_debug() function in 'src/sudo.c'. This can be exploited by local users, regardless of whether they are listed

55

U-059: Blackberry PlayBook File Sharing Option Lets Local Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Blackberry PlayBook File Sharing Option Lets Local Users 9: Blackberry PlayBook File Sharing Option Lets Local Users Gain Elevated Privileges U-059: Blackberry PlayBook File Sharing Option Lets Local Users Gain Elevated Privileges December 13, 2011 - 6:00am Addthis PROBLEM: Blackberry PlayBook File Sharing Option Lets Local Users Gain Elevated Privileges. PLATFORM: BlackBerry PlayBook tablet software version 1.0.8.4985 and earlier ABSTRACT: A local user can obtain root privileges on the target tablet system. reference LINKS: SecurityTracker Alert ID:1026386 Vulnerability Summary for CVE-2011-0291 BlackBerry Technical Solution Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Blackberry PlayBook. A local user can obtain elevated privileges on the target system. On a tablet with File Sharing enabled and connected via USB to a system running BlackBerry

56

U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Configuration Manager Database Authentication Bypass Vulnerability V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control...

57

T-601: Windows Kernel win32k.sys Lets Local Users Gain Elevated Privileges  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

01: Windows Kernel win32k.sys Lets Local Users Gain Elevated 01: Windows Kernel win32k.sys Lets Local Users Gain Elevated Privileges T-601: Windows Kernel win32k.sys Lets Local Users Gain Elevated Privileges April 13, 2011 - 5:12am Addthis PROBLEM: Windows Kernel win32k.sys Lets Local Users Gain Elevated Privileges PLATFORM: Windows XP Service Pack 3, Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems, Windows Vista Service Pack 1 and Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 1 and Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2*, Windows Server 2008 for x64-based Systems

58

V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Linux Kernel Array Bounds Checking Flaw Lets Local Users 6: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges May 15, 2013 - 12:19am Addthis PROBLEM: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges PLATFORM: Version(s): 2.6.37 to 3.8.9 ABSTRACT: A vulnerability was reported in the Linux Kernel. REFERENCE LINKS: Linux Kernel SecurityTracker Alert ID: 1028565 CVE-2013-2094 IMPACT ASSESSMENT: Medium DISCUSSION: On systems compiled with PERF_EVENTS support, a local user can supply a specially crafted perf_event_open() call to execute arbitrary code on the target system with root privileges. The vulnerability resides in the perf_swevent_init() function in 'kernel/events/core.c'.

59

U-094: EMC Documentum Content Server Lets Local Administrative Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: EMC Documentum Content Server Lets Local Administrative 4: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges U-094: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges February 2, 2012 - 9:15am Addthis PROBLEM: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges PLATFORM: EMC Documentum Content Server 6.0, 6.5, 6.6 ABSTRACT: EMC Documentum Content Server contains a privilege elevation vulnerability that may allow an unauthorized user to obtain highest administrative privileges on the system. reference LINKS: SecurityTracker Alert ID: 1026624 EMC Resource Library CVE-2011-4144 bugtraq ESA-2012-009 IMPACT ASSESSMENT: Medium Discussion: EMC Documentum Content Server contains a security vulnerability that may allow a system administrator to elevate their or other users privileges to

60

U-178: VMware vMA Library Loading Error Lets Local Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: VMware vMA Library Loading Error Lets Local Users Gain 8: VMware vMA Library Loading Error Lets Local Users Gain Elevated Privileges U-178: VMware vMA Library Loading Error Lets Local Users Gain Elevated Privileges May 29, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in VMware vMA PLATFORM: Version(s): vMA 4.0, 4.1, 5 patch 1 (5.0.0.1) ABSTRACT: A local user can obtain elevated privileges on the target system. Reference Links: SecurityTracker Alert ID: 1027099 CVE-2012-2752 Vendor Advisory IMPACT ASSESSMENT: High Discussion: A local user can exploit a library loading error to cause arbitrary code to be executed on the target system with elevated privileges. Impact: Privilege escalation Solution: The vendor has issued a fix (vSphere Management Assistant 5.0 Patch 2 (5.0.0.2)). Addthis Related Articles T-591: VMware vmrun Utility Lets Local Users Gain Elevated Privileges

Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Local Users Gain Elevated Privileges 5: Apple iOS Bugs Let Local Users Gain Elevated Privileges V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges March 20, 2013 - 12:08am Addthis PROBLEM: Apple iOS Bugs Let Local Users Gain Elevated Privileges PLATFORM: Version(s): prior to 6.1.3 ABSTRACT: Several vulnerabilities were reported in Apple iOS REFERENCE LINKS: Apple security Article: HT1222 SecurityTracker Alert ID: 1028314 CVE-2013-0977 CVE-2013-0978 CVE-2013-0979 CVE-2013-0981 IMPACT ASSESSMENT: High DISCUSSION: A local user can exploit a flaw in the handling of Mach-O executable files with overlapping segments to execute unsigned code on the target system [CVE-2013-0977]. A local user can exploit a flaw in the ARM prefetch abort handling to determine the address of structures in the kernel [CVE-2013-0978].

62

V-220: Juniper Security Threat Response Manager Lets Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Juniper Security Threat Response Manager Lets Remote 0: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands V-220: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands August 17, 2013 - 4:01am Addthis PROBLEM: A remote authenticated user can execute arbitrary commands on the target system. PLATFORM: 2010.0, 2012.0, 2012.1, 2013.1 ABSTRACT: A vulnerability was reported in Juniper Security Threat Response Manager (STRM) REFERENCE LINKS: SecurityTracker Alert ID: 1028921 CVE-2013-2970 IMPACT ASSESSMENT: High DISCUSSION: A remote authenticated user can inject commands to execute arbitrary operating system commands with the privileges of the target web service. This can be exploited to gain shell access on the target device.

63

V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

property (via 'setSysProp.jsp') to bypass access restrictions and gain access to the API functionality. This can be exploited to download configuration files, download database...

64

V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-183: Cisco TelePresence TC and TE Bugs Let...

65

U-201: HP System Management Homepage Bugs Let Remote Users Deny...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service V-051: Oracle Solaris Java Multiple Vulnerabilities...

66

T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

OpenLDAP Issue OpenLDAP Download CVE-2011-1025 IMPACT ASSESSMENT: Medium Discussion: A remote user with knowledge of the target distinguished name can provide an arbitrary...

67

A New Wireless Channel Fade Duration Model for Exploiting Multi-User Diversity Gain and Its Applications  

Science Conference Proceedings (OSTI)

In this paper, we propose a theoretical framework to analyze the performance of upper layer algorithms and protocols such as scheduling disciplines which exploit the gain of multi-user diversity to optimize the utilization of wireless communication systems ...

Chengzhi Li; Hao Che; Sanqi Li; Dapeng Wu

2006-06-01T23:59:59.000Z

68

Towards practical anonymous password authentication  

Science Conference Proceedings (OSTI)

The conventional approach for anonymous password authentication incurs O(N) server computation, linear to the total number of users. In ACSAC'09, Yang et al. proposed a new approach for anonymous password authentication, breaking this lower ... Keywords: anonymity, guessing attack, password authentication

Yanjiang Yang; Jianying Zhou; Jun Wen Wong; Feng Bao

2010-12-01T23:59:59.000Z

69

Context-based authentication and transport of cultural assets  

Science Conference Proceedings (OSTI)

We present a ubiquitous system that combines context information, security mechanisms and a transport infrastructure to provide authentication and secure transport of works of art. Authentication is provided for both auctions and exhibitions, where users ... Keywords: Authentication, Ubiquitous systems

Leonardo Mostarda; Changyu Dong; Naranker Dulay

2010-05-01T23:59:59.000Z

70

V-199: Solaris Bugs Let Local Users Gain Root Privileges, Remote...  

NLE Websites -- All DOE Office Websites (Extended Search)

of service conditions A local user can obtain root privileges on the target system A remote user can partially access and modify data on the target system SOLUTION: Vendor...

71

V-063: Adobe ColdFusion Bugs Let Remote Users Gain Access and...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Gain Access and Obtain Information PLATFORM: ColdFusion 10, 9.0.2, 9.0.1 and 9.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe has identified three vulnerabilities affecting...

72

T-601: Windows Kernel win32k.sys Lets Local Users Gain Elevated...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

obtain elevated privileges on the target system. A local user can trigger a use-after free or null pointer dereference to execute arbitrary commands on the target system with...

73

V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote 1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service November 22, 2012 - 3:00am Addthis PROBLEM: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service PLATFORM: Version(s): XC10 2.0.0.0 - 2.0.0.3, 2.1.0.0 - 2.1.0.2 ABSTRACT: Several vulnerabilities were reported in IBM WebSphere DataPower. REFERENCE LINKS: IBM Security Bulletin SecurityTracker Alert ID: 1027798 CVE-2012-5758 CVE-2012-5759 CVE-2012-5756 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in IBM WebSphere DataPower. A remote

74

U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass 7: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative Access U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative Access August 29, 2012 - 6:00am Addthis PROBLEM: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative Access PLATFORM: EMC Cloud Tiering Appliance (CTA) 7.4 and prior EMC Cloud Tiering Appliance Virtual Edition (CTA/VE) 7.4 and prior EMC Cloud Tiering Appliance (CTA) 9.0 and prior EMC Cloud Tiering Appliance Virtual Edition (CTA/VE) 9.0 and prior ABSTRACT: A vulnerability was reported in EMC Cloud Tiering Appliance. reference LINKS: SecurityTracker Alert ID: 1027448 Bugtraq ID: 55250 EMC.com CVE-2012-2285 IMPACT ASSESSMENT:

75

V-231: Cisco Identity Services Engine Discloses Authentication Credentials  

NLE Websites -- All DOE Office Websites (Extended Search)

1: Cisco Identity Services Engine Discloses Authentication 1: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users V-231: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users August 30, 2013 - 3:01am Addthis PROBLEM: A vulnerability was reported in Cisco Identity Services Engine. A remote user can obtain authentication credentials. PLATFORM: Cisco Identity Services Engine (ISE) 1.x ABSTRACT: A vulnerability was reported in Cisco Identity Services Engine REFERENCE LINKS: SecurityTracker Alert ID: 1028965 CVE-2013-3471 IMPACT ASSESSMENT: Meduim DISCUSSION: A vulnerability was reported in Cisco Identity Services Engine. A remote user can obtain authentication credentials.The system stores the username and password of an authenticated user within hidden HTML form fields. A

76

U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA®  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: RSA® Authentication Agent 7.1 for Microsoft Windows® and 7: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability September 25, 2012 - 6:00am Addthis PROBLEM: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability PLATFORM: Product: RSA Authentication Agent for Microsoft Windows version 7.1 Platforms: Windows XP and Windows 2003 Product: RSA Authentication Client 3.5 Platforms: Windows XP and Windows 2003 ABSTRACT: RSA Authentication Agent Lets Remote Authenticated Users Bypass an Authentication Step reference LINKS: SecurityTracker Alert ID: 1027559 Bugtraq ID: 55662

77

An improved anonymous authentication and key exchange scheme  

Science Conference Proceedings (OSTI)

Nowadays, anonymity property of user authentication scheme becomes important. In 2003, Park et al. proposed an authentication and key exchange scheme using smart card. However, Juang et al. pointed out that Park et al.'s scheme did not provide the user ...

Kyung-kug Kim; Myung-Hwan Kim

2012-09-01T23:59:59.000Z

78

V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny 3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access June 21, 2013 - 6:00am Addthis PROBLEM: Three vulnerabilities were reported in Cisco TelePresence TC and TE PLATFORM: The following product models are affected by the vulnerabilities: Cisco TelePresence MX Series Cisco TelePresence System EX Series Cisco TelePresence Integrator C Series Cisco TelePresence Profiles Series running Cisco TelePresence Quick Set Series Cisco IP Video Phone E20 ABSTRACT: Cisco TelePresence TC and TE Software contain two vulnerabilities in the implementation of the Session Initiation Protocol (SIP) that could allow an

79

U-268: Oracle Database Authentication Protocol Discloses Session Key  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Oracle Database Authentication Protocol Discloses Session 8: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users September 26, 2012 - 6:00am Addthis PROBLEM: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users PLATFORM: Oracle Database 11g Releases 1 and 2 ABSTRACT: A vulnerability was reported in Oracle Database. reference LINKS: Darkreading Threatpost Arstechnica Oracle Security Alerts SecurityTracker Alert ID: 1027558 CVE-2012-3137 IMPACT ASSESSMENT: Medium Discussion: The authentication protocol in Oracle Database 11g 1 and 2 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to

80

U-268: Oracle Database Authentication Protocol Discloses Session Key  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Oracle Database Authentication Protocol Discloses Session 8: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users September 26, 2012 - 6:00am Addthis PROBLEM: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users PLATFORM: Oracle Database 11g Releases 1 and 2 ABSTRACT: A vulnerability was reported in Oracle Database. reference LINKS: Darkreading Threatpost Arstechnica Oracle Security Alerts SecurityTracker Alert ID: 1027558 CVE-2012-3137 IMPACT ASSESSMENT: Medium Discussion: The authentication protocol in Oracle Database 11g 1 and 2 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to

Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Robust secret key based authentication scheme using smart cards  

Science Conference Proceedings (OSTI)

User authentication is an important part of security, along with confidentiality and integrity, for systems that allow remote access over untrustworthy networks, like the Internet. Recently, Chen et al. proposed an improvement on the SAS-like password ... Keywords: authentication, cryptography, secret key, smart card

Eun-Jun Yoon; Kee-Young Yoo

2005-11-01T23:59:59.000Z

82

Authentication of byte sequences  

SciTech Connect

Algorithms for the authentication of byte sequences are described. The algorithms are designed to authenticate data in the Storage, Retrieval, Analysis, and Display (SRAD) Test Data Archive of the Radiation Effects and Testing Directorate (9100) at Sandia National Laboratories, and may be used in similar situations where authentication of stored data is required. The algorithms use a well-known error detection method called the Cyclic Redundancy Check (CRC). When a byte sequence is authenticated and stored, CRC bytes are generated and attached to the end of the sequence. When the authenticated data is retrieved, the authentication check consists of processing the entire sequence, including the CRC bytes, and checking for a remainder of zero. The error detection properties of the CRC are extensive and result in a reliable authentication of SRAD data.

Stearns, S.D.

1991-06-01T23:59:59.000Z

83

Mobile one-time passwords: two-factor authentication using mobile phones  

Science Conference Proceedings (OSTI)

Static password authentication has security drawbacks. In two-factor authentication (2FA,) each user carries a device, called token, to generate passwords that are valid only one time. 2FA based on one-time passwords (OTPs) provides improved protection ... Keywords: nested hashing chain, one-time password, two-factor authentication

Mohamed Hamdy Eldefrawy; Muhammad Khurram Khan; Khaled Alghathbar; Tai-Hoon Kim; Hassan Elkamchouchi

2012-05-01T23:59:59.000Z

84

@Yuan Xue (yuan.xue@vanderbilt.edu) Authentication Protocol  

E-Print Network (OSTI)

. If A trusts B and B is hacked, then the attacker could gain access to A. Network address impersonation (address spoofing) Ingress filtering #12;@Yuan Xue (yuan.xue@vanderbilt.edu) Cryptographic Authentication

Cui, Yi

85

U-201: HP System Management Homepage Bugs Let Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: HP System Management Homepage Bugs Let Remote Users Deny 1: HP System Management Homepage Bugs Let Remote Users Deny Service U-201: HP System Management Homepage Bugs Let Remote Users Deny Service June 28, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in HP System Management Homepage. PLATFORM: Version(s): prior to 7.1.1 ABSTRACT: The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code. Reference links: Original Advisory Security Tracker ID 1027209 CVE-2012-2012, CVE-2012-2013, CVE-2012-2014 CVE-2012-2015, CVE-2012-2016 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP System Management Homepage. A remote authenticated user can gain elevated privileges. A remote authenticated

86

T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: RSA Adaptive Authentication Has Unspecified Remote 6: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw August 18, 2011 - 3:09pm Addthis PROBLEM: A vulnerability was reported in RSA Adaptive Authentication. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3, 6.0.2.1 SP2 and SP2 Patch 1, 6.0.2.1 SP3 ABSTRACT: An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session. reference LINKS: Security Tracker: 1025956

87

Undercover: authentication usable in front of prying eyes  

Science Conference Proceedings (OSTI)

A number of recent scams and security attacks (phishing, spyware, fake terminals, ...) hinge on a crook's ability to observe user behavior. In this paper, we describe the design, implementation, and evaluation of a novel class of user authentication ... Keywords: multisensory processes, security, usability

Hirokazu Sasamoto; Nicolas Christin; Eiji Hayashi

2008-04-01T23:59:59.000Z

88

T-606: Sun Java System Access Manager Lets Remote Users Partially...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

06: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data T-606: Sun Java System Access Manager Lets Remote...

89

V-166: HP-UX Directory Server Discloses Passwords to Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP-UX Directory Server Discloses Passwords to Remote 6: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users V-166: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users May 29, 2013 - 12:32am Addthis PROBLEM: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users PLATFORM: Directory Server B.08.10.04 ABSTRACT: Two vulnerabilities were reported in HP-UX Directory Server. REFERENCE LINKS: HP Document ID: c03772083 SecurityTracker Alert ID: 1028593 CVE-2012-2678 CVE-2012-2746 IMPACT ASSESSMENT: High DISCUSSION: A local user can access the plaintext password in certain cases [CVE-2012-2678]. A remote authenticated user can can view the password for a target LDAP user when audit logging is enabled by reading the audit log [CVE-2012-2678].

90

U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: RSA Authentication Manager Flaws Permit Cross-Site and 2: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks July 13, 2012 - 7:00am Addthis PROBLEM: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks PLATFORM: RSA Authentication Manager 7.1 is vulnerable; other versions may also be affected. ABSTRACT: RSA Authentication Manager is prone to multiple security vulnerabilities because it fails to properly sanitize user-supplied input. Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, and conduct phishing attacks. Other attacks may also be possible.

91

V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: RSA Adaptive Authentication (On-Premise) Input Validation 4: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks November 27, 2012 - 2:00am Addthis PROBLEM: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks PLATFORM: RSA Adaptive Authentication (On-Premise) 6.x ABSTRACT: A vulnerability was reported in RSA Adaptive Authentication (On-Premise). REFERENCE LINKS: SecurityTracker Alert ID: 1027811 SecurityFocus Security Alert RSA Customer Support CVE-2012-4611 IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability was reported in RSA Adaptive Authentication (On-Premise). A remote user can conduct cross-site scripting attacks. The software does not

92

Digital Image Authentication: A Review  

Science Conference Proceedings (OSTI)

Digital image authentication refers to all the techniques performing anti-falsification, digital image copyright protection, or access control. A large number of DIA techniques have been developed to authenticate digital images, including cryptography-based ... Keywords: Data Hiding, Digital Fingerprints, Forensic Science, Image Authentication, Watermarking

Chia-Hung Wei; Yue Li

2011-04-01T23:59:59.000Z

93

V-036: EMC Smarts Network Configuration Manager Database Authentication  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: EMC Smarts Network Configuration Manager Database 6: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability November 29, 2012 - 3:30am Addthis PROBLEM: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability PLATFORM: EMC Smarts Network Configuration Manager (NCM) all versions prior 9.1 ABSTRACT: Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. REFERENCE LINKS: EMC Identifier: ESA-2012-057 Secunia Advisory SA51408 SecurityTracker Alert ID: 1027812 CVE-2012-4614 CVE-2012-4615 IMPACT ASSESSMENT: Medium DISCUSSION: The systems uses a hard-coded key to encrypt authentication credentials on the target system [CVE-2012-4615]. A local user with knowledge of the key

94

User-centric PKI  

Science Conference Proceedings (OSTI)

The goal of supporting Single Sign-On to the Web has proven elusive. A number of solutions have been proposed -- and some have even been deployed -- but the capability remains unavailable to most users and the solutions deployed raise concerns for both ... Keywords: PKI, authentication, single sign-on, web services

Radia Perlman; Charlie Kaufman

2008-03-01T23:59:59.000Z

95

CERTIFICATE OF AUTHENTICITY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CERTIFICATE OF AUTHENTICITY CERTIFICATE OF AUTHENTICITY I hereby certify that this transcript constitutes an accurate record of the full Council meeting of the National Coal Council held on November 14,2008 at the Westin Grand Hotel, Washington, D.C. ~ i c h a e l G. Mueller, Chair National Coal Council I NATIONAL COAL COUNCIL 1 FULL COUNCIL MEETING FRIDAY NOVEMBER 14, 2 0 0 8 The Full Council meeting convened at 9 : 0 0 a.m. in the Washington Ballroom of the Westin Grand Hotel, 2 3 5 0 M Street, NW, Washington, DC, Chair Michael G. Mueller presiding. ATTENDEES: MIKE MUELLER, Arneren Energy Fuels & Services Company, Chair RICH EIMER, Dynegy Inc., Vice-Chair ROBERT BECK, National Coal Council, Executive Vice-President SY ALI, Clean Energy Consulting BARB ALTIZER, Eastern Coal Council

96

CHALLENGE MEASUREMENTS FOR AUTHENTICATION  

Science Conference Proceedings (OSTI)

Authentication of systems with an information barrier that protects sensitive information is difficult; in particular, the information barrier can allow a hidden switch to be implemented by the system fabricator and operator. The hidden switch is the operator’s ability to subvert the measurement system and force it to produce a desired and false result. It is usually discussed in the context of an attribute measurement in which a faked item is presented in place of a real item regulated by an agreement, with the driving motivation being the ability to preserve a stock of valuable items. In simple terms, the hidden switch enables a shell game with assets, and the information barrier protects the switch. This presentation outlines challenge measurements that could be used to detect the implementation of a hidden switch and assist the authentication process.

Pitts, W. Karl

2009-10-07T23:59:59.000Z

97

Provably-Secure two-round password-authenticated group key exchange in the standard model  

Science Conference Proceedings (OSTI)

Password-authenticated group key exchange (PAGKE) allows group users to share a session key using a human-memorable password only. The fundamental security goal of PAGKE is security against dictionary attacks. Several solutions have been proposed ...

Jeong Ok Kwon; Ik Rae Jeong; Dong Hoon Lee

2006-10-01T23:59:59.000Z

98

V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: RSA Authentication Manager Writes Operating System, SNMP, 4: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files June 10, 2013 - 12:47am Addthis PROBLEM: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files PLATFORM: RSA Authentication Manager 8.0 ABSTRACT: A vulnerability was reported in RSA Authentication Manager. REFERENCE LINKS: RSA SecurityTracker Alert ID: 1028638 CVE-2013-0947 IMPACT ASSESSMENT: Medium DISCUSSION: The system may write operating system, SNMP, and HTTP plug-in proxy passwords in clear text to log and configuration files. IMPACT: A local user can obtain operating system, SNMP, and HTTP plug-in proxy

99

Mobile token-based authentication on a budget  

Science Conference Proceedings (OSTI)

We propose a light-weight, cheap authentication device for unlocking a user's smartphone. The device can be carried on a key chain and automatically unlocks the smartphone whenever its owner wants to use it. Our goal is to build a device that works with ...

Hristo Bojinov; Dan Boneh

2011-03-01T23:59:59.000Z

100

Analog Video Authentication and Seal Verification Equipment Development  

SciTech Connect

Under contract to the US Department of Energy in support of arms control treaty verification activities, the Savannah River National Laboratory in conjunction with the Pacific Northwest National Laboratory, the Idaho National Laboratory and Milagro Consulting, LLC developed equipment for use within a chain of custody regime. This paper discussed two specific devices, the Authentication Through the Lens (ATL) analog video authentication system and a photographic multi-seal reader. Both of these devices have been demonstrated in a field trial, and the experience gained throughout will also be discussed. Typically, cryptographic methods are used to prove the authenticity of digital images and video used in arms control chain of custody applications. However, in some applications analog cameras are used. Since cryptographic authentication methods will not work on analog video streams, a simple method of authenticating analog video was developed and tested. A photographic multi-seal reader was developed to image different types of visual unique identifiers for use in chain of custody and authentication activities. This seal reader is unique in its ability to image various types of seals including the Cobra Seal, Reflective Particle Tags, and adhesive seals. Flicker comparison is used to compare before and after images collected with the seal reader in order to detect tampering and verify the integrity of the seal.

Gregory Lancaster

2012-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Byzantine agreement method without authentication  

SciTech Connect

This invention relates to a method for achieving Byzantine agreement without authentication among n 100 communicating processors using event counting and thresholding rather than message exchanges and evaluations.

Reischuk, R.K.

1983-12-01T23:59:59.000Z

102

STANDARD USER AGREEMENT  

NLE Websites -- All DOE Office Websites (Extended Search)

acceptance by the Parties. In order for the USER to gain access to andor use of the User facilities, the research must first receive programmatic approval of the facility director...

103

Requirements for signaling channel authentication  

SciTech Connect

This contribution addresses requirements for ATM signaling channel authentication. Signaling channel authentication is an ATM security service that binds an ATM signaling message to its source. By creating this binding, the message recipient, and even a third party, can confidently verify that the message originated from its claimed source. This provides a useful mechanism to mitigate a number of threats. For example, a denial of service attack which attempts to tear-down an active connection by surreptitiously injecting RELEASE or DROP PARTY messages could be easily thwarted when authenticity assurances are in place for the signaling channel. Signaling channel authentication could also be used to provide the required auditing information for accurate billing which is impervious to repudiation. Finally, depending on the signaling channel authentication mechanism, end-to-end integrity of the message (or at least part of it) can be provided. None of these capabilities exist in the current specifications.

Tarman, T.D.

1995-12-11T23:59:59.000Z

104

Distinguishing users with capacitive touch communication  

Science Conference Proceedings (OSTI)

As we are surrounded by an ever-larger variety of post-PC devices, the traditional methods for identifying and authenticating users have become cumbersome and time-consuming. In this paper, we present a capacitive communication method through which a ... Keywords: capacitive touch communication, distinguishing users, signetring, touchscreen communication, user identification

Tam Vu; Akash Baid; Simon Gao; Marco Gruteser; Richard Howard; Janne Lindqvist; Predrag Spasojevic; Jeffrey Walling

2012-08-01T23:59:59.000Z

105

PEREA: Practical TTP-free revocation of repeatedly misbehaving anonymous users  

Science Conference Proceedings (OSTI)

Several anonymous authentication schemes allow servers to revoke a misbehaving user's ability to make future accesses. Traditionally, these schemes have relied on powerful Trusted Third Parties (TTPs) capable of deanonymizing (or linking) users' connections. ... Keywords: Privacy, anonymous authentication, anonymous blacklisting, privacy-enhanced revocation, user misbehavior

M. Ho Au; P. P. Tsang; A. Kapadia

2011-12-01T23:59:59.000Z

106

U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control...

107

Pretty good packet authentication  

Science Conference Proceedings (OSTI)

Internet addresses are routinely being used to infer the identity of persons who send offending traffic - a capability they were not designed to provide. As a result, problems abound: innocent users are being accused, while the culprits can easily avoid ...

Andreas Haeberlen; Rodrigo Rodrigues; Krishna Gummadi; Peter Druschel

2008-12-01T23:59:59.000Z

108

Leveraging Personal Devices for Stronger Password Authentication from Untrusted Computers  

E-Print Network (OSTI)

Internet authentication for popular end-user transactions, such as online banking and e-commerce, continues to be dominated by passwords entered through end-user personal computers (PCs). Most users continue to prefer (typically untrusted) PCs over smaller personal devices for actual transactions, due to usability features related to keyboard and screen size. However most such transactions and their existing underlying protocols are vulnerable to attacks including keylogging, phishing, and pharming, which can extract user identity and sensitive account information allowing account access. We propose a simple approach to counter such attacks, which cryptographically separates a user’s long-term secret input (typically low-entropy password) from the client PC. The latter continues to be used for most of the interaction and computations but has access only to temporary secrets, while the user’s long-term secret is input through an independent personal trusted device such as a cellphone which makes it available to the PC only after encryption under the intended far-end recipient’s public key. Our proposal is intended to safeguard passwords from the attacks mentioned above, as well as to provide transaction security to foil session hijacking. To facilitate a comparison to our proposal, we also provide a comprehensive survey of web authentication techniques that use an additional factor of authentication such as a cellphone, PDA (personal digital assistant) or hardware token; this survey may be of independent interest. A proof sketch of MP-Auth using the Protocol Composition Logic (PCL) is also provided.

Mohammad Mannan; P. C. van Oorschot

2008-01-01T23:59:59.000Z

109

T-606: Sun Java System Access Manager Lets Remote Users Partially Modify  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

06: Sun Java System Access Manager Lets Remote Users Partially 06: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data April 20, 2011 - 3:58am Addthis PROBLEM: Two vulnerabilities were reported in Sun Java System Access Manager. A remote authenticated user can partially access data on the target system. A remote user can partially modify data on the target system. PLATFORM: Sun Java versions 7.1, 8.0 ABSTRACT: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data. reference LINKS: SecurityTracker Alert ID: 1025408 CVE-2011-0844 CVE-2011-0847 Oracle Critical Patch Update Advisory

110

Mobile IP Authentication, Authorization, and Accounting Requirements  

Science Conference Proceedings (OSTI)

The Mobile IP and Authentication, Authorization, Accounting (AAA) working groups are currently looking at defining the requirements for Authentication, Authorization, and Accounting. This document contains the requirements which would have to be supported ...

S. Glass; T. Hiller; S. Jacobs; C. Perkins

2000-10-01T23:59:59.000Z

111

Authentication of FPGA bitstreams: why and how  

Science Conference Proceedings (OSTI)

Encryption of volatile FPGA bitstreams provides confidentiality to the design but does not ensure its authenticity. This paper motivates the need for adding authentication to the configuration process by providing application examples where this functionality ...

Saar Drimer

2007-03-01T23:59:59.000Z

112

Users from Industry  

NLE Websites -- All DOE Office Websites (Extended Search)

Users from Industry Users from Industry Users from Industry Print The Advanced Light Source (ALS) welcomes industrial users from large and small companies whose projects advance scientific knowledge, investigate the development of new products and manufacturing methods, or provide economic benefits and jobs to the economy. The nature of industrial research can be different from traditional university and government sponsored projects, so the ALS has created unique opportunities for new and existing industrial users to access our user facilities and engage in productive relationships with our scientific and engineering staff. Examples of past and current research conducted at the ALS can be viewed on the Industry @ ALS Web page. There are several modes of access; the ALS User and Scientific Support Groups are especially committed to helping new industrial users gain a foothold in our user community and welcome inquiries about how to make that happen.

113

V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: MediaWiki CentralAuth Extension Authentication Bypass 6: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability September 6, 2013 - 4:36am Addthis PROBLEM: A vulnerability has been reported in the CentralAuth extension for MediaWiki, which can be exploited by malicious people to bypass certain security restrictions. PLATFORM: MediaWiki CentralAuth Extension ABSTRACT: A vulnerability has been reported in the CentralAuth extension for MediaWik REFERENCE LINKS: Secunia Advisory SA54723 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an error when handling auto-logins and can be exploited to bypass the authentication mechanism by providing a valid username within the "centralauth_User" cookie. IMPACT:

114

Users from Industry  

NLE Websites -- All DOE Office Websites (Extended Search)

Users from Industry Print Users from Industry Print The Advanced Light Source (ALS) welcomes industrial users from large and small companies whose projects advance scientific knowledge, investigate the development of new products and manufacturing methods, or provide economic benefits and jobs to the economy. The nature of industrial research can be different from traditional university and government sponsored projects, so the ALS has created unique opportunities for new and existing industrial users to access our user facilities and engage in productive relationships with our scientific and engineering staff. Examples of past and current research conducted at the ALS can be viewed on the Industry @ ALS Web page. There are several modes of access; the ALS User and Scientific Support Groups are especially committed to helping new industrial users gain a foothold in our user community and welcome inquiries about how to make that happen.

115

U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote 11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories July 12, 2012 - 7:00am Addthis PROBLEM: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories PLATFORM: EMC Celerra Network Server versions 6.0.36.4 through 6.0.60.2 EMC VNX versions 7.0.12.0 through 7.0.53.1 EMC VNXe 2.0 (including SP1, SP2, and SP3) EMC VNXe MR1 (including SP1, SP2, SP3, and SP3.1) EMC VNXe MR2 (including SP0.1) ABSTRACT: A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system. reference LINKS: The Vendor's Advisory

116

A TESLA-Based Mutual Authentication . . .  

E-Print Network (OSTI)

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against man-in-the-middle attacks. Several solutions have been proposed to establish mutual entity authentication. However, none provide a flaw-free bilateral authentication protocol. In this paper, we show that a recently proposed solution is vulnerable to a "type attack". Then, we propose a novel mutual entity authentication using the TESLA protocol. The proposed solution not only provides secure bilateral authentication, but also decreases the call setup time and the required connection bandwidth. An important feature of the proposed protocol is that it is compatible with the GSM standard.

Ali Fanian; Mehdi Berenjkoub; T. Aaron Gulliver

2009-01-01T23:59:59.000Z

117

T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users 7: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information August 31, 2011 - 12:00pm Addthis PROBLEM: A vulnerability was reported in Apache Tomcat. A remote user can bypass authentication or obtain potentially sensitive information. PLATFORM: Apache Tomcat 5.5.0 to 5.5.33, 6.0.0 to 6.0.33, 7.0.0 to 7.0.20 ABSTRACT: Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information. reference LINKS: SecurityTracker Alert ID: 1025993 CVE-2011-3190 (under review) Apache Tomcat Security Updates IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apache Tomcat. A remote user can bypass

118

Obfuscated authentication systems, devices, and methods  

SciTech Connect

Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.

Armstrong, Robert C; Hutchinson, Robert L

2013-10-22T23:59:59.000Z

119

NIST Special Publication Expands Government Authentication ...  

Science Conference Proceedings (OSTI)

... The Office of Management and Budget's guidance, “E-Authentication Guidance for Federal Agencies” [OMB 04-04] can be found at www ...

2011-12-20T23:59:59.000Z

120

Secure Symmetric Authentication for RFID Tags  

E-Print Network (OSTI)

cryptographically secure authentication. Starting with a short introduction into common RFID systems with passive tags, we present a motivation why secure authentication with standardized symmetric crypto algorithms for RFID tags is necessary for many applications. We demonstrate vulnerabilities of current RFID systems and explain how application of an authentication mechanism can solve them. Furthermore we explain how authentication protocols work and how they can be included in the RFID protocol standard ISO 18000. By presenting the interim results of ART, we will show that the proposed enhancement is feasible with current RIFD infrastructure and silicon technology used for RFID tags.

Manfred Aigner; Martin Feldhofer

2005-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

User Information  

NLE Websites -- All DOE Office Websites (Extended Search)

User Information User Information Print User Guide A step-by-step guide for users about how to apply and prepare for beam time at the ALS. Includes information about submitting a...

122

Instructions for using HSPD-12 Authenticated Outlook Web Access...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

using HSPD-12 Authenticated Outlook Web Access (OWA) Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Provides instructions for remote Outlook access using...

123

Verifying authentication protocols with CSP Steve Schneider  

E-Print Network (OSTI)

Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

Doran, Simon J.

124

Back-of-device authentication on smartphones  

Science Conference Proceedings (OSTI)

This paper presents BoD Shapes, a novel authentication method for smartphones that uses the back of the device for input. We argue that this increases the resistance to shoulder surfing while remaining reasonably fast and easy-to-use. We performed ... Keywords: authentication, back of device interaction, security

Alexander De Luca; Emanuel von Zezschwitz; Ngo Dieu Huong Nguyen; Max-Emanuel Maurer; Elisa Rubegni; Marcello Paolo Scipioni; Marc Langheinrich

2013-04-01T23:59:59.000Z

125

On selecting Gabor features for biometric authentication  

Science Conference Proceedings (OSTI)

We describe a Gabor feature selection technique that allows us to develop a fast and robust Gabor-feature based biometric system. Existing Gabor based methods use a huge number of Gabor features to represent the patterns. Our experiments on different ... Keywords: Gabor features, automated identification, biometrics, ear authentication, equal error rate, feature selection, finger authentication

Loris Nanni; Alessandra Lumini

2009-04-01T23:59:59.000Z

126

Group-Based Authentication and Key Agreement  

Science Conference Proceedings (OSTI)

This paper presents an authentication and key agreement protocol to streamline communication activities for a group of mobile stations (MSs) roaming from the same home network (HN) to a serving network (SN). In such a roaming scenario, conventional schemes ... Keywords: Authentication and key agreement, Group key, Roaming, Security, Wireless network

Yu-Wen Chen; Jui-Tang Wang; Kuang-Hui Chi; Chien-Chao Tseng

2012-02-01T23:59:59.000Z

127

A class of authentication codes with secrecy  

Science Conference Proceedings (OSTI)

We study a class of authentication codes with secrecy. We determine the maximum success probabilities of the impersonation and the substitution attacks on these codes and the level of secrecy. Therefore we give an answer to an open problem stated in ... Keywords: 14G50, 94A60, 94A62, Algebraic function fields, Authentication codes with secrecy, Linearized polynomial

Elif Kurtaran Özbudak; Ferruh Özbudak; Zülfükar Sayg?

2011-04-01T23:59:59.000Z

128

Plugging a Scalable Authentication Framework into Shibboleth  

Science Conference Proceedings (OSTI)

In a VO (virtual organisation) environment where services are provided and shared by dissimilar organisations from different administrative domains and are protected with dissimilar security policies and measures, there is a need for a flexible authentication ... Keywords: Grid authentication, security architecture, smart tokens.

N. Zhang; L. Yao; J. Chin; A. Nenadic; A. McNab; A. Rector; C. Goble; Q. Shi

2005-06-01T23:59:59.000Z

129

Prospective Users  

NLE Websites -- All DOE Office Websites (Extended Search)

Prospective Users Prospective Users Prospective Users Print The Advanced Light Source (ALS) welcomes researchers from universities, government labs, and industry who are interested in performing experiments at the general sciences and structural biology beamlines open to users. An overview of user opportunities, and the procedures to become a user, are outlined below: What is an ALS User? Research Facilities Available to Users Costs to Users Users from Industry User Policy How to Become an ALS User What is an ALS User? The ALS is a third generation synchrotron light source, providing over 35 beamlines, where samples may be illuminated with x-ray, ultraviolet or infrared light to explore the structure and electronic properties of materials. The ALS operates as a national user facility, and is open to researchers worldwide to submit proposals for research.

130

Using a personal device to strengthen password authentication from an untrusted computer  

E-Print Network (OSTI)

Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users’ financial accounts. Most existing or proposed solutions are vulnerable to session hijacking attacks. We propose a simple approach to counter these attacks, which cryptographically separates a user’s long-term secret input from (typically untrusted) client PCs; a client PC performs most computations but has access only to temporary secrets. The user’s long-term secret (typically short and low-entropy) is input through an independent personal trusted device such as a cellphone. The personal device provides a user’s long-term secrets to a client PC only after encrypting the secrets using a pre-installed, “correct” public key of a remote service (the intended recipient of the secrets). The proposed protocol (MP-Auth) realizes such an approach, and is intended to safeguard passwords from keyloggers, other malware (including rootkits), phishing attacks and pharming, as well as to provide transaction security to foil session hijacking. We report on a prototype implementation of MP-Auth, and provide a comparison of web authentication techniques that use an additional factor of authentication (e.g. a cellphone, PDA or hardware token).

Mohammad Mannan; P. C. van Oorschot

2007-01-01T23:59:59.000Z

131

Prospective Users  

NLE Websites -- All DOE Office Websites (Extended Search)

Prospective Users Print Prospective Users Print The Advanced Light Source (ALS) welcomes researchers from universities, government labs, and industry who are interested in performing experiments at the general sciences and structural biology beamlines open to users. An overview of user opportunities, and the procedures to become a user, are outlined below: What is an ALS User? Research Facilities Available to Users Costs to Users Users from Industry User Policy How to Become an ALS User What is an ALS User? The ALS is a third generation synchrotron light source, providing over 35 beamlines, where samples may be illuminated with x-ray, ultraviolet or infrared light to explore the structure and electronic properties of materials. The ALS operates as a national user facility, and is open to researchers worldwide to submit proposals for research.

132

A secure and efficient strong-password authentication protocol  

Science Conference Proceedings (OSTI)

Password authentication protocols are divided into two types. One employs the easy-to-remember password while the other requires the strong password. In 2001, Lin et al. proposed an optimal strong-password authentication protocol (OSPA) to resist the ... Keywords: denial-of-service attack, mutual authentication, password authentication, smart card, stolen-verifier attack, strong password

Ya-Fen Chang; Chin-Chen Chang

2004-07-01T23:59:59.000Z

133

A simple threshold authenticated key exchange from short secrets  

Science Conference Proceedings (OSTI)

This paper brings the password-based authenticated key exchange (PAKE) problem closer to practice. It takes into account the presence of firewalls when clients communicate with authentication servers. An authentication server can indeed be seen as two ... Keywords: password-based authentication, threshold protocols

Michel Abdalla; Olivier Chevassut; Pierre-Alain Fouque; David Pointcheval

2005-12-01T23:59:59.000Z

134

User Services  

NLE Websites -- All DOE Office Websites (Extended Search)

Contacts for Users Contacts for Users User Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment Coordination Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users Tel: 510-486-7727 ALS User Office The User Office is located on the mezzanine of Building 6 (the ALS), Room 2212. Contact Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 Fax: 510-486-4773 Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Hours User Office: Monday-Friday 8.00 a.m. - 12.00 p.m. and 1.00 p.m. - 5.00 p.m.

135

A user study design for comparing the security of registration protocols  

Science Conference Proceedings (OSTI)

We present the design of a user study for comparing the security of two registration mechanisms for initializing credentials in machine authentication protocols, such as SiteKey. We discuss ethical and ecological validity challenges we faced in designing ...

Chris Karlof; J. D. Tygar; David Wagner

2008-04-01T23:59:59.000Z

136

Password based key exchange with mutual authentication  

Science Conference Proceedings (OSTI)

A reasonably efficient password based key exchange (KE) protocol with provable security without random oracle was recently proposed by Katz, et al. [17] and later by Gennaro and Lindell [13]. However, these protocols do not support mutual authentication ...

Shaoquan Jiang; Guang Gong

2004-08-01T23:59:59.000Z

137

Final report and recommendations of the ESnet Authentication Pilot Project  

Science Conference Proceedings (OSTI)

To conduct their work, U.S. Department of Energy (DOE) researchers require access to a wide range of computing systems and information resources outside of their respective laboratories. Electronically communicating with peers using the global Internet has become a necessity to effective collaboration with university, industrial, and other government partners. DOE`s Energy Sciences Network (ESnet) needs to be engineered to facilitate this {open_quotes}collaboratory{close_quotes} while ensuring the protection of government computing resources from unauthorized use. Sensitive information and intellectual properties must be protected from unauthorized disclosure, modification, or destruction. In August 1993, DOE funded four ESnet sites (Argonne National Laboratory, Lawrence Livermore National Laboratory, the National Energy Research Supercomputer Center, and Pacific Northwest Laboratory) to begin implementing and evaluating authenticated ESnet services using the advanced Kerberos Version 5. The purpose of this project was to identify, understand, and resolve the technical, procedural, cultural, and policy issues surrounding peer-to-peer authentication in an inter-organization internet. The investigators have concluded that, with certain conditions, Kerberos Version 5 is a suitable technology to enable ESnet users to freely share resources and information without compromising the integrity of their systems and data. The pilot project has demonstrated that Kerberos Version 5 is capable of supporting trusted third-party authentication across an inter-organization internet and that Kerberos Version 5 would be practical to implement across the ESnet community within the U.S. The investigators made several modifications to the Kerberos Version 5 system that are necessary for operation in the current Internet environment and have documented other technical shortcomings that must be addressed before large-scale deployment is attempted.

Johnson, G.R.; Moore, J.P. [Pacific Northwest Lab., Richland, WA (United States); Athey, C.L. [Lawrence Livermore National Lab., CA (United States); Engert, D.E. [Argonne National Lab., IL (United States); Ramus, J.E. [National Energy Research Supercomputer Center, Livermore, CA (United States)

1995-01-01T23:59:59.000Z

138

User Services  

NLE Websites -- All DOE Office Websites (Extended Search)

Home Contact Home Contact User Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment Coordination Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users Tel: 510-486-7727 ALS User Office The User Office is located on the mezzanine of Building 6 (the ALS), Room 2212. Contact Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 Fax: 510-486-4773 Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Hours User Office: Monday-Friday 8.00 a.m. - 12.00 p.m. and 1.00 p.m. - 5.00 p.m.

139

Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes  

DOE Patents (OSTI)

Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.

Kent, Alexander Dale (Los Alamos, NM)

2008-09-02T23:59:59.000Z

140

Multiuser Diversity Gain in Cognitive Networks  

E-Print Network (OSTI)

Dynamic allocation of resources to the \\emph{best} link in large multiuser networks offers considerable improvement in spectral efficiency. This gain, often referred to as \\emph{multiuser diversity gain}, can be cast as double-logarithmic growth of the network throughput with the number of users. In this paper we consider large cognitive networks granted concurrent spectrum access with license-holding users. The primary network affords to share its under-utilized spectrum bands with the secondary users. We assess the optimal multiuser diversity gain in the cognitive networks by quantifying how the sum-rate throughput of the network scales with the number of secondary users. For this purpose we look at the optimal pairing of spectrum bands and secondary users, which is supervised by a central entity fully aware of the instantaneous channel conditions, and show that the throughput of the cognitive network scales double-logarithmically with the number of secondary users ($N$) and linearly with the number of avai...

Tajer, Ali

2010-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

User Services  

NLE Websites -- All DOE Office Websites (Extended Search)

User Services Print User Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment Coordination Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users Tel: 510-486-7727 ALS User Office The User Office is located on the mezzanine of Building 6 (the ALS), Room 2212. Contact Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 Fax: 510-486-4773 Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Hours User Office: Monday-Friday 8.00 a.m. - 12.00 p.m. and 1.00 p.m. - 5.00 p.m. New user registration: Monday-Friday 8.00 a.m. - 12.00 p.m. and

142

User Services  

NLE Websites -- All DOE Office Websites (Extended Search)

User Services Print User Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment Coordination Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users Tel: 510-486-7727 ALS User Office The User Office is located on the mezzanine of Building 6 (the ALS), Room 2212. Contact Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 Fax: 510-486-4773 Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Hours User Office: Monday-Friday 8.00 a.m. - 12.00 p.m. and 1.00 p.m. - 5.00 p.m. New user registration: Monday-Friday 8.00 a.m. - 12.00 p.m. and

143

User Services  

NLE Websites -- All DOE Office Websites (Extended Search)

User Services Print User Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment Coordination Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users Tel: 510-486-7727 ALS User Office The User Office is located on the mezzanine of Building 6 (the ALS), Room 2212. Contact Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 Fax: 510-486-4773 Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Hours User Office: Monday-Friday 8.00 a.m. - 12.00 p.m. and 1.00 p.m. - 5.00 p.m. New user registration: Monday-Friday 8.00 a.m. - 12.00 p.m. and

144

User Services  

NLE Websites -- All DOE Office Websites (Extended Search)

User Services Print User Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment Coordination Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users Tel: 510-486-7727 ALS User Office The User Office is located on the mezzanine of Building 6 (the ALS), Room 2212. Contact Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 Fax: 510-486-4773 Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Hours User Office: Monday-Friday 8.00 a.m. - 12.00 p.m. and 1.00 p.m. - 5.00 p.m. New user registration: Monday-Friday 8.00 a.m. - 12.00 p.m. and

145

T-646: Debian fex authentication bypass | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Debian fex authentication bypass 6: Debian fex authentication bypass T-646: Debian fex authentication bypass June 14, 2011 - 3:45pm Addthis PROBLEM: The vulnerability is caused due to the application not properly verifying the existence of "auth-ID" when uploading files and can be exploited to bypass the authentication mechanism. PLATFORM: Debian fex ABSTRACT: Debian security discovered that fex, a web service for transferring very large, files, is not properly validating authentication IDs. While the service properly validates existing authentication IDs, an attacker who is not specifying any authentication ID at all, can bypass the authentication procedure. reference LINKS: DSA-2259-1 fex Secunia Advisory SA44940 Debian Security Advisory DSA-2259-1 fex-20110610.tar Vulnerability Report: Debian GNU/Linux 6.0

146

U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain 9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication May 1, 2012 - 7:00am Addthis PROBLEM: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 6) ABSTRACT: A vulnerability was reported in Red Hat Enterprise MRG Messaging. A remote user can access cluster messages and view the internal configuration. reference LINKS: SecurityTracker Alert ID: 1026990 CVE-2011-3620 Red Hat advisory IMPACT ASSESSMENT: High Discussion: Qpid may accept arbitrary passwords and SASL mechanims. A remote user on the local private interconnect network with knowledge of a valid cluster

147

Kerberos authentication: The security answer for unsecured networks  

Science Conference Proceedings (OSTI)

Traditional authentication schemes do not properly address the problems encountered with today`s unsecured networks. Kerbmm developed by MIT, on the other hand is designed to operate in an open unsecured network, yet provide good authentication and security including encrypted session traffic. Basic Kerberos principles as well as experiences of the ESnet Authentication Pilot Project with Cross Realm. Authentication between four National Laboratories will also be described.

Engert, D.E.

1995-06-01T23:59:59.000Z

148

User Guide  

NLE Websites -- All DOE Office Websites (Extended Search)

Guide Guide User Guide Print 1. Apply for Beam Time Submit a new proposal or a Beam Time Request (BTR) using an existing active proposal. 2. Establish a User Agreement Your institute must have a signed agreement with Berkeley Lab before you may do work at the ALS. 3. Complete Experiment Safety Documentation and Review Safety for Users Safety documentation must be completed and reviewed before your beam time. Experiments involving any biological material or radioactive material require more review steps so please allow several weeks for these. 4. Register with the User Office New and returning users need to register with the User Office TWO weeks before arriving at the ALS. Users arriving out of regular office hours must either have a valid Berkeley Lab ID badge, or have completed registration to be granted access to the ALS.

149

User Obligations  

NLE Websites -- All DOE Office Websites (Extended Search)

User Obligations User Obligations Summary of what APS expects of users in return for access to the facility. Registration Register with the APS as far in advance of your initial visit as possible (even when you are simply planning an experiment). User Agreement Ensure that a User Agreement is in place between the APS and your home institution. Training Ensure that you complete all required training before conducting hands-on work at the APS. Safety Assessement Complete Experiment Safety Assessment Forms. End of Experiment Form Complete End of Experiment form to provide feedback (required for General Users, optional for others). Published Reports of Work Carried Out at the APS As an APS user, you are required to notify both the APS and your host beamline staff of all work published in the open literature (including

150

Gaining Access Unique Opportunities  

E-Print Network (OSTI)

Reactor (HFIR) User Facilities High Temperature Materials Laboratory (HTML) Holifield Radioactive Ion Beam such as physics, chemistry, materials science, engineering, and biology. HFIR also provides capabilities

Oak Ridge National Laboratory

151

User Services  

NLE Websites -- All DOE Office Websites (Extended Search)

Services Print Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment Coordination Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users Tel: 510-486-7727 ALS User Office The User Office is located on the mezzanine of Building 6 (the ALS), Room 2212. Contact Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 Fax: 510-486-4773 Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Hours User Office: Monday-Friday 8.00 a.m. - 12.00 p.m. and 1.00 p.m. - 5.00 p.m. New user registration: Monday-Friday 8.00 a.m. - 12.00 p.m. and

152

User Services  

NLE Websites -- All DOE Office Websites (Extended Search)

Services Print Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment Coordination Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users Tel: 510-486-7727 ALS User Office The User Office is located on the mezzanine of Building 6 (the ALS), Room 2212. Contact Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 Fax: 510-486-4773 Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Hours User Office: Monday-Friday 8.00 a.m. - 12.00 p.m. and 1.00 p.m. - 5.00 p.m. New user registration: Monday-Friday 8.00 a.m. - 12.00 p.m. and

153

Using Rose and Compass for Authentication  

Science Conference Proceedings (OSTI)

Many recent non-proliferation software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project. ROSE is an LLNL-developed robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. It continues to be extended to support the automated analysis of binaries (x86, ARM, and PowerPC). We continue to extend ROSE to address a number of security specific requirements and apply it to software authentication for non-proliferation projects. We will give an update on the status of our work.

White, G

2009-07-09T23:59:59.000Z

154

User Facilities  

NLE Websites -- All DOE Office Websites (Extended Search)

Lawrence Berkeley National Laboratory's National User Facilities are available for cooperative research with institutions and the private sector worldwide. The Environmental...

155

Collaborative Gain in Resource Sharing Communication Networks  

E-Print Network (OSTI)

We consider a Multi-Hopping communication network of users transmitting information on a shared medium with limited resources, e.g., limited time and limited bandwidth. Users are able to transmit, receive, retrieve and reply information in a collaborative way. We assume that two users collaborate (one acts as a relay for another) only if, as a result of the collaboration, they gain more capacity, save on resources or save power. We perform optimal resource allocation for three problems: 1) maximizing the capacity given limited resource and energy, 2) minimizing the resource usage given capacity and energy and 3) minimizing energy usage given capacity and resources. By comparing the collaboration gain as a function of the channels and available energies, one may decide either to collaborate or not and select a collaborator among candidates. We find the conditions in which acting as relay results in capacity gain, resource or power saving. We show that a significant gain is attained only if the channel energy g...

Akhavan-Astaneh, Saeed

2007-01-01T23:59:59.000Z

156

User Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

User Policy Print User Policy Print 1. Guiding Principles The aim of User Policy at the Advanced Light Source (ALS) is to provide a framework for establishing a challenging yet congenial environment where talented scientists from different backgrounds can work together in pursuit of the new scientific opportunities presented by the availability of this innovative facility. User policy must address a variety of user needs and sensitivities. On one hand, the qualified researcher with little financial backing needs assurance of adequate access to the facility. On the other hand, qualified groups that make a large commitment of time and resources need some assurance of an equitable return on their investment. A national facility should be accessible to all qualified researchers and at the ALS there are three modes of access: as a General User, a member of an Approved Program (AP), or as a member of a Participating Research Team (PRT). All proposals for research to be conducted at the ALS are evaluated based on the criteria endorsed by the International Union of Pure and Applied Physics (IUPAP). These criteria are detailed on the IUPAP Web site at IUPAP Recommendations for the Use of Major Physics Users Facilities (pdf version).

157

System and method for authentication of goods  

SciTech Connect

An authentication system comprising a medium having a plurality of elements, the elements being distinctive, detectable and disposed in an irregular pattern or having an intrinsic irregularity. Each element is characterized by a determinable attribute distinct from a two-dimensional coordinate representation of simple optical absorption or simple optical reflection intensity. An attribute and position of the plurality of elements, with respect to a positional reference is detected. A processor generates an encrypted message including at least a portion of the attribute and position of the plurality of elements. The encrypted message is recorded in physical association with the medium. The elements are preferably dichroic fibers, and the attribute is preferably a polarization or dichroic axis, which may vary over the length of a fiber. An authentication of the medium based on the encrypted message may be authenticated with a statistical tolerance, based on a vector mapping of the elements of the medium, without requiring a complete image of the medium and elements to be recorded.

Kaish, Norman (West Hampstead, NY); Fraser, Jay (Freeport, NY); Durst, David I. (Syosset, NY)

1999-01-01T23:59:59.000Z

158

System and method for authentication of goods  

SciTech Connect

An authentication system comprising a medium having a plurality of elements, the elements being distinctive, detectable and disposed in an irregular pattern or having an intrinsic irregularity is disclosed. Each element is characterized by a determinable attribute distinct from a two-dimensional coordinate representation of simple optical absorption or simple optical reflection intensity. An attribute and position of the plurality of elements, with respect to a positional reference is detected. A processor generates an encrypted message including at least a portion of the attribute and position of the plurality of elements. The encrypted message is recorded in physical association with the medium. The elements are preferably dichroic fibers, and the attribute is preferably a polarization or dichroic axis, which may vary over the length of a fiber. An authentication of the medium based on the encrypted message may be authenticated with a statistical tolerance, based on a vector mapping of the elements of the medium, without requiring a complete image of the medium and elements to be recorded.

Kaish, N.; Fraser, J.; Durst, D.I.

1999-10-26T23:59:59.000Z

159

User Community  

NLE Websites -- All DOE Office Websites (Extended Search)

Community Community Given the pressures of conducting experiments, it's sometimes hard to find time to connect with new potential colleagues, even though they may be working at the next beamline. There are many opportunities for making informal connections with other users and with APS staff; this page lists only a few of the many communication channels at the APS. Reaching Other Users Coffee Cart A source of morning sustenance and a chance to see who's been working in the hutch next to yours all night. An APS manager makes the rounds with the Coffee Cart each morning. Scientific Interest Groups Self-organizing groups of users and beamline staff interested in advancing synchrotron research in a particular area. User Science Seminars, General Seminars and Conferences

160

User Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Policy Policy User Policy Print 1. Guiding Principles The aim of User Policy at the Advanced Light Source (ALS) is to provide a framework for establishing a challenging yet congenial environment where talented scientists from different backgrounds can work together in pursuit of the new scientific opportunities presented by the availability of this innovative facility. User policy must address a variety of user needs and sensitivities. On one hand, the qualified researcher with little financial backing needs assurance of adequate access to the facility. On the other hand, qualified groups that make a large commitment of time and resources need some assurance of an equitable return on their investment. A national facility should be accessible to all qualified researchers and at the ALS there are three modes of access: as a General User, a member of an Approved Program (AP), or as a member of a Participating Research Team (PRT). All proposals for research to be conducted at the ALS are evaluated based on the criteria endorsed by the International Union of Pure and Applied Physics (IUPAP). These criteria are detailed on the IUPAP Web site at IUPAP Recommendations for the Use of Major Physics Users Facilities (pdf version).

Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

80:Samba SWAT 'user' Field Cross Site Scripting Vulnerability 80:Samba SWAT 'user' Field Cross Site Scripting Vulnerability T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability August 1, 2011 - 2:10pm Addthis PROBLEM: Samba SWAT 'user' Field Cross Site Scripting Vulnerability PLATFORM: All Linux ABSTRACT: It was found that the 'Change Password' page / screen of the Samba Web Administration Tool did not properly sanitize content of the user-provided "user" field, prior printing it back to the page content. A remote attacker could provide a specially-crafted URL, which once visited by an authenticated Samba SWAT user could allow the attacker to conduct cross-site scripting attacks (execute arbitrary HTML or script code). reference LINKS: SecurityFocus - Bugtraq ID: 48901 Secunia CVE Reference: CVE-2011-2694

162

T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0:Samba SWAT 'user' Field Cross Site Scripting Vulnerability 0:Samba SWAT 'user' Field Cross Site Scripting Vulnerability T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability August 1, 2011 - 2:10pm Addthis PROBLEM: Samba SWAT 'user' Field Cross Site Scripting Vulnerability PLATFORM: All Linux ABSTRACT: It was found that the 'Change Password' page / screen of the Samba Web Administration Tool did not properly sanitize content of the user-provided "user" field, prior printing it back to the page content. A remote attacker could provide a specially-crafted URL, which once visited by an authenticated Samba SWAT user could allow the attacker to conduct cross-site scripting attacks (execute arbitrary HTML or script code). reference LINKS: SecurityFocus - Bugtraq ID: 48901 Secunia CVE Reference: CVE-2011-2694

163

Gain Sharing.PDF  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SE SE DOE/IG-480 I N S P E C T I O N R E P O R T U.S. DEPARTMENT OF ENERGY OFFICE OF INSPECTOR GENERAL OFFICE OF INSPECTIONS INSPECTION OF GAIN SHARING OPPORTUNITIES FOR THE DEPARTMENT OF ENERGY SEPTEMBER 2000 U.S. DEPARTMENT OF ENERGY Washington, DC 20585 September 1, 2000 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman /s/ for Herbert Richardson Inspector General SUBJECT: INFORMATION: Report on "Inspection of Gain Sharing Opportunities for the Department of Energy" BACKGROUND In 1995, the General Services Administration provided guidance on a program known as "GAIN SHARING" where agencies could give cash awards to employees who participate in programs to save travel dollars. This guidance discussed the authority to offer cash awards to employees for obtaining a free coach class ticket with Frequent Flyer benefits earned on official travel and for

164

Amateur Anthropologists: DIY Tourism as Learning Culture and Accessing Authenticity  

E-Print Network (OSTI)

Paula. A. Tourists as Pilgrims: Commercial Fashioning of1983:20). Considering tourists as pilgrims of sacralization,is a kind of contemporary pilgrim, seeking authenticity in

Nishijima, Ryoko

2012-01-01T23:59:59.000Z

165

User Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Policy Print Policy Print 1. Guiding Principles The aim of User Policy at the Advanced Light Source (ALS) is to provide a framework for establishing a challenging yet congenial environment where talented scientists from different backgrounds can work together in pursuit of the new scientific opportunities presented by the availability of this innovative facility. User policy must address a variety of user needs and sensitivities. On one hand, the qualified researcher with little financial backing needs assurance of adequate access to the facility. On the other hand, qualified groups that make a large commitment of time and resources need some assurance of an equitable return on their investment. A national facility should be accessible to all qualified researchers and at the ALS there are three modes of access: as a General User, a member of an Approved Program (AP), or as a member of a Participating Research Team (PRT). All proposals for research to be conducted at the ALS are evaluated based on the criteria endorsed by the International Union of Pure and Applied Physics (IUPAP). These criteria are detailed on the IUPAP Web site at IUPAP Recommendations for the Use of Major Physics Users Facilities (pdf version).

166

User Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Policy Print Policy Print 1. Guiding Principles The aim of User Policy at the Advanced Light Source (ALS) is to provide a framework for establishing a challenging yet congenial environment where talented scientists from different backgrounds can work together in pursuit of the new scientific opportunities presented by the availability of this innovative facility. User policy must address a variety of user needs and sensitivities. On one hand, the qualified researcher with little financial backing needs assurance of adequate access to the facility. On the other hand, qualified groups that make a large commitment of time and resources need some assurance of an equitable return on their investment. A national facility should be accessible to all qualified researchers and at the ALS there are three modes of access: as a General User, a member of an Approved Program (AP), or as a member of a Participating Research Team (PRT). All proposals for research to be conducted at the ALS are evaluated based on the criteria endorsed by the International Union of Pure and Applied Physics (IUPAP). These criteria are detailed on the IUPAP Web site at IUPAP Recommendations for the Use of Major Physics Users Facilities (pdf version).

167

A User's Manual  

E-Print Network (OSTI)

Then and Now A User’s Manual The rationale for Part II isIn addition to this “User’s Manual,” Part II contains three

Ascoli, Albert Russell; Starn, Randolph

2011-01-01T23:59:59.000Z

168

User Manual  

NLE Websites -- All DOE Office Websites (Extended Search)

Manual Manual Services Overview ECS Audio/Video Conferencing Fasterdata IPv6 Network Network Performance Tools (perfSONAR) ESnet OID Registry PGP Key Service Virtual Circuits (OSCARS) OSCARS Case Study Documentation User Manual Web Browser Interface (WBUI) Web Service Interface (API) FAQ Design Specifications Functional Specifications Notifications Publications Authorization Policy Default Attributes Message Security Clients For Developers Interfaces Links Hardware Requirements DOE Grids Service Transition Contact Us Technical Assistance: 1 800-33-ESnet (Inside the US) 1 800-333-7638 (Inside the US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net User Manual Introduction The OSCARS Interdomain Controller (IDC) allows end users to reserve high

169

U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Microsoft Active Directory CRL Validation Flaw Lets Remote 1: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication November 9, 2011 - 8:30am Addthis PROBLEM: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Active Directory Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows 7 for 32-bit Systems Windows 7 for 32-bit Systems Service Pack 1

170

Building Energy Software Tools Directory: Window Heat Gain  

NLE Websites -- All DOE Office Websites (Extended Search)

Window Heat Gain Window Heat Gain Window Heat Gain image Calculates the solar heat gain through vertical windows in temperate latitudes. Screen Shots Keywords Solar, window, energy Validation/Testing N/A Expertise Required None. Users Few (new program). Audience Architects, energy analysts. Input Location, window characteristics, ground characteristics. Output Daily/monthly heat gain through window. Computer Platform Web Programming Language JavaScript Strengths Allows default locations/windows/surfaces or custom user data. Incorporates lots of ASHRAE SHGF data that is otherwise burdensome to deal with. Weaknesses Only works for windows facing close to due north, south, east, or west. Doesn't address conductive losses or shading. Contact Company: Sustainable By Design Address: 3631 Bagley Avenue North

171

U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple OS X Lets Remote Users Execute Arbitrary Code and 4: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am Addthis U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am PROBLEM: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: Apple OS X ABSTRACT: Several vulnerabilities were reported in Apple OS X. reference LINKS: Apple Security Article: HT5501 SecurityTracker Alert ID: 1027551 CVE-2012-0650 CVE-2012-3716 CVE-2012-3718 CVE-2012-3719 CVE-2012-3720 CVE-2012-3721 CVE-2012-3722 CVE-2012-3723 IMPACT ASSESSMENT: Medium Discussion: If the DirectoryService Proxy is used, a remote user can trigger a buffer

172

U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple OS X Lets Remote Users Execute Arbitrary Code and 4: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am Addthis U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am PROBLEM: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: Apple OS X ABSTRACT: Several vulnerabilities were reported in Apple OS X. reference LINKS: Apple Security Article: HT5501 SecurityTracker Alert ID: 1027551 CVE-2012-0650 CVE-2012-3716 CVE-2012-3718 CVE-2012-3719 CVE-2012-3720 CVE-2012-3721 CVE-2012-3722 CVE-2012-3723 IMPACT ASSESSMENT: Medium Discussion: If the DirectoryService Proxy is used, a remote user can trigger a buffer

173

Linda L. Gaines resume  

NLE Websites -- All DOE Office Websites (Extended Search)

L. Gaines L. Gaines Systems Analyst Center for Transportation Research Energy Systems Division Argonne National Laboratory 9700 South Cass Avenue, Bldg. 362 Argonne, IL 60439 phone: 630/252-4919 e-mail: lgaines@anl.gov Professional Experience * Lead analyst for U.S. Department of Energy's heavy vehicle idling studies. * Study costs and impacts on energy use and environment of production and recycling of advanced- design automobiles, trucks, trains, and batteries. * Primary interest is problem solving, which has been applied to efficient use of resources. * Since joining Argonne in 1976, have written handbooks of energy and material flows in petroleum refining, organic chemicals, and copper industries that provided background for reports and papers on technical and institutional issues involved in recycling discarded tires, packaging,

174

Multi-Level TESLA: Broadcast Authentication for Distributed Sensor Networks  

E-Print Network (OSTI)

Multi-Level µTESLA: Broadcast Authentication for Distributed Sensor Networks DONGGANG LIU and PENG named multi-level µTESLA based on µTESLA, a broadcast authentication protocol whose scalability is limited by its unicast-based initial parameter distribution. Multi-level µTESLA satisfies several nice

Ning, Peng

175

A framework for password-based authenticated key exchange1  

Science Conference Proceedings (OSTI)

In this paper, we present a general framework for password-based authenticated key exchange protocols, in the common reference string model. Our protocol is actually an abstraction of the key exchange protocol of Katz et al. and is based on the recently ... Keywords: Passwords, authentication, dictionary attack, projective hash functions

Rosario Gennaro; Yehuda Lindell

2006-05-01T23:59:59.000Z

176

Mutual Authentication for Low-Power Mobile Devices  

Science Conference Proceedings (OSTI)

We propose methods for mutual authentication and key exchange. Our methods are well suited for applications with strict power consumption restrictions, such as wireless medical implants and contactless smart cards. We prove the security of our schemes ... Keywords: gap problem, low power, medical informatics, mutual authentication

Markus Jakobsson; David Pointcheval

2002-02-01T23:59:59.000Z

177

On Automatic Authenticity Verification of Printed Security Documents  

Science Conference Proceedings (OSTI)

This paper presents a pioneering effort to involve machine in checking document authenticity. A particular class of security documents has been considered for the present experiment. Bank cheques, several kinds of tickets like lottery tickets, air tickets, ... Keywords: authenticity verification, security document, forensic document examination, bank cheques

Utpal Garain; Biswajit Halder

2008-12-01T23:59:59.000Z

178

RFID authentication protocol for low-cost tags  

Science Conference Proceedings (OSTI)

In this paper, we investigate the possible privacy and security threats to RFID systems, and consider whether previously proposed RFID protocols address these threats. We then propose a new authentication protocol which provides the identified privacy ... Keywords: privacy, rfid authentication protocol, security

Boyeon Song; Chris J. Mitchell

2008-03-01T23:59:59.000Z

179

Serious leisure, participation and experience in tourism: authenticity and ritual in a renaissance festival  

E-Print Network (OSTI)

This study examined the Texas Renaissance Festival as perceived and experienced by (serious) visitors for whom this was a form of regular, repeated and highly meaningful participation. Specifically, the focus was to gain understanding of the notion of serious leisure as defined by Stebbins, in the context of festivals, and to understand the meanings associated with festival participation. Following a qualitative (constructivism paradigm) research frame, the data were collected through participant observation and 37 in-depth interviews for highly committed tourists to the Texas Renaissance Festival. The collected data were analyzed through Grounded Theory techniques specified by Glaser (1978). In regard to the characteristics of participation, the results indicated that their continuous participation in the Texas Renaissance Festival displays qualities of serious leisure: 1) identification; 2) long-term career; 3) unique ethos; 4) significant personal effort; 5) perseverance; and 6) durable personal benefits. As they become more seriously involved in the festival participation, they tend to be a part of a well-integrated subculture of which prominent values include personal freedom, hedonism, and anti-materialism. The experiences constructed through the serious festival participation were reminiscent of tourism existential authenticity specified by Wang (1999) as two levels: intrapersonal authenticity (gaining one?s true self) and interpersonal authenticity (gaining true human relationship). A search of such authentic experiences at the festival seems to be partly driven by the perceived alienation in everyday life. When these aspects were examined from an interpretive and meaning-based approach, attending the festival in a serious manner is not just a simple matter of escaping from the reality (e.g., alienation) of everyday life, but is an active quest for an ?alternative? to their lives at home as many indicated. Thus, the serious participation in a tourism activity such as the Texas Renaissance Festival could be best understood as a dynamic process of attaining existential state of Being in response to diverse sociocultural conditions. Several significant theoretical propositions were made based on the results derived from this study. Additionally, marketing and management implications associated with staging tourism events and festivals were discussed.

Kim, Hyounggon

2004-12-01T23:59:59.000Z

180

Hardware authentication using transmission spectra modified optical fiber.  

SciTech Connect

The ability to authenticate the source and integrity of data is critical to the monitoring and inspection of special nuclear materials, including hardware related to weapons production. Current methods rely on electronic encryption/authentication codes housed in monitoring devices. This always invites the question of implementation and protection of authentication information in an electronic component necessitating EMI shielding, possibly an on board power source to maintain the information in memory. By using atomic layer deposition techniques (ALD) on photonic band gap (PBG) optical fibers we will explore the potential to randomly manipulate the output spectrum and intensity of an input light source. This randomization could produce unique signatures authenticating devices with the potential to authenticate data. An external light source projected through the fiber with a spectrometer at the exit would 'read' the unique signature. No internal power or computational resources would be required.

Grubbs, Robert K.; Romero, Juan A.

2010-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

User Environment  

NLE Websites -- All DOE Office Websites (Extended Search)

User Environment Environment on Genepool When you log into the Genepool system you will land in your $HOME directory on NERSC's "global homes" file system. The global homes file system is mounted across all NERSC computation systems with the exception of PDSF. The $HOME directory has quota of 40GB and 1,000,000 inodes. To customize your environment, by setting environment variables or aliases, you will need to modify one of the "dot" files that NERSC has created for you. You may NOT modify the .bashrc or .cshrc files. These are set to read-only on NERSC systems and specify system specific customizations. Instead you should modify a file called .bashrc.ext or .cshrc.ext. Learn more about the global homes user environment. Important Environment Variables

182

User's Manual  

NLE Websites -- All DOE Office Websites (Extended Search)

User's User's Manual for Pelegant - Yusong Wang, Michael Borland, Robert Soliday - APS Accelerator Systems Division, Advanced Photon Source 1 Introduction Pelegant stands for "parallel elegant," which is a parallelized version of elegant [1]. Written in the C programming language with MPICH, the Pelegant has been successfully ported to several clusters and supercomputers, such as the "weed" cluster (a heterogeneous system of 100 CPUs) at Advanced Photon Source (APS), and the Jazz cluster (350 Intel Xeon CPUs) at Argonne National Lab (ANL) and the BlueGene/L supercomputer (1024 dual PowerPC 440 nodes) at Argonne National Lab. Thanks to careful design in parallelization and good architecture of the serial elegant, the Pelegant achieves very good performance. For example, for a simulation of 10 5 particles in APS including symplectic element-by-element tracking,

183

V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache Tomcat Bug Lets Remote Users Bypass Security 0: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints December 5, 2012 - 1:00am Addthis PROBLEM: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints PLATFORM: Version(s): 6.0.0 - 6.0.35, 7.0.0 - 7.0.29 ABSTRACT: A vulnerability was reported in Apache Tomcat. REFERENCE LINKS: Apache Tomcat Red Hat Bugzilla - Bug 883634 SecurityTracker Alert ID: 1027833 CVE-2012-3546 IMPACT ASSESSMENT: High DISCUSSION: When using FORM authentication it was possible to bypass the security constraint checks in the FORM authenticator by appending /j_security_check to the end of the URL if some other component (such as the Single-Sign-On valve) had called request.setUserPrincipal() before the call to

184

V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny 6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code January 24, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Cisco Wireless LAN Controller. PLATFORM: The vulnerabilities are reported in: Cisco 2000 Series WLC Cisco 2100 Series WLC Cisco 2500 Series WLC Cisco 4100 Series WLC Cisco 4400 Series WLC Cisco 5500 Series WLC Cisco 7500 Series WLC Cisco 8500 Series WLC Cisco 500 Series Wireless Express Mobility Controllers Cisco Wireless Services Module (Cisco WiSM) Cisco Wireless Services Module version 2 (Cisco WiSM version 2)

185

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

gain 'SYS' privileges on the target system. http:energy.govcioarticlesu-233-oracle-database-indextype-ctxsyscontext-bug-lets-remote-authenticated-users-gain Article Small...

186

Survey Research on gain scheduling  

Science Conference Proceedings (OSTI)

Current research on gain scheduling is clarifying customary practices as well as devising new approaches and methods for the design of nonlinear control systems. Keywords: Gain scheduling, Linear parameter-varying systems, Nonlinear control systems

Wilson J. Rugh; Jeff S. Shamma

2000-10-01T23:59:59.000Z

187

User Meeting Awards  

NLE Websites -- All DOE Office Websites (Extended Search)

User Meeting Awards Print ALS User Meeting Awards See the 2012 ALS User Meeting Award Winners Home Agenda Awards Exhibitors Lodging Posters Registration Transportation Workshops...

188

2012 ALS User Meeting  

NLE Websites -- All DOE Office Websites (Extended Search)

2012 ALS User Meeting 2012 ALS User Meeting Print Tuesday, 14 June 2011 12:37 user meeting web banner Home Agenda Awards Exhibitors Lodging Posters Registration Transportation...

189

NERSC Users Group  

NLE Websites -- All DOE Office Websites (Extended Search)

Policies Data Analytics & Visualization Science Gateways User Surveys NERSC Users Group Teleconferences Annual Meetings NUGEX Elections Charter User Announcements Help Operations...

190

SSRL Users' Organization Ballot  

NLE Websites -- All DOE Office Websites (Extended Search)

2003 SSRL Users' Organization Executive Committee (SSRLUO-EC) Ballot The SSRL Users' Organization Executive Committee represents the scientific user community to the SSRL...

191

ALS Users' Association Charter  

NLE Websites -- All DOE Office Websites (Extended Search)

Users' Executive Committee ALS Users' Association Charter Print The purpose of the Advanced Light Source Users' Association (ALSUA) is to provide an organized framework for the...

192

User Facilities - Learn More  

NLE Websites -- All DOE Office Websites (Extended Search)

Neutron Source Search by Equipment or Process User Portal Quick Links ORNL home User facility contacts ORNL Guest House Open Helpful Travel Information Learn More User...

193

A location based security framework for authenticating mobile phones  

Science Conference Proceedings (OSTI)

Although the utilisation of location information in mobile network access systems has given rise to a variety of applications and services, it is thought that the underlying service authentication model and the related security can be further enhanced. ...

Lishoy Francis; Keith Mayes; Gerhard Hancke; Konstantinos Markantonakis

2010-11-01T23:59:59.000Z

194

Bootstrapping Timed Efficient Stream Loss-Tolerant Authentication (TESLA)  

E-Print Network (OSTI)

This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards " (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (2006). TESLA, the Timed Efficient Stream Loss-tolerant Authentication protocol, provides source authentication in multicast scenarios. TESLA is an efficient protocol with low communication and computation overhead that scales to large numbers of receivers and also tolerates packet loss. TESLA is based on loose time synchronization between the sender and the receivers. Source authentication is realized in TESLA by using Message Authentication Code (MAC) chaining. The use

Request Comments; H. Tschofenig; Status Of This Memo

2006-01-01T23:59:59.000Z

195

Efficient password-based authenticated key exchange without public information  

Science Conference Proceedings (OSTI)

Since the first password-based authenticated key exchange (PAKE) was proposed, it has enjoyed a considerable amount of interest from the cryptographic research community. To our best knowledge, most of proposed PAKEs based on Diffie-Hellman key exchange ...

Jun Shao; Zhenfu Cao; Licheng Wang; Rongxing Lu

2007-09-01T23:59:59.000Z

196

U-130: JBoss Operations Network LDAP Authentication Bug Lets...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to an error within the Lightweight Directory Access Protocol (LDAP) authentication when handling invalid bind account credentials, which can be exploited to log-in to LDAP-based...

197

T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

not checked realm values were not checked the server secret was hard-coded to a known string The result of these weaknesses is that DIGEST authentication was only as secure as...

198

T-659: Update support for RSA Authentication Manager | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Manager July 1, 2011 - 7:15am Addthis PROBLEM: Authentication Manager SP4 Patch 4 Windows Server 2008 PLATFORM: Windows Server 2008 SP4 Patch 4 32bit & 64bit (architectures)...

199

User Meeting Awards  

NLE Websites -- All DOE Office Websites (Extended Search)

User Meeting Awards User Meeting Awards Print Monday, 20 June 2011 14:12 ALS User Meeting Awards See the 2012 ALS User Meeting Award Winners Home Agenda Awards Exhibitors Lodging...

200

Science Accelerator : User Account  

NLE Websites -- All DOE Office Websites (Extended Search)

Reset your password Enter either your User Name or Email Address to reset your password. User Name: Email Address: Go...

Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

INCISM: Users Manual  

E-Print Network (OSTI)

AND HIGHWAYS INCISIM: USERS MANUAL June 28, 2000 Heng LiuBERKELEY INCISIM: Users Manual Heng Liu, Randolph Hall

Liu, Heng; Hall, Randolph

2000-01-01T23:59:59.000Z

202

SOAJ Search : User Account  

Office of Scientific and Technical Information (OSTI)

Reset your password Enter either your User Name or Email Address to reset your password. User Name: Email Address: Go...

203

Greenhouse Gas and Air Pollution Interactions and Synergies (GAINS) | Open  

Open Energy Info (EERE)

Greenhouse Gas and Air Pollution Interactions and Synergies (GAINS) Greenhouse Gas and Air Pollution Interactions and Synergies (GAINS) Jump to: navigation, search Tool Summary Name: Greenhouse Gas and Air Pollution Interactions and Synergies (GAINS) Agency/Company /Organization: International Institute for Applied Systems Analysis (IIASA) Sector: Energy, Land Topics: Co-benefits assessment, GHG inventory Resource Type: Software/modeling tools User Interface: Website Complexity/Ease of Use: Not Available Website: gains.iiasa.ac.at/index.php/home-page/241-on-line-access-to-gains Cost: Free UN Region: Eastern Africa, Middle Africa, Northern Africa, Southern Africa, Western Africa, Caribbean, Central America, South America, Northern America, Central Asia, Eastern Asia, Southern Asia, South-Eastern Asia, Western Asia, Eastern Europe, Northern Europe, Southern Europe, Western Europe, Australia and New Zealand, Melanesia, Micronesia, Polynesia

204

APS User News, Issue 67  

NLE Websites -- All DOE Office Websites (Extended Search)

Overview Visiting the APS Mission & Goals Find People Organization Charts Committees Job Openings User Information Prospective Users New Users Current Users APS User Portal...

205

Diversity Results for DSTC-ICRec and DSTC Joint-user ML decoding  

E-Print Network (OSTI)

normalized receive SNR for diversity gain calcula- tion,”ciency. Further, we provide diversity gain analysis for theML decoding in (4). The diversity analysis for multi-user

Li, Liangbin; Jing, Yindi; Jafarkhani, Hamid

2010-01-01T23:59:59.000Z

206

From product concept to user experience: exploring UX potentials at early product stages  

Science Conference Proceedings (OSTI)

The focus on users' needs and emotions while interacting with products is a key factor for product success. As the field of User Experience (UX) explores these needs and their fulfilment, it gains in importance against the background of the wish for ... Keywords: concept testing, design methods, participatory design, user experience, user-driven innovation

Sandra Sproll; Matthias Peissner; Christina Sturm

2010-10-01T23:59:59.000Z

207

Ultra-wideband Location Authentication for Item Tracking  

SciTech Connect

International safeguards is increasingly utilizing unattended and remote monitoring methods to improve inspector efficiency and the timeliness of diversion detection. Item identification and tracking has been proposed as one unattended remote monitoring method, and a number of radio-frequency (RF) technologies have been proposed. When utilizing location information for verification purposes, strong assurance of the authenticity of the reported location is required, but most commercial RF systems are vulnerable to a variety of spoofing and relay attacks. ORNL has developed a distance bounding method that uses ultra-wideband technology to provide strong assurance of item location. This distance bounding approach can be coupled with strong symmetric key authentication methods to provide a fully authenticable tracking system that is resistant to both spoofing and relay attacks. This paper will discuss the overall problems associated with RF tracking including the common spoofing and relay attack scenarios, the ORNL distance bounding approach for authenticating location, and the potential applications for this technology.

Rowe, Nathan C [ORNL; Kuhn, Michael J [ORNL; Stinson, Brad J [ORNL; Holland, Stephen A [ORNL

2012-01-01T23:59:59.000Z

208

U-030: Apache Tomcat Lets Untrusted Web Applications Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

30: Apache Tomcat Lets Untrusted Web Applications Gain Elevated 30: Apache Tomcat Lets Untrusted Web Applications Gain Elevated Privileges U-030: Apache Tomcat Lets Untrusted Web Applications Gain Elevated Privileges November 9, 2011 - 8:30am Addthis PROBLEM: Apache Tomcat Lets Untrusted Web Applications Gain Elevated Privileges. PLATFORM: Apache Tomcat 7.0.0-7.0.21. ABSTRACT: An untrusted web application can access Manager application functions. reference LINKS: Apache Tomcat 7.x vulnerabilities SecurityTracker Alert ID: 1026295 CVE-2011-3376 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apache Tomcat. A local user (application) can obtain elevated privileges on the target system. A local web application (that is not trusted) can access Manager application functions without being marked as privileged. This can be exploited to obtain

209

Safety for Users  

NLE Websites -- All DOE Office Websites (Extended Search)

Safety for Users Safety for Users Print Tuesday, 01 September 2009 08:01 Safety at the ALS The mission of the ALS is "Support users in doing outstanding science in a safe...

210

2012 User Meeting Agenda  

NLE Websites -- All DOE Office Websites (Extended Search)

need JavaScript enabled to view it User Meeting Archives Users' Executive Committee The 2012 ALS User Meeting was held Monday, October 8 through Wednesday, October 10. Some of...

211

2012 NERSC User Survey  

NLE Websites -- All DOE Office Websites (Extended Search)

Results 2012 User Survey Text 2012 NERSC User Survey Text The 2012 NERSC User Survey is closed. The following is the text of the survey. Section 1: Overall Satisfaction with...

212

ALS User Meeting Archives  

NLE Websites -- All DOE Office Websites (Extended Search)

ALS User Meeting Archives ALS User Meeting Archives Print Monday, 06 June 2011 09:25 Past User Meeting Agendas, Workshops, and Awards Year Agenda Workshops David A. Shirley...

213

STANDARD USER AGREEMENT  

NLE Websites -- All DOE Office Websites (Extended Search)

USER. CONTRACTOR is not obligated to continue to provide USER access to andor use of the User Facility unless it is holding an adequate advance. Upon completion of the project...

214

U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary 8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code January 25, 2012 - 6:00am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. PLATFORM: Version(s): 12.5 SP3; pcAnywhere Solutions 7.1 GA, SP 1, and SP 2 ABSTRACT: Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain elevated privileges on the target system. reference LINKS: Symantec Advisory Secunia Advisory SecurityTracker Alert ID:102576 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted data to TCP port 5631 to trigger a but in the validation of authentication data and execute arbitrary code.

215

Identification of User Facility Related Publications  

SciTech Connect

Scientific user facilities provide physical resources and technical support that enable scientists to conduct experiments or simulations pertinent to their respective research. One metric for evaluating the scientific value or impact of a facility is the number of publications by users as a direct result of using that facility. Unfortunately, for a variety of reasons, capturing accurate values for this metric proves time consuming and error-prone. This work describes a new approach that leverages automated browser technology combined with text analytics to reduce the time and error involved in identifying publications related to user facilities. With this approach, scientific user facilities gain more accurate measures of their impact as well as insight into policy revisions for user access.

Patton, Robert M [ORNL; Stahl, Christopher G [ORNL; Potok, Thomas E [ORNL; Wells, Jack C [ORNL

2012-01-01T23:59:59.000Z

216

Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding author)  

E-Print Network (OSTI)

1 Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding in the process algebra Communicating Sequential Processes (CSP) to specify authentication. The purpose, security protocols, CSP, formal specification, Kerberos 1. Introduction Schneider [1] uses Communicating

Doran, Simon J.

217

Design and Implementation of a Zero-Knowledge Authentication Framework for Java Card  

Science Conference Proceedings (OSTI)

Zero-knowledge authentication protocols are an alternative to authentication protocols based on public key cryptography. Low processing and memory consumption make them especially suitable for implementation in smart card microprocessors, which are severely ...

Kenan Kalajdzic; Ahmed Patel; Laleh Golafshan; Mona Taghavi

2011-07-01T23:59:59.000Z

218

Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis  

E-Print Network (OSTI)

Authentication schemes relying on per-packet signature and per-signature verification introduce heavy cost for computation and communication. Due to its constraint resources, smart grid's authentication requirement cannot ...

Li, Depeng

219

V-212: Samba smbd CPU Processing Loop Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Samba smbd CPU Processing Loop Lets Remote Users Deny 2: Samba smbd CPU Processing Loop Lets Remote Users Deny Service V-212: Samba smbd CPU Processing Loop Lets Remote Users Deny Service August 6, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba PLATFORM: Samba 3.0.x - 4.0.7 ABSTRACT: All current released versions of Samba are vulnerable to a denial of service on an authenticated or guest connection REFERENCE LINKS: Secunia Advisory SA54436 Samba Security Release CVE-2013-4124 IMPACT ASSESSMENT: Medium DISCUSSION: A malformed packet can cause the smbd server to loop the CPU performing memory allocations and preventing any further service. A connection to a file share, or a local account is needed to exploit this problem, either authenticated or unauthenticated if guest connections are allowed. This

220

U-188: MySQL User Login Security Bypass and Unspecified Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: MySQL User Login Security Bypass and Unspecified 8: MySQL User Login Security Bypass and Unspecified Vulnerability U-188: MySQL User Login Security Bypass and Unspecified Vulnerability June 12, 2012 - 7:00am Addthis PROBLEM: A security issue and vulnerability have been reported in MySQL PLATFORM: MySQL 5.x ABSTRACT: An error when verifying authentication attempts can be exploited to bypass the authentication mechanism. Reference LINKS: Original Advisory CVE-2012-2122 Secunia Advisory 49409 IMPACT ASSESSMENT: High Discussion: Successful exploitation of this vulnerability requires MySQL to be built on a system with a library that allows "memcmp()" to return a value outside of the -128 through 127 range (e.g. sse-optimized glibc). NOTE: Vendor binaries are reportedly not affected. The security issue is reported in versions prior to 5.1.63 and 5.5.25.

Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

2012 User Meeting Workshops  

NLE Websites -- All DOE Office Websites (Extended Search)

User Meeting Workshops Print 2012 ALS User Meeting Workshops Home Agenda Awards Exhibitors Lodging Posters Registration Transportation Workshops This e-mail address is being...

222

Users Meeting 2007  

NLE Websites -- All DOE Office Websites (Extended Search)

Americas - Sky Shows at the Adler Planetarium UChicago Argonne, LLC - User Meeting banquet What's Different This Year: The Users Meeting this year has a few new twists. The...

223

Partner User Information  

NLE Websites -- All DOE Office Websites (Extended Search)

User Policies and Procedures page. Types of Partner Users Collaborative Access Teams (CATs)-an external group that builds and operates a beamline Collaborative Development Team...

224

NSLS User Access  

NLE Websites -- All DOE Office Websites (Extended Search)

After checking in with the Guest, User, Visitor (GUV) Center, and upon arrival at the NSLS, Beamline Operation and Safety Awareness (BLOSA) training is required for all users....

225

ARM - Become a User  

NLE Websites -- All DOE Office Websites (Extended Search)

ARMBecome a User About Become a User Recovery Act Mission FAQ History Organization Participants Facility Statistics Forms Contacts Facility Documents ARM Management Plan (PDF,...

226

Baytap08 User's Manual  

E-Print Network (OSTI)

Baytap08 User’s Manual OriginalBAYTAP-G Manual by Y. Tamura National AstronomicalProgram version 1.9; Manual date 30 June 2008 Introduction

Tamura, Y; Agnew, D C

2008-01-01T23:59:59.000Z

227

ZAP User's Manual  

E-Print Network (OSTI)

Division ZAP USER'S MANUAL M.S. Zisman, S. Chattopadhyay,21270 ESG-15 ZAP USER'S MANUAL* Michael S. Zisman, Swapanthe typed version of this manual. REFERENCES A. Hofmann, "

Bisognano, J.J.

2010-01-01T23:59:59.000Z

228

Current Projects: Product Authenticity Tags - Vulnerability Assessment Team  

NLE Websites -- All DOE Office Websites (Extended Search)

Product Authenticity Tags Product Authenticity Tags VAT Projects Introducing the VAT Adversarial Vulnerability Assessments Safety Tags & Product Counterfeiting Election Security Spoofing GPS Defeating Existing Tamper-Indicating Seals Specialty Field Tools & Sampling Tools Insider Threat Mitigation Drug Testing Security Microprocessor Prototypes The Journal of Physical Security Vulnerability Assessments Vulnerability Assessments Insanely Fast µProcessor Shop Insanely Fast µProcessor Shop Seals About Seals Applications of Seals Common Myths about Tamper Indicating Seals Definitions Findings and Lessons Learned New Seals Types of Seals Seals References Selected VAT Papers Selected VAT Papers Selected Invited Talks Self-Assessment Survey Security Maxims Devil's Dictionary of Security Terms Argonne's VAT (brochure)

229

Secure Access Control Through Challenge and Response Authentication  

E-Print Network (OSTI)

compares various types of key technology (mechanical, magnetic, contact, RFID), and evaluates these keys for their strengths and weaknesses. Keys with challenge and response authentication overcome the limitations of the traditional static data keys. The challenge and response concept is discussed; suitable keys are presented and compared. The document concludes with an explanation of why challenge and response authentication is more secure than concepts that rely on static data. A version of this app note was published by Embedded.com on March 15, 2011.

unknown authors

2011-01-01T23:59:59.000Z

230

Authentication and protection for e-finance consumers: the dichotomy of cost versus ease of use  

Science Conference Proceedings (OSTI)

Multifactor authentication is a tool to combat identity theft and is mandated by the Federal Financial Institutions Examination Council. However, there are only a few US financial institutions that have implemented two-factor authentication. A goal for ... Keywords: biometrics, e-banking, e-finance, electronic banking, electronic finance, identity theft, internet, multifactor authentication, online ID theft, online banking, phishing, security token, web authentication

Seungjae Shin; Jerry Cunningham; Jungwoo Ryoo; Jack E. Tucci

2009-03-01T23:59:59.000Z

231

Neutron and Nano User Meeting  

NLE Websites -- All DOE Office Websites (Extended Search)

User Workshops: New Techniques, New Users, and Enhancing the User Experience Please click HERE for the agenda....

232

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song  

E-Print Network (OSTI)

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast authentication protocol of receivers, and tolerates packet loss. TESLA is based on loose time synchronization between the sender

Tygar, Doug

233

Improvement on Pretty-Simple Password Authenticated Key-Exchange Protocol for Wireless Networks  

Science Conference Proceedings (OSTI)

This paper presents an improved method inspired by the recently proposed Pretty-Simple PAKE (Password Authenticated Key-Exchange) protocol, which is already a well-known, robust and simple password authenticated key exchange scheme. In our even more ... Keywords: elliptic curve discrete logarithm, key exchange, password authentication, wireless network

Ting-Yi Chang; Chou-Chen Yang; Chia-Meng Chen

2004-04-01T23:59:59.000Z

234

Comparative study of multicast authentication schemes with application to wide-area measurement system  

Science Conference Proceedings (OSTI)

Multicasting refers to the transmission of a message to multiple receivers at the same time. To enable authentication of sporadic multicast messages, a conventional digital signature scheme is appropriate. To enable authentication of a multicast data ... Keywords: multicast authentication, multiple-time signature scheme, smart grid, wide-area measurement system

Yee Wei Law, Zheng Gong, Tie Luo, Slaven Marusic, Marimuthu Palaniswami

2013-05-01T23:59:59.000Z

235

Neutron and Nano User Meeting  

NLE Websites -- All DOE Office Websites (Extended Search)

Users Workshops "New Techniques, New Users, and Enhancing the User Experience" Oak Ridge National Laboratory, Building 5200 Monday and Thursday, August 12 and 15, 2013 The User...

236

User Questionnaire Page  

NLE Websites -- All DOE Office Websites (Extended Search)

Questionnaire Page 1 of 3 041613 TANDEM FACILITY USER QUESTIONNAIRE Organization: Contact Person:...

237

Franklin: User Experiences  

SciTech Connect

The newest workhorse of the National Energy Research Scientific Computing Center is a Cray XT4 with 9,736 dual core nodes. This paper summarizes Franklin user experiences from friendly early user period to production period. Selected successful user stories along with top issues affecting user experiences are presented.

National Energy Research Supercomputing Center; He, Yun (Helen); Kramer, William T.C.; Carter, Jonathan; Cardo, Nicholas

2008-05-07T23:59:59.000Z

238

User Centric Community Clouds  

Science Conference Proceedings (OSTI)

With the evolution in cloud technologies, users are becoming acquainted with seamless service provision. Nevertheless, clouds are not a user centric technology, and users become completely dependent on service providers. We propose a novel concept for ... Keywords: Cloud infrastructure, Identity management, User-centric systems

Joăo Paulo Barraca; Alfredo Matos; Rui L. Aguiar

2011-05-01T23:59:59.000Z

239

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network (OSTI)

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

Doran, Simon J.

240

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network (OSTI)

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a verification method described in [14]. The PVS formalization consists of a semantic embedding of CSP for this purpose [3, 16, 12, 9]. In [14], Schneider presents such a method based on CSP [7]. The approach relies

Dutertre, Bruno

Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Secure RFID authentication scheme for EPC class Gen2  

Science Conference Proceedings (OSTI)

Recently, much research has been actively conducted for a new kind of network environment ubiquitous computing. This paper will define the essential technology called "ad hoc network" and the "RFID technology" required by a ubiquitous environment. Therefore, ... Keywords: RFID, authentication, security

Dae-Hee Seo; Jang-Mi Baek; Dong-sub Cho

2009-02-01T23:59:59.000Z

242

Security problems with a chaos-based deniable authentication scheme  

E-Print Network (OSTI)

Recently, a new scheme was proposed for deniable authentication. Its main originality lied on applying a chaos-based encryption-hash parallel algorithm and the semi-group property of the Chebyshev chaotic map. Although original and practicable, its insecurity and inefficiency are shown in this paper, thus rendering it inadequate for adoption in e-commerce.

G. Alvarez

2004-12-09T23:59:59.000Z

243

Dashboard Task Monitor for managing ATLAS user analysis on the Grid  

E-Print Network (OSTI)

The organization of the distributed user analysis on the Worldwide LHC Computing Grid (WLCG) infrastructure is one of the most challenging tasks among the computing activities at the Large Hadron Collider. The Experiment Dashboard offers a solution that not only monitors but also manages (kill, resubmit) user tasks and jobs via a web interface. The ATLAS Dashboard Task Monitor provides analysis users with a tool that is independent of the operating system and GRID environment . This contribution describes the functionality of the application and its implementation details, in particular authentication, authorization and audit of the management operations.

Sargsyan, L; The ATLAS collaboration; Jha, M; Karavakis, E; Kokoszkiewicz, L; Saiz, P; Schovancova, J; Tuckett, D

2013-01-01T23:59:59.000Z

244

Dashboard Task Monitor for managing ATLAS user analysis on the Grid  

E-Print Network (OSTI)

The organization of the distributed user analysis on the Worldwide LHC Computing Grid (WLCG) infrastructure is one of the most challenging tasks among the computing activities at the Large Hadron Collider. The Experiment Dashboard offers a solution that not only monitors but also manages (kill, resubmit) user tasks and jobs via a web interface. The ATLAS Dashboard Task Monitor provides analysis users with a tool that is operating system and GRID environment independent. This contribution describes the functionality of the application and its implementation details, in particular authentication, authorization and audit of the management operations.

Sargsyan, L; The ATLAS collaboration; Jha, M; Karavakis, E; Kokoszkiewicz, L; Saiz, P; Schovancova, J; Tuckett, D

2013-01-01T23:59:59.000Z

245

An authentication infrastructure for today and tomorrow  

Science Conference Proceedings (OSTI)

The Open Software Foundation`s Distributed Computing Environment (OSF/DCE) was originally designed to provide a secure environment for distributed applications. By combining it with Kerberos Version 5 from MIT, it can be extended to provide network security as well. This combination can be used to build both an inter and intra organizational infrastructure while providing single sign-on for the user with overall improved security. The ESnet community of the Department of Energy is building just such an infrastructure. ESnet has modified these systems to improve their interoperability, while encouraging the developers to incorporate these changes and work more closely together to continue to improve the interoperability. The success of this infrastructure depends on its flexibility to meet the needs of many applications and network security requirements. The open nature of Kerberos, combined with the vendor support of OSF/DCE, provides the infrastructure for today and tomorrow.

Engert, D.E.

1996-06-01T23:59:59.000Z

246

VISION 2008 User's Guide  

NLE Websites -- All DOE Office Websites (Extended Search)

VISION 2008 User's Guide VISION 2008 User's Guide ANL-08/34 Energy Systems Division VISION 2008 User's Guide ANL-08/34 User's Guide by J. Ward Vehicle Technologies Program, U.S. Department of Energy, Energy Efficiency and Renewable Energy VISION model by A. Vyas and M. Singh Transportation Technology R&D Center, Argonne National Laboratory October 2008 VISION 2008 User's Guide October 2008 i Table of Contents Copyright Notification .............................................................................................................................. ii List of Abbreviations ................................................................................................................................ iii

247

U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service 31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service August 9, 2012 - 7:00am Addthis PROBLEM: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service PLATFORM: Version(s): ASA 5500 Series; 8.2 - 8.4 ABSTRACT: Two vulnerabilities were reported in Cisco ASA. A remote or remote authenticated user can cause denial of service conditions. reference LINKS: Release Notes for the Cisco ASA 5500 Series, 8.4(x) SecurityTracker Alert ID: 1027355 CVE-2012-2472 CVE-2012-2474 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in Cisco ASA. 1. On systems with SIP inspection enabled, a remote user can send specially crafted SIP traffic to cause the target device to create many identical

248

U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Red Hat Certificate System Bugs Let Remote Users Conduct 7: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks July 20, 2012 - 7:00am Addthis PROBLEM: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks PLATFORM: Red Hat Certificate System v8 ABSTRACT: Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate. reference LINKS: Advisory: RHSA-2012:1103-1 SecurityTracker Alert ID: 1027284 CVE-2012-2662 CVE-2012-3367 IMPACT ASSESSMENT: Medium Discussion: The Agent and End Entity pages do not properly filter HTML code from

249

U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Cisco Small Business SRP500 Series Bug Lets Remote Users 6: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands November 3, 2011 - 8:15am Addthis PROBLEM: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands. PLATFORM: The following models are affected when running firmware prior to version 1.1.24: Cisco SRP521W Cisco SRP526W Cisco SRP527W The following models are affected when running firmware prior to version 1.2.1: Cisco SRP541W Cisco SRP546W Cisco SRP547W ABSTRACT: A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system. reference LINKS: Advisory ID: cisco-sa-20111102-srp500 SecurityTracker Alert ID: 1026266

250

User_ViewRecords  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

User Records User Records © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Viewing User Records Purpose The purpose of this job aid is to guide users through the step-by-step process of viewing their records. Each task demonstrates viewing of different records. Task A. View To-Do List Enter the web address (URL) of the user application into your browser Address field and press the Enter key. Enter your user ID in the User ID textbox. Enter your password in the Password textbox. Click Sign In. View To-Do List (filter, view) 7 Steps Task A View Completed Work 8 Steps Task B View Curriculum Status and Details 11 Steps Task C 3 3 1 2 2 1 SuccessFactors Learning v 6.4 User Job Aid Viewing User Records

251

FACET User Facility  

NLE Websites -- All DOE Office Websites

AD SLACPortal > Accelerator Research Division > FACET User Facility AD SLACPortal > Accelerator Research Division > FACET User Facility Sign In Launch the Developer Dashboard SLAC National Accelerator Laboratory DOE | Stanford | SLAC | SSRL | LCLS | AD | PPA | Photon Science | PULSE | SIMES FACET User Facility : FACET An Office of Science User Facility Search this site... Search Help (new window) Top Link Bar FACET User Facility FACET Home About FACET FACET Experimental Facilities FACET Users Research at FACET SAREC Expand SAREC FACET FAQs FACET User Facility Quick Launch FACET Users Home FACET Division ARD Home About FACET FACET News FACET Users FACET Experimental Facilities FACET Research Expand FACET Research FACET Images Expand FACET Images SAREC Expand SAREC FACET Project Site (restricted) FACET FAQs FACET Site TOC All Site Content

252

EER of fixed and trainable fusion classifiers: A theoretical study with application to biometric authentication tasks  

E-Print Network (OSTI)

Biometric authentication is a process of verifying an identity claim using a person’s behavioural and physiological characteristics. Due to the vulnerability of the system to environmental noise and variation caused by the user, fusion of several biometric-enabled systems is identified as a promising solution. In the literature, various fixed rules (e.g. min, max, median, mean) and trainable classifiers (e.g. linear combination of scores or weighted sum) are used to combine the scores of several base-systems. How exactly do correlation and imbalance nature of base-system performance affect the fixed rules and trainable classifiers? We study these joint aspects using the commonly used error measurement in biometric authentication, namely Equal Error Rate (EER). Similar to several previous studies in the literature, the central assumption used here is that the class-dependent scores of a biometric system are approximately normally distributed. However, different from them, the novelty of this study is to make a direct link between the EER measure and the fusion schemes mentioned. Both synthetic and real experiments (with as many as 256 fusion experiments carried out on the XM2VTS benchmark score-level fusion data sets) verify our proposed theoretical modeling of EER of the two families of combination scheme. In particular, it is found that weighted sum can provide the best generalisation performance when its weights are estimated correctly. It also has the additional advantage that score normalisation prior to fusion is not needed, contrary to the rest of fixed fusion rules.

Norman Poh; Samy Bengio

2005-01-01T23:59:59.000Z

253

The User Agreement  

NLE Websites -- All DOE Office Websites (Extended Search)

User Agreement User Agreement Oak Ridge National Laboratory is home to a number of highly sophisticated experimental user facilities. These research facilities, instruments, and laboratories are designed to serve Laboratory researchers, engineers, and technical staff, as well as external researchers from universities, industries, foreign institutions and other government laboratories. Sharing these state-of-the-art facilities with the scientific, industrial, and technical communities provides access to unique and specialized technology, equipment and instrumentation without burdening the user with the astronomical capital costs of building such facilities. Characteristics of User Agreements * User Agreements come in two types; proprietary and non-proprietary. The characteristics of

254

User Facilities | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

USER PORTAL USER PORTAL BTRICBuilding Technologies Research Integration Center CNMSCenter for Nanophase Materials Sciences CSMBCenter for Structural Molecular Biology CFTFCarbon Fiber Technology Facility HFIRHigh Flux Isotope Reactor MDF Manufacturing Demonstration Facility NTRCNational Transportation Research Center OLCFOak Ridge Leadership Computing Facility SNSSpallation Neutron Source Keeping it fresh at the Spallation Neutron Source Nanophase material sciences' nanotech toolbox Home | User Facilities SHARE ORNL User Facilities ORNL is home to a number of highly sophisticated experimental user facilities that provide unmatched capabilities to the broader scientific community, including a growing user community from universities, industry, and other laboratories research institutions, as well as to ORNL

255

Argonne CNM: Industrial Users  

NLE Websites -- All DOE Office Websites (Extended Search)

For Industrial Users For Industrial Users The Center for Nanoscale Materials (CNM) has specific interest in growing the industrial user program and encourages researchers in industry to consider the capabilities and expertise we have to offer. As a CNM user, you have easy access to sophisticated scientific instrumentation geared toward nanoscience and nanotechnology. Moreover, our widely recognized staff researchers offer support in designing your experiments, using the equipment, and analyzing your data. Access to the CNM is through peer review of user proposals. Before you submit your first user proposal, we encourage you to contact any of our staff researchers, group leaders, the User Office, or division management to discuss the feasibility of your intended research using the expertise and facilities at the CNM. We are here to serve you as part of our user community and will be happy to address any questions you might have.

256

Fermilab Users' Meeting, 2009  

NLE Websites -- All DOE Office Websites (Extended Search)

Users Meeting Poster Fermilab Users' Meeting Users Meeting Poster Fermilab Users' Meeting June 3-4, 2009 The annual gathering of the Fermilab Users Organization will be held on June 3-4, 2009. This meeting is an opportunity for discussion of new physics results from the laboratory's experimental program, future initiatives at the lab, and thoughtful presentations from leaders of the scientific policy community. The meeting will also feature selected talks from outstanding young physicists. Topics to be covered at the Users Meeting include: Collider Physics Astro-particle Physics Neutrino Physics Future Plans Full Agenda Registration is now closed. NEW!: Pictures from the 2009 Users' Meeting can be found here. A poster session organized by the GSA will be held on June 3rd in the Atrium. The public lecture at this year's Users' Meeting will be given by Prof. Tom Katsouleas

257

NSLS Services | User Accounts  

NLE Websites -- All DOE Office Websites (Extended Search)

User Accounts User Accounts Operating Accounts (81000 accounts) General Users who are allocated beam time and Participating Research Teams (PRTs) or Contributing Users (CUs) who operate beamlines should establish a BNL operating account to cover the costs of materials while running an experiment, shipping, and/or miscellaneous BNL services (telephone & fax codes), if these needs are anticipated. The term of the purchase order must be specified and names of persons having signature authorization for charges against this account must be listed. Brookhaven's Fiscal Division will bill the user for any charges the user makes to the account. Users are obligated to pay outstanding debts promptly. All users should set up a $1,000 operating account to cover operating expenses while at the NSLS, such as charges for use of trades, shops, and

258

Teaching user interface prototyping  

Science Conference Proceedings (OSTI)

User interface prototyping is a proven technique for evaluating design alternatives and for obtaining user feedback. It is heavily employed by software development organizations. However, it is often ignored in computer science education. This paper ...

Charles E. Frank; David Naugler; Michael Traina

2005-06-01T23:59:59.000Z

259

ORNL Neutron Sciences Users  

NLE Websites -- All DOE Office Websites (Extended Search)

SHUG banner SNS-HFIR User Group The SNS-HFIR User Group (SHUG) consists of all persons interested in using the neutron scattering facilities at Oak Ridge. It provides input to the...

260

ALS User Meeting  

NLE Websites -- All DOE Office Websites (Extended Search)

User Meeting ALS User Meeting Print Tuesday, 14 June 2011 12:37 Due to the current lapse of federal funding, Berkeley Lab Web sites, including ALS sites, are accessible, but may...

Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

ORNL DAAC User Services  

NLE Websites -- All DOE Office Websites (Extended Search)

User Services Ready to Answer Your Questions The ORNL DAAC's User Services Office is the first point of contact for answering your questions concerning data and information held by...

262

TWOZONE USERS MANUAL  

E-Print Network (OSTI)

C C. ). ,.. TWOZONE Users Manual TWO-WEEK LOAN COpy This isBEV 78-2 TWOZONE Users Manual Ashok J. Gadgil, Gay Gibson,pp 633-67. NECAP Engineers Manual. Stephenson, D. G. and G.

Gadgil, Ashok J.

2008-01-01T23:59:59.000Z

263

TWOZONE USERS MANUAL  

E-Print Network (OSTI)

C C. ). ,.. TWOZONE Users Manual TWO-WEEK LOAN COpy This isBEV 78-2 TWOZONE Users Manual Ashok J. Gadgil, Gay Gibson,pp 633-67. NECAP Engineers Manual. Stephenson, D. G. and G.

Gadgil, Ashok J.

2010-01-01T23:59:59.000Z

264

SOAJ Search : User Account  

Office of Scientific and Technical Information (OSTI)

Create User Account User Name: Email Address: I want to: Always receive emails Receive emails if there are new results Never receive emails Email Format: HTML Text New Password:...

265

Hardware device to physical structure binding and authentication  

Science Conference Proceedings (OSTI)

Detection and deterrence of device tampering and subversion may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a binding of the hardware device and a physical structure. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generate an internal PUF value. Binding logic is coupled to receive the internal PUF value, as well as an external PUF value associated with the physical structure, and generates a binding PUF value, which represents the binding of the hardware device and the physical structure. The cryptographic fingerprint unit also includes a cryptographic unit that uses the binding PUF value to allow a challenger to authenticate the binding.

Hamlet, Jason R.; Stein, David J.; Bauer, Todd M.

2013-08-20T23:59:59.000Z

266

Defining the questions: a research agenda for nontraditional authentication in arms control  

Science Conference Proceedings (OSTI)

Many traditional authentication techniques have been based on hardware solutions. Thus authentication of measurement system hardware has been considered in terms of physical inspection and destructive analysis. Software authentication has implied hash function analysis or authentication tools such as Rose. Continuity of knowledge is maintained through TIDs and cameras. Although there is ongoing progress improving all of these authentication methods, there has been little discussion of the human factors involved in authentication. Issues of non-traditional authentication include sleight-of-hand substitutions, monitor perception vs. reality, and visual diversions. Since monitor confidence in a measurement system depends on the product of their confidences in each authentication element, it is important to investigate all authentication techniques, including the human factors. This paper will present an initial effort to identify the most important problems that traditional authentication approaches in safeguards have not addressed and are especially relevant to arms control verification. This will include a survey of the literature and direct engagement with nontraditional experts in areas like psychology and human factors. Based on the identification of problem areas, potential research areas will be identified and a possible research agenda will be developed.

Hauck, Danielle K [Los Alamos National Laboratory; Mac Arthur, Duncan W [Los Alamos National Laboratory; Smith, Morag K [Los Alamos National Laboratory; Thron, Jonathan L [Los Alamos National Laboratory; Budlong - Sylvester, Kory [Los Alamos National Laboratory

2010-01-01T23:59:59.000Z

267

DOSFAC2 user`s guide  

Science Conference Proceedings (OSTI)

This document describes the DOSFAC2 code, which is used for generating dose-to-source conversion factors for the MACCS2 code. DOSFAC2 is a revised and updated version of the DOSFAC code that was distributed with version 1.5.11 of the MACCS code. included are (1) an overview and background of DOSFAC2, (2) a summary of two new functional capabilities, and (3) a user`s guide. 20 refs., 5 tabs.

Young, M.L.; Chanin, D.

1997-12-01T23:59:59.000Z

268

Authenticated group Diffie-Hellman key exchange: theory and practice  

SciTech Connect

Authenticated two-party Diffie-Hellman key exchange allows two principals A and B, communicating over a public network, and each holding a pair of matching public/private keys to agree on a session key. Protocols designed to deal with this problem ensure A (B resp.)that no other principals aside from B (A resp.) can learn any information about this value. These protocols additionally often ensure A and B that their respective partner has actually computed the shared secret value. A natural extension to the above cryptographic protocol problem is to consider a pool of principals agreeing on a session key. Over the years several papers have extended the two-party Diffie-Hellman key exchange to the multi-party setting but no formal treatments were carried out till recently. In light of recent developments in the formalization of the authenticated two-party Diffie-Hellman key exchange we have in this thesis laid out the authenticated group Diffie-Hellman key exchange on firmer foundations.

Chevassut, Olivier

2002-10-03T23:59:59.000Z

269

V-163: Red Hat Network Satellite Server Inter-Satellite Sync...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Satellite server that could be reached, even if Inter-Satellite Sync support was disabled. IMPACT: A remote user can bypass authentication to gain access to all channel...

270

Photomultiplier tube gain regulating system  

DOE Patents (OSTI)

This invention relates to an improved system for regulating the gain of a photomultiplier tube, and was designed for use with the photomultiplier tubes of a GeMSAEC fast analyzers. It has the following advantages over the prior system: noise is virtually eliminated; sample analysis can begin after 3 to 4 revolutions of the rotor; fluorescent and light scattering solutions can be used as a reference; and the reference solution can be in any cuvette on the rotor.

Johnson, Wayne F. (Loudon, TN)

1976-01-01T23:59:59.000Z

271

STANDARD USER AGREEMENT  

NLE Websites -- All DOE Office Websites (Extended Search)

REV 6/3/2010 REV 6/3/2010 Proprietary User Agreement No. PR-14- BETWEEN UT-BATTELLE, LLC. ("CONTRACTOR") Operator of Oak Ridge National Laboratory (hereinafter "Laboratory") under U.S. Department of Energy (DOE) Contract No. DE-AC05-00OR22725 and NAME OF USER INSTITUTION ("USER") (Collectively, "the Parties") The obligations of the Contractor may be transferred and shall apply to any successor in interest to said Contractor continuing the operation of the DOE facilities involved in this Proprietary User Agreement. ARTICLE I. FACILITIES AND SCOPE OF WORK CONTRACTOR will make available to employees, consultants and representatives of USER

272

V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users 6: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges January 10, 2013 - 2:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: *Adobe Reader XI (11.0.0) for Windows and Macintosh *Adobe Reader X (10.1.4) and earlier 10.x versions for Windows and Macintosh *Adobe Reader 9.5.2 and earlier 9.x versions for Windows and Macintosh *Adobe Reader 9.5.1 and earlier 9.x versions for Linux *Adobe Acrobat XI (11.0.0) for Windows and Macintosh *Adobe Acrobat X (10.1.4) and earlier 10.x versions for Windows and

273

V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

66: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users 66: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges January 10, 2013 - 2:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: *Adobe Reader XI (11.0.0) for Windows and Macintosh *Adobe Reader X (10.1.4) and earlier 10.x versions for Windows and Macintosh *Adobe Reader 9.5.2 and earlier 9.x versions for Windows and Macintosh *Adobe Reader 9.5.1 and earlier 9.x versions for Linux *Adobe Acrobat XI (11.0.0) for Windows and Macintosh *Adobe Acrobat X (10.1.4) and earlier 10.x versions for Windows and

274

ALS User Meeting Archives  

NLE Websites -- All DOE Office Websites (Extended Search)

User Meeting Archives Print User Meeting Archives Print Past User Meeting Agendas, Workshops, and Awards Year Agenda Workshops David A. Shirley (Science) Klaus Halbach (Instrumentation) Tim Renner (Service) 2012 2012 User Meeting Agenda 2012 User Meeting Workshops 2012 ALS User Meeting Awards Carl Percival, Dudley Shallcross, Craig Taatjes and David Osborn (Sandia), for making the first direct measurements of the reactions of Criegee intermediates, and showing that their impact on tropospheric chemistry and climate may be substantially greater than previously assumed. 2012 ALS User Meeting Awards Jeff Dickert and Simon Morton of Berkeley Lab's Physical Biosciences Division for the invention and implementation of the Compact Variable Collimator (CVC), which has led to a dramatic increase in productivity of protein crystallography.

275

ALS User Meeting Archives  

NLE Websites -- All DOE Office Websites (Extended Search)

ALS User Meeting Archives ALS User Meeting Archives Past User Meeting Agendas, Workshops, and Awards Year Agenda Workshops David A. Shirley (Science) Klaus Halbach (Instrumentation) Tim Renner (Service) 2012 2012 User Meeting Agenda 2012 User Meeting Workshops 2012 ALS User Meeting Awards Carl Percival, Dudley Shallcross, Craig Taatjes and David Osborn (Sandia), for making the first direct measurements of the reactions of Criegee intermediates, and showing that their impact on tropospheric chemistry and climate may be substantially greater than previously assumed. 2012 ALS User Meeting Awards Jeff Dickert and Simon Morton of Berkeley Lab's Physical Biosciences Division for the invention and implementation of the Compact Variable Collimator (CVC), which has led to a dramatic increase in productivity of protein crystallography.

276

Safety for Users  

NLE Websites -- All DOE Office Websites (Extended Search)

Safety for Users Safety for Users Safety for Users Print Safety at the ALS The mission of the ALS is "Support users in doing outstanding science in a safe environment." All users and staff participate in creating a culture and environment where performing research using the proper safeguards and fulfilling all safety requirements result in the success of the facility and its scientific program. The documents and guidance below will assist users and staff to achieve these goals. How Do I...? A series of fact sheets that explain what users need to know and do when preparing to conduct experiments at the ALS. Complete Experiment Safety Documentation? Work with Biological Materials? Work with Chemicals? Work with Regulated Soil? Bring and Use Electrical Equipment at the ALS?

277

NSLS User Access | Training  

NLE Websites -- All DOE Office Websites (Extended Search)

Training Training Training for New Users and Users with Expired Training and/or Badges: All new users and users with expired badges must complete or update the training modules shown below prior to access to the experimental floor. The training can be completed online prior to arrival at the NSLS and is strongly recommended to save considerable time during check-in at the Guest, User, Visitor (GUV) Center in Building 400. Please note each training module is followed by an exam which asks for your name and guest number. If you do not already have a guest number, leave this entry blank. All new users and users with expired badges MUST arrive on a weekday (no weekends or holidays) and check in at the GUV Center so that your training can be verified and to receive a photo ID badge (new or updated). The GUV

278

Capacity planning for group-mobility users in OFDMA wireless networks  

Science Conference Proceedings (OSTI)

Because of the random nature of user mobility, the channel gain of each user in a cellular network changes over time causing the signal-to-interference ratio (SNR) of the user to fluctuate continuously. Ongoing connections may experience outage events ...

Ki-Dong Lee; Victor C. M. Leung

2006-04-01T23:59:59.000Z

279

2012 ALS User Meeting Awards  

NLE Websites -- All DOE Office Websites (Extended Search)

ALS User Meeting Awards Print Recipients of the 2012 Users' Executive Committee awards and Student Poster Competition were announced Tuesday, October 9, at the ALS User Meeting....

280

2012 ALS User Meeting Awards  

NLE Websites -- All DOE Office Websites (Extended Search)

Awards 2012 ALS User Meeting Awards Print Recipients of the 2012 Users' Executive Committee awards and Student Poster Competition were announced Tuesday, October 9, at the ALS User...

Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

2012 ALS User Meeting Awards  

NLE Websites -- All DOE Office Websites (Extended Search)

2 ALS User Meeting Awards Recipients of the 2012 Users' Executive Committee awards and Student Poster Competition were announced Tuesday, October 9, at the ALS User Meeting. David...

282

2012 ALS User Meeting Awards  

NLE Websites -- All DOE Office Websites (Extended Search)

2012 ALS User Meeting Awards Print Recipients of the 2012 Users' Executive Committee awards and Student Poster Competition were announced Tuesday, October 9, at the ALS User...

283

1998 NERSC User Survey Results  

NLE Websites -- All DOE Office Websites (Extended Search)

8 User Survey Results 1998 User Survey Results Respondent Summary NERSC has completed its first user survey since its move to Lawrence Berkeley National Laboratory. The survey is...

284

User Information | Advanced Photon Source  

NLE Websites -- All DOE Office Websites (Extended Search)

User Information The Advanced Photon Source provides a variety of guides, resources, and information for prospective, new, and current users. In this section: For Prospective Users...

285

2013 PDSF User Meering Minutes  

NLE Websites -- All DOE Office Websites (Extended Search)

Announcements and Meetings Monthly PDSF Users Meeting Users Meeting Minutes 2013 Minutes 2013 PDSF User Meeting Minutes September 3 Attending Craig, Alex, Yuen-Dat,...

286

ORNL Neutron Sciences User Contacts  

NLE Websites -- All DOE Office Websites (Extended Search)

Staff User Office neutronusers@ornl.gov User Program Manager Laura Morris Edwards Proposal System Gabrielle Boudreau Outreach Al Ekkebus User Assistants Robbie DeJarnette Lisa...

287

Counterfeit-resistant materials and a method and apparatus for authenticating materials  

DOE Patents (OSTI)

Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters, the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided&

Ramsey, J. Michael (Knoxville, TN); Klatt, Leon N. (Oak Ridge, TN)

2001-01-01T23:59:59.000Z

288

Counterfeit-resistant materials and a method and apparatus for authenticating materials  

DOE Patents (OSTI)

Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters; the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible. Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided.

Ramsey, J. Michael (Knoxville, TN); Klatt, Leon N. (Oak Ridge, TN)

2000-01-01T23:59:59.000Z

289

Cryptanalysis of Al-Riyami-Paterson's Authenticated Three Party Key Agreement Protocols  

E-Print Network (OSTI)

Recently, Al-Riyami and Paterson [1] proposed four authenticated tripartite key agreement protocols which make use of Weil pairing. In this paper, we show...

Kyungah Shim

2003-01-01T23:59:59.000Z

290

V-236: MediaWiki CentralAuth Extension Authentication Bypass...  

NLE Websites -- All DOE Office Websites (Extended Search)

IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an error when handling auto-logins and can be exploited to bypass the authentication mechanism by...

291

Zimbra for APS Users  

NLE Websites -- All DOE Office Websites (Extended Search)

Calendar Calendar Zimbra Calendar  ZWC Benefits: - Usable lab-wide, can schedule meetings with users and rooms outside APS - User friendly  Each Zimbra user has a personal calendar - Users migrated from Sun Calendar System optionally elected to migrate data from their personal calendar  With Zimbra, calendar terminology: - Appointments - Events - Meetings  Users can: - Create appointments - Create recurring events - Schedule all day events - Accept/Tentative/Reject an invitation with one click - Create additional calendars - Share their calendars with other users on and off-site - Delegate calendar management - Accept calendar shares - View calendar in various ways and print - Use color for quick calendar recognition - Schedule meetings * View multiple calendars to see potential scheduling

292

User_Login  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Logging In to SuccessFactors Learning Logging In to SuccessFactors Learning © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Logging In to SuccessFactors Learning Purpose The purpose of this job aid is to guide users through the step-by-step process of logging in to the SuccessFactors Learning Management System (LMS), retrieving your forgotten password and/or user ID, and using the LMS Help system. Task A. Log In to SuccessFactors Learning Enter the web address (URL) of the user application into your browser Address field and press the Enter key. Enter your user ID in the User ID textbox. Enter your password in the Password textbox. Click Sign In. 3 3 Log In to SuccessFactors Learning 5 Steps Task A Retrieve Forgotten Password and/or User

293

User_Navigation  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Online Learning Center v 6.4 Online Learning Center v 6.4 User Job Aid Navigation © 2012 Department of Energy - 1 - Online Learning Center (OLC) Job Aid: Navigation Purpose The purpose of this job aid is to guide users through the step-by-step process of navigating and identifying areas of the OLC, The Department of Energy's Learning Management System (LMS) user interface, and identifying some commonly used navigation icons. Identify Areas of the User Interface Task A Navigation Tips Task B How to Access in Online Learning Center Task C Online Learning Center v 6.4 User Job Aid Navigation © 2012 Department of Energy - 2 - Online Learning Center (OLC) Task A. Identify Areas of the OLC User Interface (OLC) Top Menu: Use the Home menu options in the top menu to navigate within the Online

294

APS Users Organization  

NLE Websites -- All DOE Office Websites (Extended Search)

APSUO APSUO By-Laws Steering Commitee Employment Meetings Compton Award Franklin Award APS Users Organization The APSUO is responsible for advising the APS Associate Laboratory Director in the following areas: The Organization will serve as an advocacy group for the Facility and its user community. The Organization will provide advice to the ALD on matters affecting the user community. The Organization will assure good communication between the APS user community and the APS management. APSUO By-Laws The by-laws upon which the APS User Organization is based. List of Steering Committee Members Steering committee for the APS Users Organization. Employment Bulletin Board APS-related employment opportunities. APSUO Steering Committee Meetings Minutes and presentations from the APSUO meetings.

295

User Financial Account Form  

NLE Websites -- All DOE Office Websites (Extended Search)

URA REVISED 2/20/13 URA REVISED 2/20/13 User Financial Account Form Establish a user financial account at SLAC to procure gases, chemicals, supplies or services to support your experiment at SLAC's user facilities and to send samples, dewars, or other equipment between SLAC and your institution. To open or renew your SLAC user financial account, complete and submit this form along with a Purchase Order (PO) from your institution. The PO should be made to SLAC National Accelerator Laboratory for the amount of estimated expenditures (the suggested minimum is $1,000). Send this form with the PO (or a letter from the financial officer of your institution) to: Jackie Kerlegan (SSRL) or Theresa Wong (LCLS) User Research Administration, MS 99 User Research Administration, MS 99 SLAC National Accelerator Laboratory

296

JGI User Meeting 2007  

NLE Websites -- All DOE Office Websites (Extended Search)

Second Annual Second Annual DOE Joint Genome Institute User Meeting Marriott Hotel Walnut Creek, California March 28-30, 2007 The U.S. Department of Energy Joint Genome Institute (JGI) welcomed its users and collaborators, as well as prospective new users, to the second annual JGI User Meeting. This international gathering of researchers with an interest in sequence-based science offered three days of user presentations, tours, workshops, and poster sessions. This was a unique opportunity to meet fellow users and JGI staff. Sessions and posters in the fields of microbial genomics, microbial communities, eukaryotic genomics, and genome technologies were presented. ©2006-2007, The Regents of the University of California. Last updated May 9, 2007. Disclaimer | Webmaster Agenda

297

DragNDrop Directions v6 Windows Users: How do I access DragNDrop web documents to place or update them?  

E-Print Network (OSTI)

DragNDrop Directions v6 12/12/05 Windows Users: How do I access DragNDrop web documents to place/. ( or use smb://samba2/websites/). Authenticate (provide your PPPL Windows account username and password Windows account, or do not know what that username is you will need to contact Lena Scimeca first. If you

Princeton Plasma Physics Laboratory

298

NSLS Industrial User Program  

NLE Websites -- All DOE Office Websites (Extended Search)

| Industrial Program Coordinator | Publications Courtesy of The New York Times, Noah Berger The overall goal of the plan to enhance the NSLS facility's Industrial Users'...

299

User account | .EDUconnections  

Office of Scientific and Technical Information (OSTI)

.EDUconnections Bookmark and Share Home Spotlight Archive Contact Search this site: Search User account Log in Request new password Username: * Enter your .EDUconnections username....

300

2012 User Meeting Workshops  

NLE Websites -- All DOE Office Websites (Extended Search)

Workshops 2012 ALS User Meeting Workshops Home Agenda Awards Exhibitors Lodging Posters Registration Transportation Workshops This e-mail address is being protected from spambots....

Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

2012 User Meeting Agenda  

NLE Websites -- All DOE Office Websites (Extended Search)

2012 User Meeting Agenda Print Agenda Home Agenda Awards Exhibitors Lodging Posters Registration Transportation Workshops This e-mail address is being protected from spambots. You...

302

NERSC User Accounts  

NLE Websites -- All DOE Office Websites (Extended Search)

Accounts User Accounts (Logins) Acknowledge NERSC Please acknowledge in your pubications the role NERSC facilities played in your research. Read More How to get a NERSC account...

303

For Current Users: Resources  

NLE Websites -- All DOE Office Websites (Extended Search)

of the APS Users Organization, with featured scientific talks, updates from APS and DOE management, and special workshops. Administrative Contacts Contact information by area...

304

COMcheck Software User's Guide  

NLE Websites -- All DOE Office Websites (Extended Search)

COMcheck Software User's Guide for 90.1-2004 and 90.1-2007 Building Energy Codes Program Table Of Contents Overview ......

305

User Facility Agreement Form  

NLE Websites -- All DOE Office Websites (Extended Search)

5. Which Argonne user facility will be hosting you? * Advanced Leadership Computing Facility (ALCF) Advanced Photon Source (APS) Argonne Tandem Linear...

306

User Agreement Questionnaire  

NLE Websites -- All DOE Office Websites (Extended Search)

*required 5. Which user facility will be hosting you? *required Advanced Leadership Computing Facility (ALCF) Advanced Photon Source (APS) Argonne Tandem Linear Accelerator...

307

ALS User Meeting Archives  

NLE Websites -- All DOE Office Websites (Extended Search)

and Mike Scheinfein (Arizona State University) for development of the PEEM2 photoemission electron microscope. to the members of the ALS User Services Office (Ruth Pepe, Bernie...

308

User Facilities - Learn More  

NLE Websites -- All DOE Office Websites (Extended Search)

solving materials problems that limit the efficiency and reliability of systems for power generation and energy conversion, distribution and use. The six user centers in the High...

309

ORNL Neutron Sciences Users  

NLE Websites -- All DOE Office Websites (Extended Search)

Submission and Performance Statistics General User Proposal Program-Most recent proposal submission metrics and trending data. Performance metrics for HFIR and SNS FY 2011 Mid-Year...

310

User Facilities - Learn More  

NLE Websites -- All DOE Office Websites (Extended Search)

Shared Research Equipment (ShaRE) The Shared Research Equipment (ShaRE) User Facility at the Oak Ridge National Laboratory (ORNL) is one of three Electron Beam...

311

EMSL: User Access  

NLE Websites -- All DOE Office Websites (Extended Search)

WHAT CAN EMSL DO FOR YOU? Researcher with microscope As a national scientific user facility with a diverse range of capabilities and expertise, EMSL has something to offer...

312

Fermilab Users' Executive Committee  

NLE Websites -- All DOE Office Websites (Extended Search)

- 1171 1970 USERS EXECUTIVE COMMITTEE ELECTION C. Baltay, Columbia 870 - 572 E. C. Fowler, Purdue (Chairman 1270-572) 870 - 572 G. Masek, UCSD 870 - 572 L. Pondrom,...

313

ORNL User Week 2010  

NLE Websites -- All DOE Office Websites (Extended Search)

User Week 2010 September 13 - 17, 2010, Oak Ridge National Laboratory, Oak Ridge, TN ORNL has an extensive history of collaborative research with colleagues in academia, other...

314

Photon Sciences | User Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Administration Postal Address User Administration Office Brookhaven National Laboratory 75 Brookhaven Avenue, Bldg. 725B Upton, NY 11973-5000 USA Office Hours Monday through...

315

STANDARD USER AGREEMENT  

allocating and scheduling usage of the User Facilities and equipment needed for or involved under this Agreement. ARTICLE VII: INDEMNITY AND LIABILITY***

316

BABAR Web job submission with Globus Authentication and AFS Access  

Science Conference Proceedings (OSTI)

We present two versions of a grid job submission system produced for the BaBar experiment. Both use globus job submission to process data spread across various sites, producing output which can be combined for analysis. The problems encountered with authorization and authentication, data location, job submission, and the input and output sandboxes are described, as are the solutions. The total system is still some way short of the aims of enterprises such as the EDG, but represent a significant step along the way.

Forti, Alessandra

2003-06-17T23:59:59.000Z

317

Towards user psychological profile  

Science Conference Proceedings (OSTI)

Recents studies have demonstrated how useful and fundamental psychological aspects such as people Personality Traits and Emotions are during human decision-making process. Some research towards the identification and model of user's Emotions have been ... Keywords: personality traits, recommendation, reputation, user psychological profile

Maria Augusta S. N. Nunes; Stefano A. Cerri; Nathalie Blanc

2008-10-01T23:59:59.000Z

318

A framework for federated two-factor authentication enabling cost-effective secure access to distributed cyberinfrastructure  

Science Conference Proceedings (OSTI)

As cyber attacks become increasingly sophisticated, the security measures used to mitigate the risks must also increase in sophistication. One time password (OTP) systems provide strong authentication because security credentials are not reusable, thus ... Keywords: OTP, XSEDE, authentication, radius

Matthew A. Ezell; Gary L. Rogers; Gregory D. Peterson

2012-07-01T23:59:59.000Z

319

CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider  

E-Print Network (OSTI)

CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider Department In this paper we consider the nature of machine proofs used in the CSP approach to the veri cation of authentication protocols using the process algebra CSP Hoa85]. The CSP syntax provides a natural and precise way

Doran, Simon J.

320

The TESLA Broadcast Authentication Protocol # Adrian Perrig Ran Canetti J. D. Tygar Dawn Song  

E-Print Network (OSTI)

The TESLA Broadcast Authentication Protocol # Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss­tolerant Authentication) broadcast au­ thentication numbers of receivers, and tolerates packet loss. TESLA is based on loose time synchro­ nization between

Perrig, Adrian

Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME  

E-Print Network (OSTI)

Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME Presented, Washington, DC 20375 E-mail: archer@itd.nrl.navy.mil The TESLA multicast stream authentication protocol just been revealed. While an informal argument for the correctness of TESLA has been published

322

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song  

E-Print Network (OSTI)

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast au- thentication numbers of receivers, and tolerates packet loss. TESLA is based on loose time synchro- nization between

Perrig, Adrian

323

Attacks and improvements to an RIFD mutual authentication protocol and its extensions  

Science Conference Proceedings (OSTI)

In WiSec'08, Song and Mitchell proposed an RFID mutual authentication protocol. Song also extended this protocol for RFID tag ownership transfer. These two protocols are designed to have the most security properties in the literature. We discover that, ... Keywords: authentication, privacy, rfid, security

Shaoying Cai; Yingjiu Li; Tieyan Li; Robert H. Deng

2009-03-01T23:59:59.000Z

324

Transaction-based authentication and key agreement protocol for inter-domain VoIP  

Science Conference Proceedings (OSTI)

We present an authentication and key agreement protocol to secure Voice over IP call establishment between interconnection proxies of different domains. The protocol operates on a transaction basis. Each transaction is defined as the set of operations ... Keywords: Authentication, DDoS Protection, Inter-domain VoIP, Synchronisation, VoIP security

Patrick Battistello; Joaquin Garcia-Alfaro; Cyril DeléTré

2012-09-01T23:59:59.000Z

325

Security Analysis of Lightweight Authentication Protocol from WISTP 2013 Wang Shao-HuiP  

E-Print Network (OSTI)

Security Analysis of Lightweight Authentication Protocol from WISTP 2013 Wang Shao-HuiP 1,2,3) P Key Laboratory for Wireless Sensor Networks, Nanjing 210003, China) P 3) P( Network and Data Security Frequency Identification (RFID) is security and privacy. Many RFID authentication protocols have been

International Association for Cryptologic Research (IACR)

326

Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems  

E-Print Network (OSTI)

Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems This paper studies the security requirements for remote authentication and communication in smart grid to smart grid systems. For example, in order to unlock the credentials stored in tamper

Wang, Yongge

327

U-234: Oracle MySQL User Login Security Bypass Vulnerability | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

234: Oracle MySQL User Login Security Bypass Vulnerability 234: Oracle MySQL User Login Security Bypass Vulnerability U-234: Oracle MySQL User Login Security Bypass Vulnerability August 14, 2012 - 7:00am Addthis PROBLEM: Oracle MySQL User Login Security Bypass Vulnerability PLATFORM: Version(s): prior to 5.1.63 and 5.5.25 are vulnerable. ABSTRACT: Oracle MySQL is prone to a security bypass vulnerability Attackers can exploit this issue to bypass certain security restrictions. REFERENCE LINKS: http://www.securityfocus.com/bid/53911/discuss CVE-2012-2122 IMPACT ASSESSMENT: Medium Discussion: Security researchers have released details about a vulnerability in the MySQL server that could allow potential attackers to access MySQL databases without inputting proper authentication credentials.The vulnerability is identified as CVE-2012-2122 and was addressed in MySQL 5.1.63 and 5.5.25 in

328

T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

94: IBM solidDB Password Hash Authentication Bypass 94: IBM solidDB Password Hash Authentication Bypass Vulnerability T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability April 4, 2011 - 6:08am Addthis PROBLEM: A vulnerability has been reported in IBM solidDB, which can be exploited by malicious people to bypass certain security restrictions. PLATFORM: IBM solidDB 4.x - IBM solidDB 6.x ABSTRACT: This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability. REFERENCE LINKS: IBM Security Alert Secunia Advisory: SA44030 ZDI Advisory: ZDI-11-115 IBM solidDB Support IMPACT ASSESSMENT: Medium Discussion: The specific flaw exists within the solid.exe process which listens by default on TCP ports 1315, 1964 and 2315. The authentication protocol

329

An Authentication Framework for Web Access to Remote ...  

Science Conference Proceedings (OSTI)

... The proliferation of computing platforms in the world often presents a ... (collision resistance) ... address, user status within the system (active or inactive ...

330

Radiological Toolbox User's Manual  

Science Conference Proceedings (OSTI)

A toolbox of radiological data has been assembled to provide users access to the physical, chemical, anatomical, physiological and mathematical data relevant to the radiation protection of workers and member of the public. The software runs on a PC and provides users, through a single graphical interface, quick access to contemporary data and the means to extract these data for further computations and analysis. The numerical data, for the most part, are stored within databases in SI units. However, the user can display and extract values using non-SI units. This is the first release of the toolbox which was developed for the U.S. Nuclear Regulatory Commission.

Eckerman, KF

2004-07-01T23:59:59.000Z

331

Office 2007 User Workshop  

NLE Websites -- All DOE Office Websites (Extended Search)

Office 2007 User Workshop Office 2007 User Workshop M. Westbrook, APS-IT June 30, 2010 Goal: Quick Start for New Office 2007 Users Introduce and highlight new Office 2007 program feature (Word, Excel and PowerPoint) Identify sources of help with Office 2007 Provide opportunity for users to share experiences Office 2007: Introduction  Format for today's presentation is that of a workshop rather than training course  Many of the new features presented here apply to multiple Office applications  Sources for more information are identified throughout the presentation  Presenter is no expert, but plans to share what has been learned thus far  Attendees are encouraged to share what you have learned for the benefit of all

332

User_TalentProfile  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Accessing and Modifying Talent Profile Accessing and Modifying Talent Profile © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Accessing and Modifying Talent Profile Purpose The purpose of this job aid is to guide users through the step-by-step process of accessing their talent profiles, adding information to their profiles, and editing existing talent profile information. Task A. Access Talent Profile Enter the web address (URL) of the user application into your browser Address field and press the Enter key. Enter your user ID in the User ID textbox. Enter your password in the Password textbox. Click Sign In. Access Talent Profile 4 Steps Task A Add Information to Talent Profile Sections 5 Steps Task B Edit Talent Profile Sections

333

REScheck Software User's Guide  

NLE Websites -- All DOE Office Websites (Extended Search)

REScheck Software REScheck Software User's Guide Building Energy Codes Program Table Of Contents Overview ................................................................................... 1 Tutorials ................................................................................. 2 Table Columns and Rows ............................................................. 3 Rows ...................................................................................... 3 Columns ................................................................................. 5 Project Information ..................................................................... 7 Location.................................................................................. 7 Project Type (2006 IECC) ..........................................................

334

JGI Compute User Training  

NLE Websites -- All DOE Office Websites (Extended Search)

JGI Compute JGI Compute User Training Series JGI Compute User Training Series homeh1 Overview NERSC and IT staff will host a series training sessions and open office hours to introduce new services and review best practices for using the Crius cluster. All sessions are hands on, so please bring your laptop. If you are or were a user of any of the following systems, Crius, Rhea, Kronos, Theia, Oceanus or Phoebe, it will be beneficial for you to attend these training sessions. And if you plan to use JGI compute resources in the future, we also encourage you to attend. It will also be an opportunity for JGI compute users to ask questions and give NERSC and IT staff feedback on your requirements. Session 3: February 24th, 2012 1:30-5pm rm 100-101 Agenda 1:30-1:45 - Intro and presentation of the transition schedule we talked

335

Bevalac user's handbook  

SciTech Connect

This report is a users manual on the Bevalac accelerator facility. This paper discuses: general information; the Bevalac and its operation; major facilities and experimental areas; and experimental equipment.

Not Available

1990-04-01T23:59:59.000Z

336

PARS II User Guide  

Energy.gov (U.S. Department of Energy (DOE))

This document serves as a reference manual to assist DOE end-users in performing their respective functions within the PARS II web application. The document provides a description and “How To” for...

337

International aeronautical user charges  

E-Print Network (OSTI)

Introduction: 1.1 BACKGROUND AND MOTIVATION Very few issues relating to the international air transportation industry are today as divisive as those pertaining to user charges imposed at international airports and enroute ...

Odoni, Amedeo R.

1985-01-01T23:59:59.000Z

338

User Meeting Awards  

NLE Websites -- All DOE Office Websites (Extended Search)

ALS User Community Tim Renner was a beamline scientist at the ALS who died at an early age, and who during his career touched everyone that knew him with his caring attitude to...

339

2011 User Meeting Agenda  

NLE Websites -- All DOE Office Websites (Extended Search)

11:00 The Energy Sciences Network: Moving Data, Advancing Science Eli Dart, LBNL ESnet 11:30 Lunch (ALS Patio and Exhibitor Tent) 12:45 2011 User Meeting Workshops 14:45...

340

ALS User Meeting  

NLE Websites -- All DOE Office Websites (Extended Search)

ALS User Meeting Print Due to the current lapse of federal funding, Berkeley Lab Web sites, including ALS sites, are accessible, but may not be updated until Congress approves...

Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Partner Users Council  

NLE Websites -- All DOE Office Websites (Extended Search)

Partner User Council Members Back Row (standing) from left: Andrzej Joachimiak (SBC-CAT), Bruce Bunker (MR-CAT), Jim Viccaro (CARS-CAT), Wayne Anderson (LS-CAT), Robert Gordon...

342

User Operation Manual  

NLE Websites -- All DOE Office Websites (Extended Search)

SNS-NSSD-TOF-TD-0002 - R00 SNS-NSSD-TOF-TD-0002 - R00 1 SEQUOIA Operations Manual for Users G.E. Granroth SEQUOIA Lead Instrument Scientist A.I. Kolesnikov SEQUOIA Instrument Scientist L.M. DeBeer-Schmitt SEQUOIA Scientific Associate T.E. Sherline Sample Environment Scientist Revised - May 13, 2013 SNS-NSSD-TOF-TD-0002 - R00 2 Abstract The SEQUOIA Operations Manual for Users presents a description of the SEQUOIA spectrometer located at beamline 17 (BL17) of the Spallation Neutron Source (SNS). It is the intent of this manual to inform the user regarding the SEQUOIA spectrometer and available sample environment, to run experiments, to access and analyze the collected data, and to provide the user with other potentially useful information. The first section serves to describe the components of which the instrument is comprised.

343

User’s guide Version 8 - Energy Information Administration  

U.S. Energy Information Administration (EIA)

Form EIA-176 Query System User’s guide Version 8.0 Energy Information Administration U.S. Department of Energy ...

344

Restoration Prioritization Toolset: Documentation and User’s Guides 2007  

SciTech Connect

This user’s guide provides technical background and details on the Restoration Prioritization Toolset developed for GoMRC as well as instructions for use.

Judd, Chaeli; Woodruff, Dana L.; Thom, Ronald M.; Anderson, Michael G.; Borde, Amy B.

2007-10-26T23:59:59.000Z

345

2012 ALS User Meeting Awards  

NLE Websites -- All DOE Office Websites (Extended Search)

2 ALS User Meeting Awards 2012 ALS User Meeting Awards Print Wednesday, 10 October 2012 15:30 Recipients of the 2012 Users' Executive Committee awards and Student Poster...

346

DYN-OPT Users Manual  

E-Print Network (OSTI)

Hall (1996). LANE-OPT Users Manual Version 1.0, PATH WorkingBERKELEY DYN-OPT Users Manual Cenk Caliskan Randolph W. Hall1055-1417 DYN-OPT Users Manual December, 1996 Cenk Caliskan

Caliskan, C.; Hall, R. W.

1997-01-01T23:59:59.000Z

347

Relay vs. User Cooperation in Time-Duplexed Multiaccess Networks  

E-Print Network (OSTI)

The performance of user-cooperation in a multi-access network is compared to that of using a wireless relay. Using the total transmit and processing power consumed at all nodes as a cost metric, the outage probabilities achieved by dynamic decode-and-forward (DDF) and amplify-and-forward (AF) are compared for the two networks. A geometry-inclusive high signal-to-noise ratio (SNR) outage analysis in conjunction with area-averaged numerical simulations shows that user and relay cooperation achieve a maximum diversity of K and 2 respectively for a K-user multiaccess network under both DDF and AF. However, when accounting for energy costs of processing and communication, relay cooperation can be more energy efficient than user cooperation, i.e., relay cooperation achieves coding (SNR) gains, particularly in the low SNR regime, that override the diversity advantage of user cooperation.

Sankar, Lalitha; Mandayam, Narayan B

2008-01-01T23:59:59.000Z

348

INSTRUCTIONS FOR USING HSPD-12 AUTHENTICATED OUTLOOK WEB ACCESS (OWA)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7/2013 Page 1 7/2013 Page 1 INSTRUCTIONS FOR USING HSPD-12 AUTHENTICATED OUTLOOK WEB ACCESS (OWA) Outlook Web Access provides access to unencrypted email only and is suitable for use from any computer. HSPD-12 OWA REQUIREMENTS: ď‚· An EITS provided Exchange email account ď‚· A DOE issued HSPD-12 badge ď‚· DOEnet or Internet access and a supported web browser ď‚· A smart card reader installed* on your computer (*Windows Vista, Windows XP, MAC OS X 10.7 & 10.8, will also require smart card software to be installed in order to read the HSPD-12 badge) HSPD-12 OWA LOGIN PROCEDURE: 1. Insert HSPD-12 badge into card reader

349

Holographic Labeling And Reading Machine For Authentication And Security Appications  

DOE Patents (OSTI)

A holographic security label and automated reading machine for marking and subsequently authenticating any object such as an identification badge, a pass, a ticket, a manufactured part, or a package is described. The security label is extremely difficult to copy or even to read by unauthorized persons. The system comprises a holographic security label that has been created with a coded reference wave, whose specification can be kept secret. The label contains information that can be extracted only with the coded reference wave, which is derived from a holographic key, which restricts access of the information to only the possessor of the key. A reading machine accesses the information contained in the label and compares it with data stored in the machine through the application of a joint transform correlator, which is also equipped with a reference hologram that adds additional security to the procedure.

Weber, David C. (Rancho Santa Margarita, CA); Trolinger, James D. (Costa Mesa, CA)

1999-07-06T23:59:59.000Z

350

Neutron and Nano User Meeting  

NLE Websites -- All DOE Office Websites (Extended Search)

Home Science @ Neutron and Nano Facilities User Workshops Integrated Agendas Venue Travel Information Contacts and Sponsors Registration Talks Neutron and Nano User Meeting August...

351

User contributions | Open Energy Information  

Open Energy Info (EERE)

(Geochart) 16:53, 31 January 2013 (diff | hist) . . (+95) . . User:JayhugginsTest (top) 16:31, 31 January 2013 (diff | hist) . . (+214) . . User:JayhugginsTest...

352

Diversity at Fermilab - User Contacts  

NLE Websites -- All DOE Office Websites (Extended Search)

User Contacts Fermilab users with concerns or questions about discriminatory treatment can get in touch with the designated Fermilab representative for each experiment. Mike...

353

T-567: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local 7: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges T-567: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges March 1, 2011 - 6:44pm Addthis PROBLEM: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges . PLATFORM: Linux Kernel 2.4.x, 2.6.x ABSTRACT: A vulnerability was reported in the Linux Kernel. A local user may be able to obtain elevated privileges on the target system. A physically local user can connect a storage device with a specially crafted LDM partition table to trigger a buffer overflow in the ldm_frag_add() function in 'fs/partitions/ldm.c' and potentially execute arbitrary code with elevated privileges. reference LINKS: Security Tracker - Alert ID: 1025128

354

T-567: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local 7: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges T-567: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges March 1, 2011 - 6:44pm Addthis PROBLEM: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges . PLATFORM: Linux Kernel 2.4.x, 2.6.x ABSTRACT: A vulnerability was reported in the Linux Kernel. A local user may be able to obtain elevated privileges on the target system. A physically local user can connect a storage device with a specially crafted LDM partition table to trigger a buffer overflow in the ldm_frag_add() function in 'fs/partitions/ldm.c' and potentially execute arbitrary code with elevated privileges. reference LINKS: Security Tracker - Alert ID: 1025128

355

U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code 6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code November 15, 2011 - 8:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Obtain Information and Let Local Users Bypass Authentication. PLATFORM: iOS 3.0 through 5.0 for iPhone 3GS iPhone 4 and iPhone 4S iOS 3.1 through 5.0 for iPod touch (3rd generation) and later iOS 3.2 through 5.0 for iPad, iOS 4.3 through 5.0 for iPad 2 ABSTRACT: A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system. reference LINKS: Apple Security Article: HT5052 Apple Product Security SecurityTracker Alert ID: 1026311 IMPACT ASSESSMENT:

356

Optimization Online - Lot sizing with inventory gains  

E-Print Network (OSTI)

Apr 27, 2006 ... Abstract: This paper introduces the single item lot sizing problem with inventory gains. This problem is a generalization of the classical single ...

357

User Charter Rights and Responsibilities of Neutron Sciences Users  

NLE Websites -- All DOE Office Websites (Extended Search)

-G01182/gim -G01182/gim User Charter Rights and Responsibilities of Neutron Sciences Users Rights of Users: * Be treated with respect and courtesy. * Have details of experiment proposals kept confidential. * Have consultations with instrument staff before proposal submission, during experiment planning, and while evaluating results and analyzing data. * Receive beam time on the basis of external peer evaluation of submitted proposals. Users can

358

SSO password-based multi-server authentication protocol  

Science Conference Proceedings (OSTI)

User's password verification information stored on the server is main point of vulnerability and remains attractive target for attacker. Proposed protocol uses two-server architecture so that password verification information is distributed between ...

Sandeep K. Sood; Anil K. Sarje; Kuldip Singh

2012-07-01T23:59:59.000Z

359

Forward-Secure Sequential Aggregate Authentication Di Ma, Gene Tsudik  

E-Print Network (OSTI)

different settings, scenarios and applica- tions. Examples abound in all kinds of tracking and monitoring point for human interface. (Some WSNs support user-driven data queries and commands through the sink in critical settings (e.g., radiation, s

360

V-231: Cisco Identity Services Engine Discloses Authentication...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update T-703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents...

Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

SLAC Linac Coherent Light Source User Site  

NLE Websites -- All DOE Office Websites (Extended Search)

User Support Contact information for LCLS scientific, operations and user support staff. User Support For information about user research administration at LCLS or SSRL. Cathy...

362

SOAJ Search : User Login  

Office of Scientific and Technical Information (OSTI)

Login Login The SOAJ Search ALERTS feature will automatically update you regarding newly available information in your specific area(s) of interest. Simply register for the service, then create a search strategy which will be run against information added to . Select a schedule (weekly, monthly, etc.) for receiving the email Alerts. If you are a new patron, Register to learn how to set up Alerts to meet your needs. If you are an existing patron, enter your user name and password in the boxes to login. Once logged in, you may review or modify your search, add a new search and see recent Alerts results. User Name: Password: Remember Me Remember me on this computer. Login Don't have a user name? Register! Forgot your password? Reset your password Alerts The Alerts function allows you to monitor a topic and receive timely

363

User_RunReports  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Running Standard Reports Running Standard Reports © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Running Standard Reports Purpose The purpose of this job aid is to guide users through the step-by-step process of running standard reports in SuccessFactors Learning. Task A. Run Standard Report From the Home page, click the Reports easy link. In the Report Name table, locate the report you want to generate. Click the expand icon ( ) to expand the report group. Click the title link. For this example, select the User Curriculum Status Group by Item Details report. Note: Click Help ( ) for additional information on reports. 1 1 2 2 3 3 Run Standard Report 13 Steps Task A SuccessFactors Learning v 6.4 User Job Aid

364

General User Proposal Scores  

NLE Websites -- All DOE Office Websites (Extended Search)

General User Proposal Scores General User Proposal Scores General User Proposal Scores Print Tuesday, 01 June 2010 10:34 Scoring Proposals are scored on a scale of 1 to 5, with 1 being the best score and 5 the worst. Reviewers are requested to use the following ranking schema: Must do High Priority Medium Priority Low priority Don't do Beam time is assigned based on each proposal's score in relation to all other proposals for a given beamline. For beamlines where beamtime requests exceed available beamtime, a cutoff score is assigned after which no beam time is allocated. proposal scores Beam Time Cutoff Scores for the Current Cycle The table below lists the percent of beam time shifts allocated/requested for each beamline, and the cutoff scores, below which no beam time was assigned.

365

User Electrical Inspection Criteria  

NLE Websites -- All DOE Office Websites (Extended Search)

User Electronic and Electrical Equipment Inspection Criteria User Electronic and Electrical Equipment Inspection Criteria Any electrical or electronic equipment users bring to the APS will have to be inspected. In some cases, this inspection will be quite simple, e.g., if the equipment has already been inspected by a Nationally Recognized Testing Laboratory (NRTL) and is used for its designed purpose. Other equipment will require a more thorough inspection (this may include NRTL inspected equipment if it is assembled into an apparatus with other components). The inspection is based on an eight-part list of criteria. Paraphrased, those criteria are: The equipment must be suitable for its intended use (and if appropriate, installation). For example, a heater controller intended to control a 1000W heater cannot be used to control a 2000W heater. The

366

Science Accelerator : User Login  

NLE Websites -- All DOE Office Websites (Extended Search)

Login Login The Science Accelerator ALERTS feature will automatically update you regarding newly available information in your specific area(s) of interest. Simply register for the service, then create a search strategy which will be run against information added to . Select a schedule (weekly, monthly, etc.) for receiving the email Alerts. If you are a new patron, Register to learn how to set up Alerts to meet your needs. If you are an existing patron, enter your user name and password in the boxes to login. Once logged in, you may review or modify your search, add a new search and see recent Alerts results. User Name: Password: Remember Me Remember me on this computer. Login Don't have a user name? Register! Forgot your password? Reset your password Alerts The Alerts function allows you to monitor a topic and receive timely

367

Fermilab Users' Meeting, 2007  

NLE Websites -- All DOE Office Websites (Extended Search)

6-7, 2007 6-7, 2007 The annual gathering of the Fermilab Users Organization will be held on June 6-7, 2007. This meeting is an opportunity for discussion of new physics results from the laboratory's experimental program, future initiatives at the lab, and thoughtful presentations from leaders of the scientific policy community. Topics to be covered at the Users Meeting include: Collider Physics Astro-particle Physics Neutrino Physics Future Plans This year, both an Outreach Workshop and a Grad Students' Meeting / Career Night (sponsored by the GSA) will be held in association with the Users Meeting on June 5. Watch this page for links to more information on those associated meetings as they become available. Registration Reserve Tickets (for the public lecture by Dr. George Smoot)

368

User Science Images  

NLE Websites -- All DOE Office Websites (Extended Search)

User Science Images User Science Images User Science Images Sort by: Default | Name | Date (low-high) | Date (high-low) | Category NIMROD-1.png FES: NIMROD Simulation February 18, 2010 | Author(s): Dr. Charlson C. Kim (University of Washington) | Category: Fusion Energy | URL: https://nimrodteam.org/ Download Image: NIMROD-1.png | png | 1.5 MB Trajectory of an energetic ion in a Field Reverse Configuration (FRC) magnetic field. Magnetic separatrix denoted by green surface. Spheres are colored by azimuthal velocity. Image courtesy of Charlson Kim, University of Washington; NERSC repos m487, mp21, m1552 Scheibe.png BER: Pore-Scale Fluid Flow for Subsurface Reactive Transport January 1, 2008 | Author(s): Timothy D. Scheibe, PNNL | Category: Environmental Science | URL: http://http://subsurface.pnl.gov/

369

RADTRAN 5 user guide.  

SciTech Connect

This User Guide for the RADTRAN 5 computer code for transportation risk analysis describes basic risk concepts and provides the user with step-by-step directions for creating input files by means of either the RADDOG input file generator software or a text editor. It also contains information on how to interpret RADTRAN 5 output, how to obtain and use several types of important input data, and how to select appropriate analysis methods. Appendices include a glossary of terms, a listing of error messages, data-plotting information, images of RADDOG screens, and a table of all data in the internal radionuclide library.

Kanipe, Frances L.; Neuhauser, Karen Sieglinde

2003-07-01T23:59:59.000Z

370

PALP - a User Manual  

E-Print Network (OSTI)

This article provides a complete user's guide to version 2.1 of the toric geometry package PALP by Maximilian Kreuzer and others. In particular, previously undocumented applications such as the program nef.x are discussed in detail. New features of PALP 2.1 include an extension of the program mori.x which can now compute Mori cones and intersection rings of arbitrary dimension and can also take specific triangulations of reflexive polytopes as input. Furthermore, the program nef.x is enhanced by an option that allows the user to enter reflexive Gorenstein cones as input. The present documentation is complemented by a Wiki which is available online.

Andreas P. Braun; Johanna Knapp; Emanuel Scheidegger; Harald Skarke; Nils-Ole Walliser

2012-05-18T23:59:59.000Z

371

Rivet user manual  

E-Print Network (OSTI)

This is the manual and user guide for the Rivet system for the validation and tuning of Monte Carlo event generators for high energy physics. As well as the core Rivet library, this manual describes the usage of the rivet program and the AGILe generator interface library. The depth and level of description is chosen for users of the system, starting with the basics of using validation code written by others, and then covering sufficient details to write new Rivet analyses and calculational components.

Andy Buckley; Jonathan Butterworth; David Grellscheid; Hendrik Hoeth; Leif Lonnblad; James Monk; Holger Schulz; Frank Siegert

2010-03-02T23:59:59.000Z

372

APS User News, Issue 73  

NLE Websites -- All DOE Office Websites (Extended Search)

3, September 15, 2011 3, September 15, 2011 CONTENTS DIRECTOR'S CORNER USER MATTERS -- Tweet Time! APS Beamlines Now Tweet Operational Status Info -- Changes to User Electrical Safety Training Requirements -- Groundbreaking for the New Advanced Protein Crystallization Facility -- Meg Vigliocco-Hagen, APS General User Program Administrator, Retires! -- Meet Beverly Knott, New APS Beam Time Access Administrator -- Safety Snippets: Practice Good Housekeeping BRIEFLY NOTED -- 4th Annual Postdoctoral Research Symposium: Registration Deadline September 21 -- 2011 Advanced Light Source Users' Meeting, October 3-5, 2011 -- 2011 SSRL/LCLS Annual Users' Meeting & Workshops, October 22-26, 2011 -- General Users Proposals Now Being Accepted -- Changes to User Training Course Requirements

373

Olive Oil: Chemistry and Technology, 2nd EditionChapter 7 Analysis and Authentication  

Science Conference Proceedings (OSTI)

Olive Oil: Chemistry and Technology, 2nd Edition Chapter 7 Analysis and Authentication Food Science Health Nutrition Biochemistry Processing eChapters Food Science & Technology Health - Nutrition - Biochemistry Processing Press

374

2002 NERSC User Survey Results  

NLE Websites -- All DOE Office Websites (Extended Search)

2 User Survey Results 2 User Survey Results Show All | 1 2 3 4 5 ... 11 | Next » 2002 User Survey Results Table of Contents Response Summary User Information Overall Satisfaction and Importance All Satisfaction Questions and Changes from Previous Years Visualization and Grid Computing Web, NIM, and Communications Hardware Resources Software Training User Services Comments about NERSC Response Summary Many thanks to the 300 users who responded to this year's User Survey -- this represents the highest response level in the five years we have conducted the survey. The respondents represent all five DOE Science Offices and a variety of home institutions: see User Information. You can see the FY 2002 User Survey text, in which users rated us on a 7-point satisfaction scale. Some areas were also rated on a 3-point

375

T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco AnyConnect Secure Mobility Client Lets Remote Users 5: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges June 2, 2011 - 4:38pm Addthis PROBLEM: The Cisco AnyConnect Secure Mobility Client is the Cisco next-generation VPN client, which provides remote users with secure IPsec (IKEv2) or SSL Virtual Private Network (VPN) connections to Cisco 5500 Series Adaptive Security Appliances (ASA) and devices that are running Cisco IOS Software. PLATFORM: Cisco AnyConnect Secure Mobility Client Platform & Affected Versions ABSTRACT: Cisco AnyConnect Secure Mobility Client contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a

376

T-591: VMware vmrun Utility Lets Local Users Gain Elevated Privileges...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

on the target system. PLATFORM: VMware Workstation 6.5.5 and 7.1.3 and prior; VIX API for Linux 1.10.2 and prior ABSTRACT: The VMware vmrun utility is susceptible to a local...

377

Neutron Science User Program  

E-Print Network (OSTI)

provides a user gateway for SNS and HFIR 11 Managed by UT-Battelle for the U.S. Department of Energy #12.) · Complementary to SNS HFIR produces the world's highest thermal neutron flux #12;13 UT-Battelle Department infrastructure (REDC, HFIR, etc.): $3B+ national asset ORNL is uniquely positioned to support advanced nuclear

378

The Use of Timed Efficient Stream Loss-Tolerant Authentication (TESLA  

E-Print Network (OSTI)

This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards " (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (2006). This memo describes the use of the Timed Efficient Stream Losstolerant Authentication (RFC 4082) transform within the Secure Realtime Transport Protocol (SRTP), to provide data origin authentication

M. Baugher; E. Carrara

2006-01-01T23:59:59.000Z

379

AUTHENTICATED SENSOR INTERFACE DEVICE FOR JOINT USE SAFEGUARDS APPLICATIONS - CONCEPTS AND CHALLENGES  

SciTech Connect

This paper will discuss the key features of the Authenticated Sensor Interface Device that collectively provide the ability to share data among a number of parties while ensuring the authentication of data and protecting both the operator’s and the IAEA’s interests. The paper will also discuss the development of the prototype, the initial testing with an accountancy scale, and future plans and challenges to implementation into the joint use and remote monitoring applications. As nuclear fuel cycle technology becomes more prevalent throughout the world and the capacity of plants increases, limited resources of the IAEA are being stretched near a breaking point. A strategy is to increase efficiency in safeguards monitoring using “joint use” equipment that will provide the facility operator process data while also providing the IAEA key safeguards data. The data, however, must be authenticated and validated to ensure the data have not been tampered with. The Authenticated Sensor Interface Device provides the capability to share data and can be a valuable component in the IAEA’s ability to collect accountancy data from scales in Uranium conversion and enrichment plants, as well as nuclear fuel fabrication plants. Likewise, the Authenticated Sensor Interface Device can be configured to accept a diverse array of input signals, ranging from analog voltage, to current, to digital interfaces and more. These modular capabilities provide the ability to collect authenticated, joint-use, data streams from various process monitoring sensors.

Poland, R.; Drayer, R.; Wilson, J.

2013-08-12T23:59:59.000Z

380

NERSC User Environment  

NLE Websites -- All DOE Office Websites (Extended Search)

Environment Environment NERSC User Environment Home Directories, Shells and Startup Files All NERSC systems (except PDSF) use global home directories, which are are pre-populated with startup files (also known as dot files) for all available shells. NERSC fully supports bash, csh, and tcsh as login shells. Other shells (ksh, sh, and zsh) are also available. The default shell at NERSC is csh. Changing Your Default Login Shell Use the NERSC Information management (NIM) portal if you want to to change your default login shell. To do this, select Change Shell from the NIM Actions pull-down menu. Managing Your Startup Files The "standard" dot-files are symbolic links to read-only files that NERSC controls. For each standard dot-file, there is a user-writable ".ext" file.

Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

User Facility Science Highlights  

NLE Websites -- All DOE Office Websites (Extended Search)

user-facilities/highlights/ The Office of Science user-facilities/highlights/ The Office of Science is the single largest supporter of basic research in the physical sciences in the United States, providing more than 40 percent of total funding for this vital area of national importance. It oversees - and is the principal federal funding agency of - the Nation's research programs in high-energy physics, nuclear physics, and fusion energy sciences. en {611EDD39-818D-4CBA-BFD7-9568495C1566}http://science.energy.gov/bes/highlights/2013/bes-2013-09-a/ The Role of Stripes in Superconducting Behavior Using neutron diffraction, movement of charged atoms arranged as "stripes"

382

User_Sup_Overview  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Employees (Supervisors) Employees (Supervisors) © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Managing Employees (Supervisors) Purpose The purpose of this job aid is to guide supervisor users through the step-by-step process of managing employees within SuccessFactors Learning. Task A. Open and View a Employee's Record From the Home page, select the My Employees tab. 1 1 Run Reports 5 Steps Task C Approve or Deny Training Requests 9 Steps Task B Open and View an Employee's Record 5 Steps Task A SuccessFactors Learning v 6.4 User Job Aid Managing Employees (Supervisors) © 2011 SuccessFactors, Inc. - 2 - SuccessFactors Learning Confidential. All rights reserved. The My Employees section is designed to

383

NERSC User Group Meeting  

NLE Websites -- All DOE Office Websites (Extended Search)

NERSC User Group Meeting NERSC User Group Meeting Oct 18, 2010 Outline * About OpenMP * Parallel Regions * Worksharing Constructs * Synchronization * Data Scope * Tasks * Using OpenMP at NERSC 2 3 Common Architectures * Shared Memory Architecture - Multiple CPUs share global memory, could have local cache - Uniform Memory Access (UMA) - Typical Shared Memory Programming Model: OpenMP, Pthreads, ... * Distributed Memory Architecture - Each CPU has own memory - Non-Uniform Memory Access (NUMA) - Typical Message Passing Programming Model: MPI, ... * Hybrid Architecture - UMA within one SMP node - NUMA across nodes - Typical Hybrid Programming Model: mixed MPI/OpenMP, ... What is OpenMP * OpenMP is an industry standard API of C/C++ and Fortran for shared memory parallel programming.

384

User_Sup_Registration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Registration (Supervisor) Registration (Supervisor) © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Registration (Supervisor) Purpose The purpose of this job aid is to guide supervisor users through the step-by-step process of managing the registration of employees into scheduled offerings within SuccessFactors Learning. Task A. Register Employees in a Scheduled Offering From the Home page, click the My Employees tab. Click the Register/Withdraw Employees Supervisor Link. View Employee's Registrations 3 Steps Task C Withdraw Employees from a Scheduled Offering - 14 Steps Task B Register Employees in a Scheduled Offering - 17 Steps Task A 1 1 2 2 SuccessFactors Learning v 6.4 User Job Aid Registration (Supervisor)

385

NERSC Users Group  

NLE Websites -- All DOE Office Websites (Extended Search)

NUGEX NUGEX NUG Executive Committee (NUGEX) NUGEX is the voice of the user community to NERSC and DOE. While all NUG events are open to all NERSC users, NUGEX members regularly participate in the monthly teleconfernces and the annual face-to-face meeting. NUGEX is consulted on many NERSC policy issues, e.g., batch configurations, disk quotas, services and training offerings. Members of NUGEX also participate in their office's NERSC Requirements Reviews of High Performance Computing and Storage. There are three representatives from each office and three members-at-large. Name Institution Email Address DOE Office Term Expires PI's Project Title Mark Adams Columbia University mark.adams@columbia.edu ASCR Dec 2015 Composable Hierarchically Nested Solvers Anubhav Jain Berkeley Lab

386

User_LaunchSurvey  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and Completing Assigned Survey and Completing Assigned Survey © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Launching and Completing Assigned Survey Purpose The purpose of this job aid is to guide users through the step-by-step process of launching and completing assigned surveys. Task A. Launch and Complete Assigned Survey From the Home page, filter the To-Do List to show only Surveys. Hover over the course evaluation title. Click Open. 1 2 3 3 2 1 Launch and Complete Assigned Survey 6 Steps Task A SuccessFactors Learning v 6.4 User Job Aid Launching and Completing Assigned Survey © 2011 SuccessFactors, Inc. - 2 - SuccessFactors Learning Complete the survey by selecting the radio button for the appropriate rating

387

User_LaunchOnline  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Online Content Online Content © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Launching Online Content Purpose The purpose of this job aid is to guide users through the step-by-step process of identifying and launching online content. Task A. Identify Online Content From the Home page, filter the To-Do List to show Online Courses only. The online icon ( ) in the Type column indicates the content type. 2 1 Launch Online Content 5 Steps Task B Identify Online Content 2 Steps Task A 1 2 SuccessFactors Learning v 6.4 User Job Aid Launching Online Content Task B. Launch Online Content From the To-Do List, hover over the title of the item you wish to launch and then click Go to Content.

388

ORPS User Registration Form  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DEPARTMENT OF ENERGY DEPARTMENT OF ENERGY OPERATIONAL EVENT INFORMATION SYSTEMS REGISTRATION FORM User Registration For: ORPS SUBMIT TO: U.S. DOE: PHONE: 800-473-4375 HSS InfoCenter, HS-1.22, 270CC FAX: 301-903-9823 1000 Independence Ave., SW Washington, DC 20585-0270 (Type or Print) 1. Name__________________________________________________________________________Birth date_______/_______ (Last) (First) (Middle Initial) (Month) (Day) 2.JobTitle_______________________________________________________________________________________________ 3. Company Name________________________________________________________________________________________ 4. Address________________________________________________ Mail Stop______________________________________

389

Internet Users’ Glossary  

E-Print Network (OSTI)

Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard. Distribution of this memo is unlimited. There are many networking glossaries in existence. This glossary concentrates on terms which are specific to the Internet. Naturally, there are entries for some basic terms and acronyms because other entries refer to them. Acknowledgements This document is the work of the User Glossary Working Group of the

G. Malkin; Xylogics Inc; T. Laquey Parker

1993-01-01T23:59:59.000Z

390

User Manual for DUSTY  

E-Print Network (OSTI)

DUSTY solves the problem of radiation transport in a dusty environment. The code can handle both spherical and planar geometries. The user specifies the properties of the radiation source and dusty region, and the code calculates the dust temperature distribution and the radiation field in it. The solution method is based on a self-consistent equation for the radiative energy density, including dust scattering, absorption and emission, and does not introduce any approximations. The solution is exact to within the specified numerical accuracy. DUSTY has built in optical properties for the most common types of astronomical dust and comes with a library for many other grains. It supports various analytical forms for the density distribution, and can perform a full dynamical calculation for radiatively driven winds around AGB stars. The spectral energy distribution of the source can be specified analytically as either Planckian or broken power-law. In addition, arbitrary dust optical properties, density distributions and external radiation can be entered in user supplied files. Furthermore, the wavelength grid can be modified to accommodate spectral features. A single DUSTY run can process an unlimited number of models, with each input set producing a run of optical depths, as specified. The user controls the detail level of the output, which can include both spectral and imaging properties as well as other quantities of interest.

Zeljko Ivezic; Maia Nenkova; Moshe Elitzur

1999-10-26T23:59:59.000Z

391

Students gain work experience at WIPP  

NLE Websites -- All DOE Office Websites (Extended Search)

Students Gain Work Experience at WIPP Students Gain Work Experience at WIPP CARLSBAD, N.M., January 10, 2000 -- Students from two Eddy County high schools are gaining valuable experience by spending time with employees of the Westinghouse Waste Isolation Division and Day & Zimmermann, LLC at the Waste Isolation Pilot Plant (WIPP). Six students from Carlsbad High School and four students from Loving High School are participating in the 1999-2000 WIPP Shadow Program. A "shadow" is a student who teams up with an employee to gain hands-on experience in the workplace. This activity helps the students identify career options and develop confidence. Each student spends three days during the school year with a volunteer mentor at the work location. "This program offers our employees the opportunity to share their knowledge and

392

SeisDig: Software to Digitize Scanned Analog Seismogram Images, User’s Manual  

E-Print Network (OSTI)

SeisDig User’s Manual 5 Time and Amplitude Scale Factors 5.1Structures SeisDig User’s Manual 1 General Overview Analogdation. SeisDig User’s Manual Contents 1 General Overview 2

Bromirski, Peter D.; Chuang, Steve

2003-01-01T23:59:59.000Z

393

User contributions | Open Energy Information  

Open Energy Info (EERE)

(-26) . . User:Rmckeel (top) 14:09, 28 June 2013 (diff | hist) . . (-25) . . Test (top) 12:34, 28 June 2013 (diff | hist) . . (+1,798) . . User:Rmckeel (Undo...

394

For Edison Phase 1 users  

NLE Websites -- All DOE Office Websites (Extended Search)

For Edison Phase 1 users For Edison Phase 1 users You can run jobs in the same way as you did on the phase 1 system, but keep in mind that the number of cores per node is 24...

395

User computer system pilot project  

Science Conference Proceedings (OSTI)

The User Computer System (UCS) is a general purpose unclassified, nonproduction system for Mound users. The UCS pilot project was successfully completed, and the system currently has more than 250 users. Over 100 tables were installed on the UCS for use by subscribers, including tables containing data on employees, budgets, and purchasing. In addition, a UCS training course was developed and implemented.

Eimutis, E.C.

1989-09-06T23:59:59.000Z

396

T-692: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: VMware vFabric tc Server Lets Remote Users Login Using 2: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated Passwords T-692: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated Passwords August 12, 2011 - 3:47pm Addthis PROBLEM: A vulnerability was reported in VMware vFabric tc Server. A remote user can login using an obfuscated version of their password. PLATFORM: Version(s): vFabric tc Server 2.0.0.RELEASE to 2.0.5.SR01, 2.1.0.RELEASE to 2.1.1.SR01 ABSTRACT: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated Passwords. reference LINKS: SecurityTracker Alert ID: 1025923 VMware VFabric Download CVE-2011-0527 IMPACT ASSESSMENT: Medium Discussion: If the system stores passwords used for JMX authentication in an obfuscated form, a remote user can use the password in obfuscated form (or in plain

397

U-024: IBM Lotus Sametime Configuration Servlet Lets Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

024: IBM Lotus Sametime Configuration Servlet Lets Remote Users 024: IBM Lotus Sametime Configuration Servlet Lets Remote Users Obtain Configuration Data U-024: IBM Lotus Sametime Configuration Servlet Lets Remote Users Obtain Configuration Data November 1, 2011 - 8:15am Addthis PROBLEM: IBM Lotus Sametime Configuration Servlet Lets Remote Users Obtain Configuration Data. PLATFORM: All Sametime Platforms : 7.0, 7.5, 7.5.1, 7.5.1.1, 7.5.1.2, 8.0, 8.0.1, 8.0.2, 8.5, 8.5.1, 8.5.1.1, 8.5.2 ABSTRACT: A remote user can obtain configuration information. reference lINKS: IBM Sametime Security Bulletin SecurityTracker Alert ID: 1026255 CVE-2011-1370 IMPACT ASSESSMENT: Medium Discussion: The Sametime server contains a configuration servlet that is accessed by several Sametime server processes. By default, this servlet does not require authentication, which could potentially allow an unauthorized user

398

Forecasting new gas users  

Science Conference Proceedings (OSTI)

Each year hundreds of oil or electric customers call Boston Gas to ask about fuel-switching. What do they look for? A gas utility can boost sales only one way-by gaining new customers. And in today`s slowly growing economy, conservation trends limit growth opportunities. The average household today uses two-thirds the energy of 15 years ago. Commercial and industrial (C/I) customers also conserve. If a gas utility is to grow, a majority of its new customers will likely come from competing fuels, such as oil or electricity.

Lonshteyn, A. [Boston Gas Co., MA (United States)

1995-02-01T23:59:59.000Z

399

Prism users guide.  

SciTech Connect

Prism is a ParaView plugin that simultaneously displays simulation data and material model data. This document describes its capabilities and how to use them. A demonstration of Prism is given in the first section. The second section contains more detailed notes on less obvious behavior. The third and fourth sections are specifically for Alegra and CTH users. They tell how to generate the simulation data and SESAME files and how to handle aspects of Prism use particular to each of these codes.

Weirs, V. Gregory

2012-03-01T23:59:59.000Z

400

XTV users guide  

SciTech Connect

XTV is an X-Windows based Graphical User Interface for viewing results of Transient Reactor Analysis Code (TRAC) calculations. It provides static and animated color mapped visualizations of both thermal-hydraulic and heat conduction components in a TRAC model of a nuclear power plant, as well as both on-screen and hard copy two-dimensional plot capabilities. XTV is the successor to TRAP, the former TRAC postprocessor using the proprietary DISSPLA graphics library. This manual describes Version 2.0, which requires TRAC version 5.4.20 or later for full visualization capabilities.

Dearing, J.F.; Johns, R.C. [Los Alamos National Lab., NM (United States). Technology and Safety Assessment Div.

1996-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

U-044: HP Operations Agent and Performance Agent Lets Local Users Access a  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

44: HP Operations Agent and Performance Agent Lets Local Users 44: HP Operations Agent and Performance Agent Lets Local Users Access a Restricted Directory U-044: HP Operations Agent and Performance Agent Lets Local Users Access a Restricted Directory November 23, 2011 - 8:00am Addthis PROBLEM: HP Operations Agent and Performance Agent Lets Local Users Access a Restricted Directory. PLATFORM: HP Operations Agent v11.00 and Performance Agent v4.73, v5.0 for AIX, HP-UX, Linux, and Solaris ABSTRACT: A local user can access a directory on the target system. reference LINKS: HP Security Bulletin Document ID: c03091656 CVE-2011-4160 SecurityTracker Alert ID: 1026345 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP Operations Agent and Performance Agent. A local user can access data on the target system. A local user can gain

402

Intrinsic gain modulation and adaptive neural coding  

E-Print Network (OSTI)

In many cases, the computation of a neural system can be reduced to a receptive field, or a set of linear filters, and a thresholding function, or gain curve, which determines the firing probability; this is known as a linear/nonlinear model. In some forms of sensory adaptation, these linear filters and gain curve adjust very rapidly to changes in the variance of a randomly varying driving input. An apparently similar but previously unrelated issue is the observation of gain control by background noise in cortical neurons: the slope of the firing rate vs current (f-I) curve changes with the variance of background random input. Here, we show a direct correspondence between these two observations by relating variance-dependent changes in the gain of f-I curves to characteristics of the changing empirical linear/nonlinear model obtained by sampling. In the case that the underlying system is fixed, we derive relationships relating the change of the gain with respect to both mean and variance with the receptive fi...

Hong, Sungho; Fairhall, Adrienne

2008-01-01T23:59:59.000Z

403

A user's Perspective on Software  

SciTech Connect

The user is often the most overlooked component of control system design. At Jefferson Lab the control system is almost entirely digital in nature, with little feedback except that which is deliberately designed into the control system. In the complex control room environment a good design can enhance the user's abilities to preform good science. A bad design can leave the user frustrated and contribute significantly to down time, when science is not being done. Key points of use and design from the user's perspective are discussed, along with some techniques which have been adopted at Jefferson Lab to improve the user experience and produce better, more usable software.

Isadoro T. Carlino

2006-10-24T23:59:59.000Z

404

User_ApproveTrainingRequest  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Approving User Training Requests Approving User Training Requests © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Approving User Training Requests Purpose The purpose of this job aid is to guide users through the step-by-step process of approving a user training request. Task A. Approve a User Training Request From the Home Page, click the You have pending approval requests link in the Alerts box. The Pending Reviews and Approvals page displays and defaults open to the pending approval. Click the expand icon ( ) next to the user's name and/or click the Title link for additional information on the request. Select the Enter Reasons for Approvals or Denials checkbox to allow for comments. Select the Approve radio

405

EMSL User Executive Committe Meeting  

NLE Websites -- All DOE Office Websites (Extended Search)

User Executive User Executive Committee Meeting July 13, 2011 Recommendations Valerie Copie, UEC Chair User Meetings/Workshops EUC Comments & Recommendations: The UEC supports EMSL's focus on specific areas for User meetings and workshops rather than organizing a generalized User Meeting Focused meetings may provide opportunities for users to visit EMSL more often and to participate in team building as envisaged by the new vision of EMSL2.0 The UEC would like EMSL to have broad representations at these workshops to avoid having too many internal participants. The Pore-scale workshop may be a good model to follow for focused workshops While the UEC supports focused workshops, the entire user community should be welcome to attend them and informed about these activities

406

2001 NERSC User Survey Results  

NLE Websites -- All DOE Office Websites (Extended Search)

1 User Survey Results 1 User Survey Results Show All | 1 2 3 4 5 ... 11 | Next » 2001 User Survey Results Table of Contents Response Summary User Information Overall Satisfaction and Importance All Satisfaction Questions and Changes from Previous Years NERSC Information Management (NIM) System Web and Communications Hardware Resources Software Training User Services Comments about NERSC Response Summary NERSC extends its thanks to the 237 users who participated in this year's survey; this compares with 134 respondents last year. The respondents represent all five DOE Science Offices and a variety of home institutions: see User Information. Your responses provide feedback about every aspect of NERSC's operation, help us judge the quality of our services, give DOE information on how well

407

2006 NERSC User Survey Results  

NLE Websites -- All DOE Office Websites (Extended Search)

6 User Survey Results 6 User Survey Results Show All | 1 2 3 4 5 ... 15 | Next » 2006 User Survey Results Table of Contents Survey Results Users are invited to provide overall comments about NERSC: Here are the survey results: Respondent Demographics Overall Satisfaction and Importance All Satisfaction, Importance and Usefulness Ratings All Usefulness Topics Hardware Resources Software Visualization and Data Analysis HPC Consulting Services and Communications Web Interfaces Training Comments about NERSC Survey Results Many thanks to the 256 users who responded to this year's User Survey. This represents a response rate of about 13 percent of the active NERSC users. The respondents represent all six DOE Science Offices and a variety of home institutions: see Respondent Demographics. The survey responses provide feedback about every aspect of NERSC's

408

GainSpan Corporation | Open Energy Information  

Open Energy Info (EERE)

GainSpan Corporation GainSpan Corporation Jump to: navigation, search Name GainSpan Corporation Address 121 Albright Way Place Los Gatos, California Zip 95032 Sector Efficiency Product Designs wireless sensor networks for a variety of applications including smart grid Website http://www.gainspan.com/ Coordinates 37.256998°, -121.964456° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":37.256998,"lon":-121.964456,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

409

Gaining creative control over semiconductor nanowires  

NLE Websites -- All DOE Office Websites (Extended Search)

Gaining creative control over semiconductor nanowires Gaining creative control over semiconductor nanowires Gaining creative control over semiconductor nanowires Using a microfluidic reactor, Los Alamos researchers transformed the SLS process into a flow-based technique. September 26, 2013 Growth of nanowire precursors in a flowing carrier solvent Growth of nanowire precursors in a flowing carrier solvent The new "flow" solution-liquid-solid method allows scientists to slow down growth and thereby capture mechanistic details as the nanowires grow in solution. A Los Alamos research team has transformed the synthesis process of semiconductor nanowires for use in solar cells, batteries, electronics, sensors and photonics using a solution-liquid-solid (SLS) batch approach to achieve unprecedented control over growth rates, nanowire size and internal

410

Gaines Cavern Wind Project | Open Energy Information  

Open Energy Info (EERE)

Cavern Wind Project Cavern Wind Project Jump to: navigation, search Name Gaines Cavern Wind Project Facility Gaines Cavern Wind Project Sector Wind energy Facility Type Commercial Scale Wind Facility Status In Service Owner General Compression Developer Texas Dispatchable Wind 1 LLC Location Gaines County TX Coordinates 32.688556°, -103.062464° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":32.688556,"lon":-103.062464,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

411

User Program Training | ORNL Neutron Sciences  

NLE Websites -- All DOE Office Websites (Extended Search)

training before arriving at ORNL: ORNL Site Access Training For users going to HFIR: HFIR General User Access Training For users going to SNS: SNS Target Facility Access...

412

Calendars | User Information | Advanced Photon Source  

NLE Websites -- All DOE Office Websites (Extended Search)

Information: Calendars APS User Calendar Important meetings and general events of interest to the user community. General User Proposal (GUP) Calendar Deadlines, notification...

413

User Research Administration | Stanford Synchrotron Radiation...  

NLE Websites -- All DOE Office Websites (Extended Search)

Research Administration LCLS and SSRL User Research Administration Cathy Knotts User Research Administration Manager Tel: (650) 926-3191 Fax: (650) 926-3600 LCLS and SSRL User...

414

User Advisory Council | Argonne Leadership Computing Facility  

NLE Websites -- All DOE Office Websites (Extended Search)

Resources & Expertise Mira Cetus Vesta Intrepid Challenger Surveyor Visualization Clusters Data and Networking Our Teams User Advisory Council User Advisory Council The User...

415

Reducing gain shifts in photomultiplier tubes  

SciTech Connect

A means is provided for reducing gain shifts in multiplier tubes due to varying event count rates. It includes means for limiting the number of cascaded, active dynodes of the multiplier tube to a predetermined number with the last of predetermined number of dynodes being the output terminal of the tube. This output is applied to an amplifier to make up for the gain sacrificed by not totally utilizing all available active stages of the tube. Further reduction is obtained by illuminating the predetermined number of dynodes with a light source of such intensity that noise appearing at the output dynode associated with the illumination is negligible.

Cohn, Charles E. (Clarendon Hills, IL)

1976-01-01T23:59:59.000Z

416

Using HB Family of Protocols for Privacy-Preserving Authentication of RFID Tags in a Population  

E-Print Network (OSTI)

In this paper, we propose an HB-like protocol for privacy-preserving authentication of RFID tags, whereby a tag can remain anonymous and untraceable to an adversary during the authentication process. Previous proposals of such protocols were based on PRF computations. Our protocol can instead be used on low-cost tags that may be incapable of computing standard PRFs. Moreover, since the underlying computations in HB protocols are very efficient, our protocol also reduces reader load compared to PRF-based protocols. We suggest a tree-based approach that replaces the PRF-based authentication from prior work with a procedure such as HB+ or HB#. We optimize the tree- traversal stage through usage of a "light version" of the underlying protocol and shared random challenges across all levels of the tree. This provides significant reduction of the communication resources, resulting in a privacy-preserving protocol almost as efficient as the underlying HB+ or HB#

Halevi, Tzipora; Halevi, Shai

2009-01-01T23:59:59.000Z

417

Probabilistic Non-Repudiation for Source Authentication with TESLA Certificates in Hybrid Satellite/Wireless Networks and  

E-Print Network (OSTI)

Probabilistic Non-Repudiation for Source Authentication with TESLA Certificates in Hybrid Satellite describe a novel non-repudiation mechanism for an authentication protocol based on the extended TESLA to this problem, we have proposed a new class of lightweight, symmetric key certificates called extended TESLA

Baras, John S.

418

A Tree-Based TESLA Broadcast Authentication for Sensor Networks Donggang Liu Peng Ning Sencun Zhu Sushil Jajodia  

E-Print Network (OSTI)

A Tree-Based µTESLA Broadcast Authentication for Sensor Networks Donggang Liu Peng Ning Sencun Zhu to multiple nodes in an authenticated way. µTESLA and multi-level µTESLA have been proposed to provide of senders. Though multi-level µTESLA schemes can scale up to large sensor networks (in terms of receivers

Zhu, Sencun

419

Design and development of a mobile EPC-RFID-based self-validation system (MESS) for product authentication  

Science Conference Proceedings (OSTI)

The increase in the number of counterfeits penetrating into the open market has created the need for a product authentication approach in tracing and tracking the product anytime, anywhere. Owing to the vague concepts frequently represented in flow of ... Keywords: Anti-counterfeit system, Counterfeiting, Electronic product code (EPC), Product authentication, Radio frequency identification (RFID)

S. K. Kwok; Jacky S. L. Ting; Albert H. C. Tsang; W. B. Lee; Benny C. F. Cheung

2010-09-01T23:59:59.000Z

420

User_Self_Register  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Registering in a Scheduled Offering Registering in a Scheduled Offering © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Self-Registering in a Scheduled Offering Purpose The purpose of this job aid is to guide users through the step-by-step process of locating scheduled offerings and self-registering from the To-Do List, Calendar of Offerings, and the catalog. Each task below demonstrates a different method of registration. Task A. Register from the To-Do List From the Home page, filter the To-Do List to show All Learning. 1 1 Register from the Advanced Catalog Search - 10 Steps Task C Register from To-Do List 6 Steps Task A Register from the Calendar of Offerings 8 Steps Confirm Registration 3 Steps

Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Lujan Center User Guide  

NLE Websites -- All DOE Office Websites (Extended Search)

3 3 High-Pressure Preferred Orientation Neutron Diffractometer (HIPPO) HIPPO is the first third-generation neutron time- of-flight powder diffractometer constructed in the United States. It achieves very high neutron count rates by virtue of a short (9 m) initial flight path on a high-intensity water moderator and 1360 3 He detector tubes covering 4.8 m 2 of detector area from 10° - 150° in scattering angles. HIPPO was designed and manufactured as a joint effort between LANSCE and the University of California with the goal of doing world-class science by making neutron powder diffractometry an accessible tool to the national user community. D-spacing ranges from 0.12 - 4.80 Å (1.31 - 52.4 Å -1 ) to 1.2 - 47.5 Å (0.13 - 5.3 Å -1 ) are available to support studies of crystal orientation

422

User' Software Manual  

NLE Websites -- All DOE Office Websites (Extended Search)

MM-Group Home MM-Group Home MMG Advisory Committees 4-ID-D Home Recent Publications Beamline Info Optics Instrumentation Software User Info FAQs 4-ID-D Beamline Software Manual Introduction Beamline 4-ID-D uses the EPICS platform for beamline control. This is a distributed client-server software where seperate server computers (IOCs) are used to control and monitor different portions of the beamline, and a separate client computer is used for data aquisition and display information. The client computer controls the other IOCs via the local ethernet network. The EPICS client "MEDM" is used for graphically displaying information about the beamline. The command line driven program SPEC is used for scanning adn other data acquisition fruncitons. More information on each of these is found below.

423

Fermilab Users' Executive Committee  

NLE Websites -- All DOE Office Websites (Extended Search)

Outreach Subcommittee Outreach Subcommittee Purpose: Work with Fermilab and with external institutions to increase public awareness of the physics being done at Fermilab. Subcommittee Members 2012-2013 Name Organization Email Mandy Rominsky, Chair Fermilab rominsky AT fnal.gov Mary Anne Cummings Muons, Inc macc AT fnal.gov Daniel Kaplan Illinois Institute of Technology kaplan AT iit.edu Ryan Patterson California Institute of Technology rbpatter AT caltech.edu Breese Quinn University of Mississippi quinn AT phy.olemiss.edu Lee Roberts Boston University roberts AT bu.edu Nikos Varelas (ex-officio) University of Illinois at Chicago varelas AT uic.edu Fermilab User University Profiles Fermilab Outreach Fermilab Office of Communication Fermilab Guided Tours Ask a Scientist Program Physics for Everyone Lecture Series

424

users-guide  

NLE Websites -- All DOE Office Websites (Extended Search)

Contents Contents Contents Contents ARGONNE NATIONAL LABORATORY 9700 South Cass Avenue Argonne, IL 60439 in ANL/MCS-TM-234 Users Guide for ROMIO: A High-Performance, Portable MPI-IO Implementation by Rajeev Thakur, Robert Ross, Ewing Lusk, William Gropp, Robert Latham Mathematics and Computer Science Division Technical Memorandum No. 234 Revised May 2004, November 2007, April 2010 This work was supported by the Mathematical, Information, and Computational Sciences Division subprogram of the Office of Advanced Scientific Computing Research, U.S. Department of Energy, under Contract W-31-109-Eng-38; and by the Scalable I/O Initiative, a multiagency project funded by the Defense Advanced Research Projects Agency (Contract DABT63-94-C-0049), the Department of Energy, the National Aeronautics and Space Administration,

425

End User Perspective - Industrial  

NLE Websites -- All DOE Office Websites (Extended Search)

Solid State Research Center Solid State Research Center DOE Fuel Cell Portable Power Workshop End User Perspective - Industrial Consumer Electronics Power (< 20-50W) Department of Energy Fuel Cell Portable Power Workshop Jerry Hallmark Manager Energy Technologies Lab Motorola Labs Solid State Research Center DOE Fuel Cell Portable Power Workshop Outline * Energy & Power of Portable Devices * Fuel Cell Applications & Cost * Key Requirements & Challenges * Fuels for Portable Fuel Cells * Fuel Transportation Regulations and Standards * Methanol Fuel Cells - Direct Methanol Fuel Cells - Reformed Methanol Fuel Cells * Technical Challenges 2 Solid State Research Center DOE Fuel Cell Portable Power Workshop Portable Electronics Yearly Energy Usage  :KU 1990 1980  :KU

426

U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote 29: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access November 8, 2011 - 8:00am Addthis PROBLEM: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access. PLATFORM: HP TCP/IP Services for OpenVMS v5.6 and v5.7 on iTanium and ALPHA Servers. ABSTRACT: A remote user can gain unauthorized access reference LINKS: HP Support document ID: c01908983 SecurityTracker Alert ID: 1026279 CVE-2011-3168 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in TCP/IP Services for OpenVMS. A remote user can gain unauthorized access. On systems running POP or IMAP servers, a remote user can gain unauthorized access.

427

PV ENERGY ROI Tracks Efficiency Gains  

E-Print Network (OSTI)

PV ENERGY ROI Tracks Efficiency Gains the state of PV today E nergy payback time (EPBT) is the time it takes for a photovoltaic (PV) system to produce all the energy used through- out its life cycle. A short EPBT corre- sponds to a high energy return on energy invest- ment

428

Gain International Work Experience in China  

E-Print Network (OSTI)

Gain International Work Experience in China www.StudyCLI.org "The CLI internship gave me a huge boost both personally and professionally. At 21 years old, I've lived in China and can speak basic city of Guilin, China. CLIinternsengageinadynamicrangeofprojects: Y Establishnewrelationshipswith

Virginia Tech

429

Fuel Cycle Analysis Framework Base Cases for the IAEA/INPRO GAINS Collaborative Project  

SciTech Connect

Thirteen countries participated in the Collaborative Project GAINS “Global Architecture of Innovative Nuclear Energy Systems Based on Thermal and Fast Reactors Including a Closed Fuel Cycle”, which was the primary activity within the IAEA/INPRO Program Area B: “Global Vision on Sustainable Nuclear Energy” for the last three years. The overall objective of GAINS was to develop a standard framework for assessing future nuclear energy systems taking into account sustainable development, and to validate results through sample analyses. This paper details the eight scenarios that constitute the GAINS framework base cases for analysis of the transition to future innovative nuclear energy systems. The framework base cases provide a reference for users of the framework to start from in developing and assessing their own alternate systems. Each base case is described along with performance results against the GAINS sustainability evaluation metrics. The eight cases include four using a moderate growth projection and four using a high growth projection for global nuclear electricity generation through 2100. The cases are divided into two sets, addressing homogeneous and heterogeneous scenarios developed by GAINS to model global fuel cycle strategies. The heterogeneous world scenario considers three separate nuclear groups based on their fuel cycle strategies, with non-synergistic and synergistic cases. The framework base case analyses results show the impact of these different fuel cycle strategies while providing references for future users of the GAINS framework. A large number of scenario alterations are possible and can be used to assess different strategies, different technologies, and different assumptions about possible futures of nuclear power. Results can be compared to the framework base cases to assess where these alternate cases perform differently versus the sustainability indicators.

Brent Dixon

2012-09-01T23:59:59.000Z

430

APS User News, Issue 76  

NLE Websites -- All DOE Office Websites (Extended Search)

6, February 21, 2012 6, February 21, 2012 CONTENTS DIRECTOR'S CORNER Special Announcement: George Srajer Appointed Project Director for the APS Upgrade and Deputy ALD USER MATTERS -- Registration Open for 2012 APS/CNM/EMC Users Meeting: Our User Science Shapes the Future! -- CALLING ALL VIDEO MAKERS! Submit Your Films for the "Usies Awards"! -- LCLS-II New Instruments Workshops March 19-22, 2012 -- NUFO Goes To Washington! -- Tax Presentation Available BRIEFLY NOTED -- Recognitions and Honors -- Users Meeting Satellite Workshop: "SAXS Software Packages Irena and Nika" -- New Web Page Offers Quick Help Links for Users -- New Mural Graces the Wall near Viewing Area -- General User Proposal Deadline for 2012-2 Run: March 9, 2012 =====================================================

431

1999 NERSC User Survey Results  

NLE Websites -- All DOE Office Websites (Extended Search)

9 User Survey Results 9 User Survey Results Show All | 1 2 3 4 5 ... 11 | Next » 1999 User Survey Results Table of Contents Respondent Summary Overall Satisfaction User Information Visualization Consulting and Account Support Information Technology and Communication Hardware Resources Software Training Comments about NERSC All Satisfaction Questions and FY 1998 to FY 1999 Changes Respondent Summary NERSC would like to thank all the users who participated in this year's survey. Your responses provide feedback about every aspect of NERSC's operation, help us judge the quality of our services, give DOE information on how well NERSC is doing, point us to areas we can improve, and show how we compare to similar facilities. This year 177 users responded to our survey, compared with 138 last year.

432

User Calendar | Advanced Photon Source  

NLE Websites -- All DOE Office Websites (Extended Search)

APS User Calendar Date Event November 19, 2013 Proposal Review Panel Meetings December 10, 2013 Beamtime Allocation Committee Meeting January 22, 2014 Joint APSUO Steering Committee and Partner User Council Meeting March 7, 2014 Proposal Deadline Run Cycle 2014-2 March 11-13, 2014 Scientific Advisory Committee Meeting May 12-15, 2014 APS/CNM/EMC Users Meeting May 13, 2014 Partner User Council Meeting May 14, 2014 APSUO Steering Committee Meeting July 9, 2014 Joint APSUO Steering Committee and Partner User Council Meeting July 11, 2014 Proposal Deadline Run Cycle 2014-3 September 17, 2014 Joint APSUO Steering Committee and Partner User Council Meeting November 4-6, 2014 Scientific Advisory Committee Meeting March 16-18, 2015 Scientific Advisory Committee Meeting

433

POWGEN Users | ORNL Neutron Sciences  

NLE Websites -- All DOE Office Websites (Extended Search)

User Information User Information Announcement: POWGEN has started a new partnership with beam line 11A at the Advanced Photon Source where users can get x-ray data if they have an approved POWGEN proposal. Become a POWGEN User POWGEN Experiment Guide: A - Z POWGEN Mail In Program Guide Shipping Addresses for Samples For more detailed information, please visit the ORNL User Facilities Sample Handling and Shipping page. Non-activated samples coming to SNS: Attention: Special requirements (like refrigeration) To: Neutron Sciences User Sample IPTS # XXXX Oak Ridge National Laboratory / SNS Site Chestnut Ridge, Bldg 8920 Oak Ridge, TN 37830 Activated samples (these will also be brought to SNS but must go through check-in procedures at another on-site location): Attention: Special requirements (like refrigeration)

434

2000 NERSC User Survey Results  

NLE Websites -- All DOE Office Websites (Extended Search)

0 User Survey Results 0 User Survey Results Show All | 1 2 3 4 5 ... 10 | Next » 2000 User Survey Results Table of Contents Response Summary User Information Overall Satisfaction and Importance All Satisfaction Questions and FY 1999 to FY 2000 Changes Consulting and Account Support Web and Communications Hardware Resources Software Resources Training User Comments Response Summary NERSC extends its thanks to all the users who participated in this year's survey. Your responses provide feedback about every aspect of NERSC's operation, help us judge the quality of our services, give DOE information on how well NERSC is doing, and point us to areas we can improve. Every year we institute changes based on the survey; the FY 1999 survey resulted in the following changes: We created a long-running queue (12 hours maximum) for jobs using up

435

User_Sup_AssignDelegate  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Delegates (Supervisor) Delegates (Supervisor) © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Assigning Delegates (Supervisor) Purpose The purpose of this job aid is to guide you through the step-by-step process of using the delegate feature within SuccessFactors Learning. A delegate is another user who you identify to act on the work that you need to complete in the user interface. When you identify a user as a delegate through the Delegates area in your Options and Settings screen, the system adds that user's name to the Delegators list. Typically, you identify a user as a delegate when you want the user to perform some of your tasks. You can use the Delegates area to add or edit the permissions for a delegate, which you might want to do, for example, if you plan to take an

436

National Library of Energy : User Account  

Office of Scientific and Technical Information (OSTI)

Reset your password Enter either your User Name or Email Address to reset your password. User Name: Email Address: Go...

437

Register as a New User  

Science Conference Proceedings (OSTI)

Conference Tools for The 8th Pacific Rim International Congress on Advanced Materials and Processing. Login · Register as a New User · Help · Submit An ...

438

2013 ALS User Meeting Highlights  

NLE Websites -- All DOE Office Websites (Extended Search)

2013 ALS User Meeting Highlights 2013 ALS User Meeting Highlights 2013 ALS User Meeting Highlights Print This year's ALS User Meeting launched with a welcome from Users' Executive Committee Chair Corie Ralston and LBNL Director Paul Alivisatos. ALS Director Roger Falcone followed with a "state of the ALS" presentation that began with a reminder of the ALS mission, which he noted remains true even in the midst of a government shutdown: "Supporting users in doing outstanding science in a safe environment." Falcone gave the 414 meeting attendees an update on the ALS beamlines, which included good news about increased user numbers thanks to the new RAPIDD access system, enhanced robotics, and remote capabilities. Falcone reflected that ALS metrics continue to represent our highly productive users-the number of journal articles and papers per user that come from ALS research have continued to grow in the past year. Looking forward, Falcone touched on how a proposed ALS upgrade to a diffraction-limited light source would increase scientific capabilities.

439

2013 ALS User Meeting Highlights  

NLE Websites -- All DOE Office Websites (Extended Search)

2013 ALS User Meeting Highlights 2013 ALS User Meeting Highlights 2013 ALS User Meeting Highlights Print Thursday, 24 October 2013 09:06 This year's ALS User Meeting launched with a welcome from Users' Executive Committee Chair Corie Ralston and LBNL Director Paul Alivisatos. ALS Director Roger Falcone followed with a "state of the ALS" presentation that began with a reminder of the ALS mission, which he noted remains true even in the midst of a government shutdown: "Supporting users in doing outstanding science in a safe environment." Falcone gave the 414 meeting attendees an update on the ALS beamlines, which included good news about increased user numbers thanks to the new RAPIDD access system, enhanced robotics, and remote capabilities. Falcone reflected that ALS metrics continue to represent our highly productive users-the number of journal articles and papers per user that come from ALS research have continued to grow in the past year. Looking forward, Falcone touched on how a proposed ALS upgrade to a diffraction-limited light source would increase scientific capabilities.

440

Neutron and Nano User Meeting  

NLE Websites -- All DOE Office Websites (Extended Search)

Science @ Neutron and Nano Facilities User Workshops Integrated Agendas Venue Travel Information Contacts and Sponsors Registration Registration is now closed Contact Al Ekkebus,...

Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

User's Guide September 14, 1999  

E-Print Network (OSTI)

, and extensible, with a user-friendly graphical interface. The code is written in C++ and Tcl/Tk. Tar- get systems

Donahue, Michael J.

442

Zimbra for APS Users Videos  

NLE Websites -- All DOE Office Websites (Extended Search)

Video Library APS Colloquium Getting Started with Epics * 2005 * 2004 "Zimbra for APS Users" Workshop Note: Recommend viewing with Firefox browser. If you have trouble with the...

443

2013 PDSF User Meering Minutes  

NLE Websites -- All DOE Office Websites (Extended Search)

3 Minutes 2013 PDSF User Meeting Minutes December 3 Attending Shusu, Ernst, Mike, Craig, Iwona, Larry, Lisa OutagesDowntimes November 12 - 15: Mendel nodes offline for recabling...

444

Physics Out Loud - User Facility  

NLE Websites -- All DOE Office Websites (Extended Search)

SRF Accelerator Cavities Previous Video (SRF Accelerator Cavities) Physics Out Loud Main Index Next Video (Baryon) Baryon User Facility Andrew Hutton, Director of Accelerators at...

445

2003 NERSC User Survey Results  

NLE Websites -- All DOE Office Websites (Extended Search)

and Importance All Satisfaction Topics and Changes from Previous Years DOE and NERSC Scaling Initiatives Web, NIM, and Communications Hardware Resources Training User...

446

User-Centered Security Engineering  

E-Print Network (OSTI)

Current approaches to security engineering mainly focus on attacker models, secure mechanisms, and code testing to ensure a high level security standard. However, these approaches do not sufficiently emphasize the usability of the system and the risk arises that the implemented mechanisms create overheads for users or require unworkable user behaviour. In addition, end users will not use security products they cannot understand or which are difficult to apply. Therefore, we propose the new concept of integrated user-centered security engineering to bridge the gap between security and usability. This method has been pursued for the development and implementation of the security tool "Identity Manager".

Daniela Gerd tom Markotten

2002-01-01T23:59:59.000Z

447

Argonne CNM: User Office Staff  

NLE Websites -- All DOE Office Websites (Extended Search)

in Argonne's Chemistry Division, including Group Leader of Catalyst Design Group Carrie Clark, (STA) Coordinator, User & Outreach Programs Phone: 630.252.6952, Fax: 630.252.5739,...

448

Library Terms That Users Understand  

E-Print Network (OSTI)

data resources about Library Terms That Users Understand ©terminology is a major factor. Terms most often cited asHumanities    or Social Sciences Terms most often cited as

Kupersmith, John

2012-01-01T23:59:59.000Z

449

APS User News, Issue 66  

NLE Websites -- All DOE Office Websites (Extended Search)

off of graphene, show that the interaction among graphene's electrons is surprisingly weak. More... return to table of contents USER MATTERS 2. Seeking Nominations for the...

450

Welfare Implications of User Innovation  

E-Print Network (OSTI)

The literature on new goods and social welfare generally assumes that innovations are developed by manufacturers. But innovation by users has been found to also be an ...

Henkel, Joachim

2003-08-15T23:59:59.000Z

451

User Facilities | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

User Facilities Advanced Photon Source Argonne Leadership Computing Facility Argonne Tandem Linear Accelerator System Center for Nanoscale Materials Electron Microscopy Center...

452

U-030: Apache Tomcat Lets Untrusted Web Applications Gain Elevated...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache Tomcat Lets Untrusted Web Applications Gain Elevated Privileges U-030: Apache Tomcat Lets Untrusted Web Applications Gain Elevated Privileges November 9, 2011 - 8:30am...

453

TMAP7 User Manual  

DOE Green Energy (OSTI)

The TMAP Code was written at the Idaho National Engineering and Environmental Laboratory by Brad Merrill and James Jones in the late 1980s as a tool for safety analysis of systems involving tritium. Since then it was upgraded to TMAP4 and has been used in numerous applications including experiments supporting fusion safety, predictions for advanced systems such as the International Thermonuclear Experimental Reactor (ITER), and estimates involving tritium production technologies. Its further upgrade to TMAP2000 and now to TMAP7 was accomplished in response to several needs. TMAP and TMAP4 had the capacity to deal with only a single trap for diffusing gaseous species in solid structures. TMAP7 includes up to three separate traps and up to 10 diffusing species. The original code had difficulty dealing with heteronuclear molecule formation such as HD and DT under solution-law dependent diffusion boundary conditions. That difficulty has been overcome. TMAP7 automatically generates heteronuclear molecular partial pressures when solubilities and partial pressures of the homonuclear molecular species are provided for law-dependent diffusion boundary conditions. A further sophistication is the addition of non-diffusing surface species. Atoms such as oxygen or nitrogen or formation and decay or combination of hydroxyl radicals on metal surfaces are sometimes important in reactions with diffusing hydrogen isotopes but do not themselves diffuse appreciably in the material. TMAP7 will accommodate up to 30 such surface species, allowing the user to specify relationships between those surface concentrations and partial pressures of gaseous species above the surfaces or to form them dynamically by combining diffusion species or other surface species. Additionally, TMAP7 allows the user to include a surface binding energy and an adsorption barrier energy. The code includes asymmetrical diffusion between the surface sites and regular diffusion sites in the bulk. All of the previously existing features for heat transfer, flows between enclosures, and chemical reactions within the enclosures have been retained, but the allowed problem size and complexity have been increased to take advantage of the greater memory and speed available on modern computers. One additional feature unique to TMAP7 is the addition of radioactive decay for both trapped and mobile species. Whereas earlier versions required a separate FORTRAN compiler to operate, TMAP7 is based on a publiclicense compiler, distributed with the code.

Glen R. Longhurst

2008-12-01T23:59:59.000Z

454

Analysis of users and non-users of smartphone applications  

Science Conference Proceedings (OSTI)

Purpose: Smartphones facilitate the potential adoption of new mobile applications. The purpose of this research is to study users and non-users of three selected mobile applications, and find out what really drives the intention to use these applications ... Keywords: Adoption of mobile applications, Games, Map applications, Mobile Internet, Smartphones

Hannu Verkasalo; Carolina López-Nicolás; Francisco J. Molina-Castillo; Harry Bouwman

2010-08-01T23:59:59.000Z

455

NSLS Industrial User Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Jun Wang Physicist, Industrial Program Coordinator Phone: 344-2661 Email: junwang@bnl.gov Jun Wang is an Industrial Program Coordinator in the Photon Science Directorate at Brookhaven National Laboratory. She is working closely with industrial researchers as well as beamline staff to identify and explore new opportunities in industrial applications using synchrotron radiation. She has been leading the industrial research program including consultation, collaboration and outreach to the industrial user groups. Before joining BNL in 2008, Jun Wang was a Lead Scientist for a high-resolution high throughput powder diffraction program at the Advanced Photon Source (APS). As a Physicist at BNL, her research focuses on materials structure determination and evolution. Her expertise covers wide range x-ray techniques such as thin film x-ray diffraction and reflectivity, powder diffraction, small angle x-ray scattering, protein solution scattering and protein crystallography, as well as x-ray imaging. Currently she is the project leader of a multi-million dollar project on transmission x-ray microscopy recently funded by the U.S. DOE and the spokesperson for this new imaging beamline at the NSLS. She has also been collaborating with universities and industries for several projects on energy research at the NSLS.

456

Fermilab Users' Executive Committee  

NLE Websites -- All DOE Office Websites (Extended Search)

2012-2013 UEC and GSA Members at October meeting 2012-2013 UEC and GSA Members at October meeting Current Members of the Fermilab Users Executive Committee 2012-2013 Name and Organization Term Email Nikos Varelas, Chair University of Illinois at Chicago 9/11 - 8/13 varelas AT uic.edu Mary Anne Cummings Muons, Inc. 9/12 - 8/14 macc AT fnal.gov Craig Group University of Virginia 9/12 - 8/14 group AT fnal.gov Sergo Jindariani Fermilab 9/11 - 8/13 sergo AT fnal.gov Daniel Kaplan Illinois Institute of Technology 9/11 - 8/13 kaplan AT iit.edu Ryan Patterson California Institute of Technology 9/11 - 8/13 rbpatter AT caltech.edu Greg Pawloski University of Minnesota 9/11 - 8/13 pawloski AT umn.edu Breese Quinn University of Mississippi 9/12 - 8/14 quinn AT phy.olemiss.edu Lee Roberts Boston University 9/12 - 8/14 roberts AT bu.edu Mandy Rominsky

457

Gaines, Michigan: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

Gaines, Michigan: Energy Resources Gaines, Michigan: Energy Resources Jump to: navigation, search Equivalent URI DBpedia Coordinates 42.8725303°, -83.9141254° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":42.8725303,"lon":-83.9141254,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

458

Can we fix the security economics of federated authentication? (transcript of discussion)  

Science Conference Proceedings (OSTI)

OK, so the talk that I've got today is entitled "Can We Fix the Security Economics of Federated Authentication?" and some of this is stuff that I did while I was at Google in January and February. I'm on sabbatical this year and so I'm visiting various ...

Ross Anderson

2011-03-01T23:59:59.000Z

459

Strong password-based authentication in TLS using the three-party group Diffie Hellman protocol  

Science Conference Proceedings (OSTI)

The internet has evolved into a very hostile ecosystem where 'phishing' attacks are common practice. This paper shows that the three-party group Diffie-Hellman key exchange can help protect against these attacks. We have developed password-based ... Keywords: TLS, cryptography, group Diffie Hellman key exchange, networks, password authentication, phishing attacks, transport layer security

Michel Abdalla; Emmanuel Bresson; Olivier Chevassut; Bodo Moller; David Pointcheval

2007-04-01T23:59:59.000Z

460

Security Analysis and Implementation of JUIT—Image Based Authentication System Using Kerberos Protocol  

Science Conference Proceedings (OSTI)

Secure environments protect their resources against unauthorized access by enforcing access control mechanisms. So when increasing security is an issue text based passwords are not enough to counter such problems. The need for something more secure along ... Keywords: Image Based Authentication System, AJAX, MySQL, Diffie-Hellman key Exchange, Kerberos Protocol, Keystroke Logging, Tempest Attack, Shoulder Attack, Brute-force Attack

Nitin; Durg Singh Chauhan; Vivek Kumar Sehgal; Ankit Mahanot; Pallavi Singh; Sohit Ahuja; Utkarsh Shrivastava; Manisha Rana; Vineet Punjabi; Shivam Vinay; Nakul Sharma

2008-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Authentication of images for 3D cameras: Reversibly embedding information using intelligent approaches  

Science Conference Proceedings (OSTI)

In this work, a reversible watermarking approach for authentication of 3D cameras based on computational intelligence is presented. Two intelligent techniques based on differential evolution (DE) and hybrid DE are employed to optimize the tradeoff between ... Keywords: 3D camera, Depth maps, Differential evolution algorithm, Integer wavelet transform, Particle swarm optimization, Reversible watermarking

Sana Ambreen Malik; Asifullah Khan; Mutawarra Hussain; Khurram Jawad; Rafiullah Chamlawi; Abdul Jalil

2012-11-01T23:59:59.000Z

462

Register with the User Office  

NLE Websites -- All DOE Office Websites (Extended Search)

Register with the User Office Print Register with the User Office Print The following registration process MUST be completed online by new and returning users at least TWO WEEKS prior to arrival at the ALS. Not a U.S. citizen? Please look at Documents for Foreign Nationals well ahead of your visit. Bring all relevant documents to the ALS in order to complete your registration. Step 1: Two Weeks Prior to Coming to the ALS New Users: complete and submit an ALS Participating Guest Registration Form - you will automatically receive a registration submission number when the form is submitted. Returning Users: complete and submit a returning user form - you will need your guest (badge) number, which can be found in the Lab Directory, under your name. Notify the ALS User Office of your arrival: This e-mail address is being protected from spambots. You need JavaScript enabled to view it the day and approximate time of your arrival and whether you will travel by car or shuttle bus to the ALS. Please include your registration submission number. The User Office will inform the main gate of your arrival and will prepare your paperwork so there will be no delay on arrival.

463

Register with the User Office  

NLE Websites -- All DOE Office Websites (Extended Search)

Register with the User Office Print Register with the User Office Print The following registration process MUST be completed online by new and returning users at least TWO WEEKS prior to arrival at the ALS. Not a U.S. citizen? Please look at Documents for Foreign Nationals well ahead of your visit. Bring all relevant documents to the ALS in order to complete your registration. Step 1: Two Weeks Prior to Coming to the ALS New Users: complete and submit an ALS Participating Guest Registration Form - you will automatically receive a registration submission number when the form is submitted. Returning Users: complete and submit a returning user form - you will need your guest (badge) number, which can be found in the Lab Directory, under your name. Notify the ALS User Office of your arrival: This e-mail address is being protected from spambots. You need JavaScript enabled to view it the day and approximate time of your arrival and whether you will travel by car or shuttle bus to the ALS. Please include your registration submission number. The User Office will inform the main gate of your arrival and will prepare your paperwork so there will be no delay on arrival.

464

Register with the User Office  

NLE Websites -- All DOE Office Websites (Extended Search)

Register with the User Office Print Register with the User Office Print The following registration process MUST be completed online by new and returning users at least TWO WEEKS prior to arrival at the ALS. Not a U.S. citizen? Please look at Documents for Foreign Nationals well ahead of your visit. Bring all relevant documents to the ALS in order to complete your registration. Step 1: Two Weeks Prior to Coming to the ALS New Users: complete and submit an ALS Participating Guest Registration Form - you will automatically receive a registration submission number when the form is submitted. Returning Users: complete and submit a returning user form - you will need your guest (badge) number, which can be found in the Lab Directory, under your name. Notify the ALS User Office of your arrival: This e-mail address is being protected from spambots. You need JavaScript enabled to view it the day and approximate time of your arrival and whether you will travel by car or shuttle bus to the ALS. Please include your registration submission number. The User Office will inform the main gate of your arrival and will prepare your paperwork so there will be no delay on arrival.

465

Outer bounds for user cooperation  

Science Conference Proceedings (OSTI)

We obtain a dependence balance based outer bound on the capacity region of the two-user multiple access channel with generalized feedback (MAC-GF). We investigate a Gaussian MAC with user-cooperation (MAC-UC), where each transmitter receives an additive ...

Ravi Tandon; Sennur Ulukus

2009-06-01T23:59:59.000Z

466

Waste Pickup Form User's Guide  

E-Print Network (OSTI)

Waste Pickup Form User's Guide Updated: 3/13/12 #12;Introduction: Welcome to the Cal State University Fullerton Online Waste Pickup Form User's Guide. In this guide you will learn what you can use phosphorus-32) 3. To request a pickup of universal waste including light bulbs, aerosol cans, batteries

de Lijser, Peter

467

End-user strategy programming  

Science Conference Proceedings (OSTI)

Rule-based programming systems can be fragile because they force the user to account for all logical alternatives. If an unconsidered case does arise during execution, program behavior falls through the cracks into unspecified behavior. We investigate ... Keywords: American football, Computer animation, End-user programming, Natural programming, Visual programming

Christoph Neumann; Ronald A. Metoyer; Margaret Burnett

2009-02-01T23:59:59.000Z

468

APS User News, Issue 70  

NLE Websites -- All DOE Office Websites (Extended Search)

70, July 7, 2011 70, July 7, 2011 CONTENTS 1. DIRECTOR'S CORNER USER MATTERS 2. More User Mysteries Solved! 3. Several APS Users Recognized in Inaugural Class of New American Crystallographic Association Fellows Program 4. Congratulations to Keith Moffat, Winner of the ACA 2011 Patterson Award 5. Paul Fenter Wins Warren Award for X-ray Diffraction Studies 6. Energy, Enthusiasm, Cooperation, and Commitment Characterize NUFO Annual Meeting BRIEFLY NOTED -- Heads Up: User Participation in Upcoming Reviews -- Upcoming General User Proposal Deadlines -- Reminder: Registration for 2011 X-ray Science Gordon Research Conference & Seminar Closes July 9, 2011 -- Shanghai Institute of Applied Physics Workshop on Science with Free-Electron Lasers on August 20-21, 2011 =====================================================

469

APS User News, Issue 82  

NLE Websites -- All DOE Office Websites (Extended Search)

2, November 6, 2012 2, November 6, 2012 CONTENTS DIRECTOR'S CORNER USER MATTERS -- APS User Wins Nobel Prize in Chemistry -- Physics, Picasso, and House Paint: X-rays Solve a Mystery -- CALL FOR: APS Workshop Proposals and Invited Speaker Suggestions--Due January 11, 2013! --"There's an app for APS!" BRIEFLY NOTED -- Welcome Susan White-DePace, Associate Manager for User Programs -- Nature.com Launches Scientific Reports -- Sidewalk Construction Begins from APS to Building 314 -- Newly Reduced Speed Limit in 201 Area -- Upcoming Meetings of Interest -- General User Proposal Deadline for Run 2013-2: March 8, 2013 -- Current APS Job Openings -- Save the Date: 2013 APS/CNM/EMC Users Meeting Set for May 6-9, 2013 ==================================================== Instructions for subscribing, unsubscribing, and submitting info

470

2004 NERSC User Survey Results  

NLE Websites -- All DOE Office Websites (Extended Search)

4 User Survey Results 4 User Survey Results Show All | 1 2 3 4 5 ... 13 | Next » 2004 User Survey Results Table of Contents Response Summary Respondent Demographics Overall Satisfaction and Importance All Satisfaction, Importance and Usefulness Ratings Hardware Resources Software Security and One Time Passwords Visualization and Data Analysis HPC Consulting Services and Communications Web Interfaces Training Comments about NERSC Response Summary Many thanks to the 209 users who responded to this year's User Survey. The respondents represent all six DOE Science Offices and a variety of home institutions: see Respondent Demographics. The survey responses provide feedback about every aspect of NERSC's operation, help us judge the quality of our services, give DOE information on how well NERSC is doing, and point us to areas we can improve. The

471

2005 NERSC User Survey Results  

NLE Websites -- All DOE Office Websites (Extended Search)

5 User Survey Results 5 User Survey Results Show All | 1 2 3 4 5 ... 10 | Next » 2005 User Survey Results Table of Contents Response Summary Respondent Demographics All Satisfaction, Importance and Usefulness Ratings Hardware Resources Software Visualization and Data Analysis Services and Communications Web Interfaces Training Comments about NERSC Response Summary Many thanks to the 201 users who responded to this year's User Survey. The respondents represent all six DOE Science Offices and a variety of home institutions: see Respondent Demographics. The survey responses provide feedback about every aspect of NERSC's operation, help us judge the quality of our services, give DOE information on how well NERSC is doing, and point us to areas we can improve. The survey results are listed below.

472

Help:User page | Open Energy Information  

Open Energy Info (EERE)

A user page is a page about a wiki user; someone who registered on the A user page is a page about a wiki user; someone who registered on the wiki, and is (most probably) a contributor. If you have registered, you can create your own user page. Your user page is linked in the top right. More importantly, others will see links to your user page from various places which assist wiki collaboration. This includes the "Recent changes" and "page history" displays (See Help:Tracking changes). You can also link to your user page within text of a wiki page, which is mainly useful on talk pages when you sign your name. Contents 1 What to put on your user page 1.1 User scratchpad / development area 2 Other people's user pages 2.1 User Contributions 2.2 Editing someone else's page 2.3 User talk pages What to put on your user page

473

Plant Engineering: Users Guide for the Development of Life Cycle Management Plans  

Science Conference Proceedings (OSTI)

This guide provides direction for the user in the development, implementation, and maintenance of life cycle management plans (LCMPs).  The guide includes an appendix containing a template that users can employ in the development of their plant-specific LCMPs.BackgroundEPRI report TR-106109, Nuclear Plant Life Cycle Management Implementation Guide, was issued in November 1998. Since the publication of that report, the industry has gained much ...

2012-12-12T23:59:59.000Z

474

Potential Efficiency Gains, and Energy and Carbon Emission Savings ...  

U.S. Energy Information Administration (EIA)

Table 3. Potential Efficiency Gains, and Energy and Carbon Emission Savings, of Replacing Existing 1997 Appliances

475

Compensated gain control circuit for buck regulator command charge circuit  

DOE Patents (OSTI)

A buck regulator command charge circuit includes a compensated-gain control signal for compensating for changes in the component values in order to achieve optimal voltage regulation. The compensated-gain control circuit includes an automatic-gain control circuit for generating a variable-gain control signal. The automatic-gain control circuit is formed of a precision rectifier circuit, a filter network, an error amplifier, and an integrator circuit.

Barrett, David M. (Albuquerque, NM)

1996-01-01T23:59:59.000Z

476

Fermilab Users' Outreach Workshop, 2009  

NLE Websites -- All DOE Office Websites (Extended Search)

Fermilab Users' Outreach Workshop Fermilab Users' Outreach Workshop June 4 & 5, 2009 The Fermilab UsersÂ’ Organization will host an Outreach Workshop on June 4th and 5th, 2009, in association with the annual Users Meeting. The workshop will be an opportunity to exchange ideas on effective and practical ways to communicate the excitement of physics and what we do as scientists to students, the general public and government officials. We hope the sessions will encourage members of the Users' community to become engaged in outreach activities. Activities Tesla Coils June 3rd 9:30PM, Parking Lot Lab 3: While enjoying the traditional Users Meeting Festa, see the Tesla Coil show. Directions June 4th During coffee breaks and lunch on the second day of the Users Meeting proper, browse posters and demonstrations showcasing sucessful educational outreach programs. Also featured, posters from students enrolled in the Saturday Morning Physics program detailing what the outreach program meant to them. Instructions for Poster Presenters, follow this link.

477

BNL Guest, User and Visitor Center | User Facilities  

NLE Websites -- All DOE Office Websites (Extended Search)

Collider RHIC Access Information RHIC & AGS Users' Center Building 400A, Brookhaven National Lab Upton, NY 11973 631-344-3333 userscenter@bnl.gov CFN Center for Functional...

478

User interfaces to expert systems  

Science Conference Proceedings (OSTI)

Expert Systems are becoming increasingly popular in environments where the user is not well versed in computers or the subject domain. They offer expert advice and can also explain their lines of reasoning. As these systems are applied to highly technical areas, they become complex and large. Therefore, User Systems Interfaces (USIs) become critical. This paper discusses recent technologies that can be applied to improved user communication. In particular, bar menus/graphics, mouse interfaces, touch screens, and voice links will be highlighted. Their applications in the context of SOFTMAN (The Software Manager Apprentice) a knowledge-based system are discussed. 18 refs., 2 figs.

Agarwal, A.; Emrich, M.L.

1988-10-01T23:59:59.000Z

479

T-721:Mac OS X Directory Services Lets Local Users View User Password  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21:Mac OS X Directory Services Lets Local Users View User 21:Mac OS X Directory Services Lets Local Users View User Password Hashes T-721:Mac OS X Directory Services Lets Local Users View User Password Hashes September 20, 2011 - 8:45am Addthis PROBLEM: Mac OS X Directory Services Lets Local Users View User Password Hashes. PLATFORM: Mac OS X Lion (10.7) ABSTRACT: A local user can view user password hashes. reference LINKS: SecurityTracker Alert ID: 1026067 Apple Support Downloads Apple Security Updates Apple OS X Lion v10.7.1 Update IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Mac OS X. A local user can view user password hashes. A local user can invoke the following Directory Services command line command to view the password hash for the target user: dscl localhost -read /Search/Users/[target user] A local user can change their

480

User interface design with matrix algebra  

Science Conference Proceedings (OSTI)

It is usually very hard, both for designers and users, to reason reliably about user interfaces. This article shows that 'push button' and 'point and click' user interfaces are algebraic structures. Users effectively do algebra when they interact, and ... Keywords: Matrix algebra, feature interaction, usability analysis, user interface design

Harold Thimbleby

2004-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "authenticated users gain" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Risk Insights Gained from Fire Incidents  

SciTech Connect

There now exist close to 20 years of history in the application of Probabilistic Risk Assessment (PRA) for the analysis of fire risk at nuclear power plants. The current methods are based on various assumptions regarding fire phenomena, the impact of fire on equipment and operator response, and the overall progression of a fire event from initiation through final resolution. Over this same time period, a number of significant fire incidents have occurred at nuclear power plants around the world. Insights gained from US experience have been used in US studies as the statistical basis for establishing fire initiation frequencies both as a function of the plant area and the initiating fire source.To a lesser extent, the fire experience has also been used to assess the general severity and duration of fires. However, aside from these statistical analyses, the incidents have rarely been scrutinized in detail to verify the underlying assumptions of fire PRAs. This paper discusses an effort, under which a set of fire incidents are being reviewed in order to gain insights directly relevant to the methods, data, and assumptions that form the basis for current fire PRAs. The paper focuses on the objectives of the effort, the specific fire events being reviews methodology, and anticipated follow-on activities.

Kazarians, Mardy; Nowlen, Steven P.

1999-06-10T23:59:59.000Z

482

User Facilities for Industry 101  

NLE Websites -- All DOE Office Websites (Extended Search)

Satellite!Workshop!10!-!User!Facilities!for!Industry!101! Satellite!Workshop!10!-!User!Facilities!for!Industry!101! Organizers:+Andreas+Roelofs+(CNM),+Jyotsana+Lal+(APS),+Katie+Carrado+Gregar+(CNM),+and+Susan+Strasser+ (APS)! ! In! order! to! increase! awareness! of! the! industrial! community! to! Argonne! National! Laboratory! user! facilities,!the!Advanced!Photon!Source!(APS),!the!Center!for!Nanoscale!Materials!(CNM)!and!the!Electron! Microscopy!Center!(EMC)!welcomed!industrial!scientists,!engineers!and!related!professionals!to!a!oneC day! workshop! to! learn! more! about! Argonne's! National! Laboratory! and! the! capabilities/techniques! available! for! their! use.! The! workshop! showcased! several! successful! industrial! user! experiments,! and! explained! the! different! ways! in! which! industrial! scientists! can! work! at! Argonne! or! with! Argonne!

483

APS USER TRAINING HISTORY Background  

NLE Websites -- All DOE Office Websites (Extended Search)

USER TRAINING HISTORY USER TRAINING HISTORY Background The User Program Division Director has delegated to the CATs the authority to authorize the conduct of experiments because the CATs have accepted responsibility for: * identifying and evaluating the hazards posed by the experiment, * specifying controls appropriate to the hazards, and * verifying that controls are in place. One form of hazard control frequently made mandatory by law and laboratory policy is worker knowledge. The accepted means of verifying that a worker has the required knowledge is ensuring that the worker has completed appropriate training. With CAT input, the APS has developed the APS User Training History. This web-based tool enables designated CAT personnel to examine data characterizing ES&H training courses

484

User cost in oil production  

E-Print Network (OSTI)

The assumption of an initial fixed mineral stock is superfluous and wrong. User cost (resource rent) in mineral production is the present value of expected increases in development cost. It can be measured as the difference ...

Adelman, Morris Albert

1990-01-01T23:59:59.000Z

485

Lisa Gerhardt NERSC User Services"  

NLE Websites -- All DOE Office Websites (Extended Search)

Gerhardt " NERSC User Services" September 10, 2013" Getting Started at NERSC: Running Jobs Jobs at NERSC * Most j obs a re p arallel, u sing 1 0s t o 1 00,000+ c ores * Produc8on r...

486

APS User News, Issue 68  

NLE Websites -- All DOE Office Websites (Extended Search)

8, March 23, 2011 CONTENTS DIRECTOR'S CORNER SCIENCE NEWS 1. Science Highlights USER MATTERS 2. Stern, Lytle, Sayers, and Rehr Win 2011 Arthur H. Compton Award 3. Registration Open...

487

APS User News, Issue 84  

NLE Websites -- All DOE Office Websites (Extended Search)

4, August 28, 2013 CONTENTS DIRECTOR'S CORNER APS UPGRADE NEWS by George Srajer, APS Upgrade Director USER MATTERS -- Three-Way Meeting Hosted at APS -- Tech Tuesdays -- Get Your...

488

Useful Information for NOMAD Users  

NLE Websites -- All DOE Office Websites (Extended Search)

NOMAD Users Applying for beam time is the first step in conducting research at SNS and HFIR. Shipping address for samples Non-activated samples coming to SNS Attention: Special...

489

2009 JGI DOE User Meeting  

NLE Websites -- All DOE Office Websites (Extended Search)

Department of Energy Joint Genome Institute (JGI) Fourth Annual User Meeting Marriott Hotel in Walnut Creek, California March 25-27, 2009 The U.S. Department of Energy Joint...

490

CS267: NERSC User Blog  

NLE Websites -- All DOE Office Websites (Extended Search)

Computers Discussion CS267: NERSC Discussion This area is intended for NERSC users and staff to help each other with questions about CS267. Post your comment Posting comments...

491

Making Global Illumination User Friendly  

NLE Websites -- All DOE Office Websites (Extended Search)

Making Global Illumination User Friendly Making Global Illumination User Friendly Title Making Global Illumination User Friendly Publication Type Conference Paper LBNL Report Number LBL-37860 Year of Publication 1995 Authors Ward, Gregory J. Conference Name 6th Eurographics Workshop on Rendering Date Published 06/1995 Conference Location Dublin, Ireland Call Number LBL-37860 Abstract Global illumination researchers tend to think in terms of mesh density and sampling frequency, and their software reflects this in its user interface. Advanced rendering systems are rife with long command lines and parameters for tuning the sample densities, thresholds and other algorithm-specific variables, and the novice user is quickly lost in a sea of possibilities. This paper details a successful effort of making one such global illumination system usable by people who understand their problems, even if they do not understand the methods needed to solve them, through an assisted oracle approach. A single program is introduced to map a small set of intuitive control variables to the rendering commands and parameter settings needed to produce the desired output in a reasonable time. This new executive program then serves as the basis for a graphical user interface that is both friendly in its appearance and reliable in its performance. Finally, we conclude with some future directions for improving this interface.

492

User:Jweers/Test | Open Energy Information  

Open Energy Info (EERE)

User page Edit History Share this page on Facebook icon Twitter icon User:JweersTest < User:Jweers Jump to: navigation, search Normal Wiki Content Lorem epsum and some...

493

PLEASE PRINT APS USER AGREEMENT QUESTIONNAIRE  

E-Print Network (OSTI)

? * _______ Advanced Leadership Computing Facility (ALCF) _______ Advanced Photon Source (APS) _______ Argonne Tandem are not permitted to do hands-on work at any Argonne User Facilities until a User Agreement (UA known") ______________________________ 5. Which Argonne user facility will be hosting you

Kemner, Ken

494

Cross-cultural user-experience design  

Science Conference Proceedings (OSTI)

User interfaces for desktop, Web, mobile, and vehicle platforms extend across culturally diverse user communities, sometimes within a single country or language group, and certainly across the globe. If user interfaces are to be usable, useful, and appealing ...

Aaron Marcus

2011-12-01T23:59:59.000Z

495

17th Annual ALS Users' Association Meeting  

E-Print Network (OSTI)

and other Berkeley Lab user facilities that will reside inis one of the best facilities for users to do great science.facility,research activities, and plans for the future. Figure 2. User

Robinson, Art; Tamura, Lori

2004-01-01T23:59:59.000Z

496

TWOZONE USERS MANUAL. 2d ed  

E-Print Network (OSTI)

RECE/VE:O TWOZONE Users Manual *2nd Edition* Revised OctoberBEV 78-2 TWOZONE Users Manual *2nd Edition* Ashok J. Gadgil,edition of the TWOZONE USERS MANUAL. In the past five years

Gadgil, A.J.

2008-01-01T23:59:59.000Z

497

COMPUTER PROGRAM CCC USER'S MANUAL VERSION II.  

E-Print Network (OSTI)

1PUTER PROGRAM CCC USER'S MANUAL VERSION II D.C. Mangold,COMPUTER PROGRAM CCC USER'S MANUAL Version II (January,Ll COMPUTER PROGRAM CCC--USER'S MANUAL D. C. Mangold, M, J,

Mangold, D.C.

2013-01-01T23:59:59.000Z

498

Become a User | Advanced Photon Source  

NLE Websites -- All DOE Office Websites (Extended Search)

As a General User or Partner User: If your institution is not represented by a CAT, you can can submit a proposal to the APS requesting time as a General User or Partner...

499

User centered design at european patent office  

Science Conference Proceedings (OSTI)

This paper describes how a large organisation implemented a user centered design process initiative to meet the business goals of minimising training for users. Keywords: business applications, user interface design specifications

Alard Weisscher; Josine van de Ven; Raghu Kolli; Ged Owens

2004-04-01T23:59:59.000Z

500

Managing Your NERSC Allocation and its Users  

NLE Websites -- All DOE Office Websites (Extended Search)

managing your users see the NIM Guide for PIs This guide explains how to check account usage, how to add and delete users from your project account (repo), how to change users...