National Library of Energy BETA

Sample records for building number secure

  1. On Building Secure SCADA Systems using Security Eduardo B. Fernandez

    E-Print Network [OSTI]

    Wu, Jie

    On Building Secure SCADA Systems using Security Patterns Eduardo B. Fernandez Dept. of Comp. Sci, also known as the supervisory, control, and data acquisition (SCADA) system. On the other hand systems. This paper aims to propose methods to build a secure SCADA system using security patterns

  2. Building Extensible and Secure Networks

    E-Print Network [OSTI]

    Popa, Lucian

    2011-01-01

    adoption of cloud computing is security, as customers oftenpreserving security when migrating to the cloud computingto the security principals used in the cloud access control

  3. Energy Security Planning for Sustainable Buildings | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    capabilities are sufficient to serve their most critical needs during a prolonged outage. Energy Security Assessments For analysis and planning, see Performing Energy Security...

  4. Table B6. Building Size, Number of Buildings, 1999

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: AlternativeMonthly","10/2015"Monthly","10/2015" ,"Release7CubicthroughtheSeptember 24,4,630.22PrimaryB6. Building Size, Number

  5. Number Abbr Building Name Location %Coverage 3205 SAGO A&M SYSTEM BUILDING Main Campus 100

    E-Print Network [OSTI]

    Number Abbr Building Name Location %Coverage 3205 SAGO A&M SYSTEM BUILDING Main Campus 100 0462 ACAD ACADEMIC BUILDING Main Campus 100 0448 BAND ADAMS BAND HALL Main Campus 100 0472 ANIN ANIMAL INDUSTRIES BUILDING Main Campus 100 0477 ANTH ANTHROPOLOGY BUILDING Main Campus 75 0293 APPE APPELT RESIDENCE

  6. SPICE Simulation of a "Provably Secure" True Random Number Generator

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    SPICE Simulation of a "Provably Secure" True Random Number Generator Markus Dichtl, Bernd Meyer True Random Number Generator with Built-in Tolerance to Active Attacks", B. Sunar, W. Mar- tin, and D. Stinson propose a design for a true random number generator. Using SPICE simulation we study the behaviour

  7. Building an Information Technology Security Awareness

    E-Print Network [OSTI]

    by providing technical leadership for the Nation's measurement and standards infrastructure. ITL develops tests of technical, physical, administrative, and management standards and guidelines for the cost-effective security Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899

  8. Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage

    E-Print Network [OSTI]

    Minnesota, University of

    Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage Vishal Kher Yongdae Kim are witnessing a revival of Storage Service Providers (SSP) in the form of new vendors as well as traditional players. While storage outsourcing is cost-effective, many companies are hesitating to outsource

  9. True Random Number Generators Secure in a Changing Environment

    E-Print Network [OSTI]

    Shaltiel, Ronen

    , which is applied to the high­entropy source in order to obtain an output string that is shorterTrue Random Number Generators Secure in a Changing Environment Boaz Barak, Ronen Shaltiel, and Eran, ISRAEL Email: {boaz,ronens,tromer}@wisdom.weizmann.ac.il Abstract. A true random number generator (TRNG

  10. U-Launch Winner Secures $2.4M Investment for Building Energy...

    Office of Environmental Management (EM)

    U-Launch Winner Secures 2.4M Investment for Building Energy Performance Software U-Launch Winner Secures 2.4M Investment for Building Energy Performance Software December 14,...

  11. Operations building | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass mapSpeeding access toOctober 1996Technologies /JuneOperating OakoakOperations building

  12. Building Grassmann Numbers from PI-Algebras

    E-Print Network [OSTI]

    Ricardo M. Bentin; Sergio Mota

    2012-04-06

    This works deals with the formal mathematical structure of so called Grassmann Numbers applied to Theoretical Physics, which is a basic concept on Berezin integration. To achieve this purpose we make use of some constructions from relative modern Polynomial Identity Algebras (PI-Algebras) applied to the special case of the Grassmann algebra.

  13. 2014-2015 Verification of Social Security Number & Date of Birth A. STUDENT INFORMATION SPIRE ID#: ____________________

    E-Print Network [OSTI]

    Mountziaris, T. J.

    2014-2015 Verification of Social Security Number & Date of Birth A. STUDENT INFORMATION SPIRE ID YYYY My correct Social Security Number is: ________ - _____ - _________ B. SIGNATURE- For corrections to date of birth. · Signed Social Security card or passport- For corrections to social security

  14. Secure Pesticide Storage: Essential Structural Features of a Storage Building1

    E-Print Network [OSTI]

    Hill, Jeffrey E.

    PI30 Secure Pesticide Storage: Essential Structural Features of a Storage Building1 Thomas W. Dean2 be present in any building constructed for pesticide storage. Introduction The main job of a pesticide storage facility is to suitably house and protect packages of pesticide. To do this in Florida

  15. A Greek (Privacy) Tragedy: The Introduction of Social Security Numbers in Greece

    E-Print Network [OSTI]

    Ioannidis, Sotiris

    A Greek (Privacy) Tragedy: The Introduction of Social Security Numbers in Greece Eleni Gessiou of AMKA in Greece in the future, along the lines of the Social Security Number in the US. 1. INTRODUCTION that is made publicly available (e.g., on the face of student ID cards at Universities [5]). Greece recently

  16. A. Name: Information Systems Security Incident Response Policy B. Number: 20070103-secincidentresp

    E-Print Network [OSTI]

    George, Edward I.

    Page 1 I. Title A. Name: Information Systems Security Incident Response Policy B. Number: 20070103 and Responsibility Information Systems and Computing is responsible for the operation of Penn's data networks (Penn-secincidentresp C. Author(s): David Millar (ISC Information Security) and Lauren Steinfeld (Chief Privacy Officer

  17. Bingo Voting: Secure and coercionfree voting using a trusted random number generator

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Bingo Voting: Secure and coercion­free voting using a trusted random number generator Jens is based on a trusted random number generator. As a motivation for the new scheme two coercion/vote buying of a random number generator, comparable to a bingo cage. The new scheme achieves: -- ballot casting assurance

  18. Indoor Air Quality Forms 195 Building: _________________________________________________________ File Number: ________________________________

    E-Print Network [OSTI]

    Indoor Air Quality Forms 195 Building in relation to indoor air quality. Page 1 of 14 Needs Attention Not ApplicableOKComponent Comments Outside Air Screen Unobstructed? General condition? Size of mesh? (1 /2" minimum) Outside Air Dampers Operation

  19. Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage Vishal Kher and Yongdae Kim

    E-Print Network [OSTI]

    Kim, Yongdae

    Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage Vishal Kher and Yongdae are witnessing a revival of Storage Service Providers in the form of new vendors as well as traditional players. While storage outsourcing is cost-effective, many compa- nies are hesitating to outsource their storage

  20. Building a Secure and Privacy-Preserving Smart Grid Cornell University

    E-Print Network [OSTI]

    Jelasity, Márk

    in the electrical power grid promise to create a more efficient, cost-effective, and adaptable smart grid. HoweverBuilding a Secure and Privacy-Preserving Smart Grid Ken Birman Cornell University Márk Jelasity, naive implementations of smart grid data collection could jeopardize the privacy of consumers

  1. DOE-ORO buildings | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submit theCovalent Bonding Low-Cost2 DOE HQSite toDOE,DOE-ORO buildings known as the

  2. DOE-ORO buildings | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submit theCovalent Bonding Low-Cost2 DOE HQSite toDOE,DOE-ORO buildings known as

  3. Safeguarding Health Information: Building Assurance through HIPAA Security Hosted by the HHS Office for Civil Rights (OCR) and the National Institute of Standards and Technology (NIST)

    E-Print Network [OSTI]

    1 Safeguarding Health Information: Building Assurance through HIPAA Security Hosted by the HHS, Acting Chief, Computer Security Division, Information Technology Laboratory (ITL), NIST 9 Data Using Encryption Matthew Scholl, Computer Security Division, Information Technology Laboratory

  4. Major building changes should be forwarded to the safety committee for action. GENERAL SAFETY-FIRE-SECURITY

    E-Print Network [OSTI]

    Firestone, Jeremy

    Major building changes should be forwarded to the safety committee for action. GENERAL SAFETY-FIRE-SECURITY SURVEY CHECKLIST CAMPUS INSPECTION DATE BUILDING NAME INSPECTOR: ASSISTED BY: Item Satisfactory Unsatisfactory Not Applicable OUTSIDE/INSIDE BUILDING 1. ADA (Americans with Disabilities Act) Entry/Exit (If

  5. Table B8. Year Constructed, Number of Buildings, 1999

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: AlternativeMonthly","10/2015"Monthly","10/2015" ,"Release7CubicthroughtheSeptember 24,4,630.22PrimaryB6. Building Size,

  6. Hanford Facility Beryllium Fact Sheet Building Number/Name:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (Journalvivo Low-Dose Lowď‚—34October 201422T Office Administration Building

  7. Lighting recommendations for the Social Security Administration Frank Hagel Federal Building in Richmond CA

    SciTech Connect (OSTI)

    Rubinstein, Francis M.

    1999-10-25

    Specific recommendations are made to improve the lighting quality and energy efficiency of the lighting system at the Social Security Administration Frank Hagel Building in Richmond, CA. The main recommendation is to replace the recessed fluorescent lighting system in the general office area with indirect lighting. Indirect lighting will improve lighting quality, will provide an energy efficient solution and will be about the same cost as the direct lighting system originally proposed.

  8. Property:Buildings/ReportNumber | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIXsourceIIInformationEnergyReportNumber Jump to: navigation, search This is a property

  9. Social Security Administration Information Phone:(706)5422900Fax:(706)5830123Web:international.uga.edu Email:issis@uga.edu

    E-Print Network [OSTI]

    Arnold, Jonathan

    Social Security Administration Information Phone:(706)5422900Fax:(706)5830123Web number. For additional information you may visit the Social Security Administration's (SSA) website Security Administration (SSA) Social Security Administration Federal Building 1650 Prince Avenue, Athens

  10. CONTROLLING ACCESS TO UNIVERSITY FACILITIES 1. It is the Policy of Syracuse University that all electronically secured University buildings will

    E-Print Network [OSTI]

    Mather, Patrick T.

    that all electronically secured University buildings will have a single access control system for managing) and the Department of Energy and Computing Management (ECM). B. INFORMATION 1.The policy establishes responsibility of electronic security systems and provides for the monitoring of external access to University facilities

  11. Security

    Broader source: Energy.gov [DOE]

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  12. Building Name Street Number Street Prefix Direction Street Name Suffix Street Direction Community 1901 1901 INNOVATION DR VIRGINIA TECH

    E-Print Network [OSTI]

    Building Name Street Number Street Prefix Direction Street Name Suffix Street Direction Community 1901 1901 INNOVATION DR VIRGINIA TECH 1971 1971 KRAFT DR VIRGINIA TECH Ag Engineering Building 120 OLD MILL RD VIRGINIA TECH Agronomy Service Building 1008 OLD MILL RD VIRGINIA TECH Agronomy Storage

  13. Efficient and Cryptographically Secure Generation of Chaotic Pseudorandom Numbers on GPU

    E-Print Network [OSTI]

    Bahi, Jacques M; Guyeux, Christophe; Héam, Pierre-Cyrille

    2011-01-01

    In this paper we present a new pseudorandom number generator (PRNG) on graphics processing units (GPU). This PRNG is based on the so-called chaotic iterations. It is firstly proven to be chaotic according to the Devaney's formulation. We thus propose an efficient implementation for GPU that successfully passes the BigCrush tests, deemed to be the hardest battery of tests in TestU01. Experiments show that this PRNG can generate about 20 billion of random numbers per second on Tesla C1060 and NVidia GTX280 cards. It is then established that, under reasonable assumptions, the proposed PRNG can be cryptographically secure. A chaotic version of the Blum-Goldwasser asymmetric key encryption scheme is finally proposed.

  14. Property:Number of Build Out Units Deployed | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QAsource History ViewMayo,AltFuelVehicle2 Jump to: navigation, searchContDivSerialNumber JumpNumInjWellsBuild Out

  15. Building

    E-Print Network [OSTI]

    Physical Facilities

    2013-11-12

    MATHEMATICAL SCIENCES BUILDING. BUILDING EMERGENCY PLAN. Date Adopted: Sept 20, 2013. Date Revised: Sep 20. 2013. Prepared By: Kelly ...

  16. Homeland Security vs. the Madisonian Impulse: State Building and Anti-Statism after September 11

    E-Print Network [OSTI]

    Stowsky, Jay; Kroenig, Matthew

    2005-01-01

    Inspector General of the Homeland Security Department, and BearingPoint, a consulting firm hired by TSA. The reports

  17. Incorporating Sustainability into Lease and Build Agreements; U.S. Department of Homeland Security (DHS)

    SciTech Connect (OSTI)

    2015-05-26

    This fact sheet discusses the benefits of incorporating sustainability into lease and build agreements.

  18. Virginia Tech Request for Update in Social Security Number for Academic Purposes

    E-Print Network [OSTI]

    of the University Registrar (MC 0134) Student Services Building Suite 250, Virginia Tech 800 Washington Street SW

  19. information security

    E-Print Network [OSTI]

    Faculty listing for "information security" ... 1167; Phone: +1 765 49-46022; Email: wagstaff@purdue.edu; Research Interests: number theory, information security.

  20. TABLE OF CONTENTS: Building Executive Definition.......................................................................3

    E-Print Network [OSTI]

    Capogna, Luca

    #12;TABLE OF CONTENTS: Building Executive Definition.......................................................................3 Building Executives Areas of Responsibilities ...................................................................................5 Building Safety and Security Issues

  1. Final Status Survey Report for Corrective Action Unit 117 - Pluto Disassembly Facility, Building 2201, Nevada National Security Site, Nevada

    SciTech Connect (OSTI)

    Jeremy Gwin and Douglas Frenette

    2010-09-30

    This document contains the process knowledge, radiological data and subsequent statistical methodology and analysis to support approval for the radiological release of Corrective Action Unit (CAU) 117 – Pluto Disassembly Facility, Building 2201 located in Area 26 of the Nevada National Security Site (NNSS). Preparations for release of the building began in 2009 and followed the methodology described in the Multi-Agency Radiation Survey and Site Investigation Manual (MARSSIM). MARSSIM is the DOE approved process for release of Real Property (buildings and landmasses) to a set of established criteria or authorized limits. The pre-approved authorized limits for surface contamination values and corresponding assumptions were established by DOE O 5400.5. The release criteria coincide with the acceptance criteria of the U10C landfill permit. The U10C landfill is the proposed location to dispose of the radiologically non-impacted, or “clean,” building rubble following demolition. However, other disposition options that include the building and/or waste remaining at the NNSS may be considered providing that the same release limits apply. The Final Status Survey was designed following MARSSIM guidance by reviewing historical documentation and radiological survey data. Following this review a formal radiological characterization survey was performed in two phases. The characterization revealed multiple areas of residual radioactivity above the release criteria. These locations were remediated (decontaminated) and then the surface activity was verified to be less than the release criteria. Once remediation efforts had been successfully completed, a Final Status Survey Plan (10-015, “Final Status Survey Plan for Corrective Action Unit 117 – Pluto Disassembly Facility, Building 2201”) was developed and implemented to complete the final step in the MARSSIM process, the Final Status Survey. The Final Status Survey Plan consisted of categorizing each individual room into one of three categories: Class 1, Class 2 or Class 3 (a fourth category is a “Non-Impacted Class” which in the case of Building 2201 only pertained to exterior surfaces of the building.) The majority of the rooms were determined to fall in the less restrictive Class 3 category, however, Rooms 102, 104, 106, and 107 were identified as containing Class 1 and 2 areas. Building 2201 was divided into “survey units” and surveyed following the requirements of the Final Status Survey Plan for each particular class. As each survey unit was completed and documented, the survey results were evaluated. Each sample (static measurement) with units of counts per minute (cpm) was corrected for the appropriate background and converted to a value with units of dpm/100 cm2. With a surface contamination value in the appropriate units, it was compared to the surface contamination limits, or in this case the derived concentration guideline level (DCGLw). The appropriate statistical test (sign test) was then performed. If the survey unit was statistically determined to be below the DCGLw, then the survey unit passed and the null hypothesis (that the survey unit is above limits) was rejected. If the survey unit was equal to or below the critical value in the sign test, the null hypothesis was not rejected. This process was performed for all survey units within Building 2201. A total of thirty-three “Class 1,” four “Class 2,” and one “Class 3” survey units were developed, surveyed, and evaluated. All survey units successfully passed the statistical test. Building 2201 meets the release criteria commensurate with the Waste Acceptance Criteria (for radiological purposes) of the U10C landfill permit residing within NNSS boundaries. Based on the thorough statistical sampling and scanning of the building’s interior, Building 2201 may be considered radiologically “clean,” or free of contamination.

  2. NATURE BIOTECHNOLOGY VOLUME 25 NUMBER 6 JUNE 2007 627 DNA synthesis and biological security

    E-Print Network [OSTI]

    Church, George M.

    Bügl, John P Danner, Robert J Molinari, John T Mulligan, Han-Oh Park, Bas Reichert, David A Roth, Ralf A group of academics, industry executives and security experts propose an oversight framework to address-synthesis industry falls short of addressing this unfortunate reality. Here, we outline a practical plan for devel

  3. Building

    U.S. Energy Information Administration (EIA) Indexed Site

    DIV. Electricity Consumption and Expenditure Intensities by Census Division, 1999" ,"Electricity Consumption",,,"Electricity Expenditures" ,"per Building (thousand kWh)","per...

  4. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security's IT Security Procedures require that non-public University information, including social security numbers and professional information in a secure and appropriate manner. #12;

  5. 9. Driver's Age 13. Driver's Date of Birth 14. Driver's Social Security Number 19. Driver's Telephone

    E-Print Network [OSTI]

    Gering, Jon C.

    of Accident (city, state; if on a highway, give number and nearest community) DRIVER INFORMATION OTHER VEHICLE OR PROPERTY Occupied Unoccupied 17. Driver's Age VEHICLE OPERATED BY UNIVERSITY EMPLOYEE Occupied Unoccupied 8. Driver's Name 16. Driver's Name TRUMAN STATE UNIVERSITY VEHICLE ACCIDENT REPORT NAME AND ADDRESS AREA

  6. Does Building a Relative Sunspot Number Make Sense? A Qualified 'Yes'

    E-Print Network [OSTI]

    Svalgaard, Leif

    2015-01-01

    Recent research has demonstrated that the number of sunspots per group ('active region') has been decreasing over the last two or three solar cycles and that the classical Relative Sunspot Number (SSN) no longer is a good representation of solar magnetic activity such as revealed by e.g. the F10.7 cm microwave flux. The SSN is derived under the assumption that the number of spots per group is constant (in fact, nominally equal to 10). When this is no longer the case (the ratio is approaching 5, only half of its nominal value) the question arises how to construct a sunspot number series that takes that into account. We propose to harmonize the SSN with the sunspot Group Count that has been shown to follow F10.7 very well, but also to include the day-to-day variations of the spot count in order to preserve both long-term and short-term variability.

  7. Building.

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room News PublicationsAudits &Bradbury Science Museum -BrooklinSecurityBetterBalance of Plant in

  8. Btu)","per Building

    U.S. Energy Information Administration (EIA) Indexed Site

    ,"Number of Buildings (thousand)","Floorspace (million square feet)","Floorspace per Building (thousand square feet)","Total (trillion Btu)","per Building (million Btu)","per...

  9. Health Care Buildings: Equipment Table

    U.S. Energy Information Administration (EIA) Indexed Site

    Equipment Table Buildings, Size and Age Data by Equipment Types for Health Care Buildings Number of Buildings (thousand) Percent of Buildings Floorspace (million square feet)...

  10. Federal Buildings Supplemental Survey 1993

    U.S. Energy Information Administration (EIA) Indexed Site

    4. Energy Conservation Features in FBSS Building in Federal Region 3, Number of Buildings and Floorspace, 1993 Total Floorspace Number of Buildings (thousand square feet) Any Any...

  11. 1 Zoology Building 2 Cruickshank Building

    E-Print Network [OSTI]

    Neri, Peter

    1 Zoology Building 2 Cruickshank Building 3 23 St Machar Drive 4 King's Museum (Old Town House) 5 The Hub 6 St Mary's 7 Fraser Noble Building 8 Elphinstone Road Halls 9 The Sir Duncan Rice Library 10 Meston Building 11 Chaplaincy Centre 12 Confucius Institute 13 Security Office/Mailroom 14 Counselling

  12. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or â?? tunnelsâ?ť, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

  13. Advanced Load Identification and Management for Buildings: Cooperative Research and Development Final Report, CRADA Number: CRD-11-422

    SciTech Connect (OSTI)

    Gentile-Polese, L.

    2014-05-01

    The goal of this CRADA work is to support Eaton Innovation Center (Eaton) efforts to develop advanced load identification, management technologies, and solutions to reduce building energy consumption by providing fine granular visibility of energy usage information and safety protection of miscellaneous electric loads (MELs) in commercial and residential buildings. MELs load identification and prediction technology will be employed in a novel 'Smart eOutlet*' to provide critical intelligence and information to improve the capability and functionality of building load analysis and design tools and building power management systems. The work scoped in this CRADA involves the following activities: development and validation of business value proposition for the proposed technologies through voice of customer investigation, market analysis, and third-party objective assessment; development and validation of energy saving impact as well as assessment of environmental and economic benefits; 'smart eOutlet' concept design, prototyping, and validation; field validation of the developed technologies in real building environments. (*Another name denoted as 'Smart Power Strip (SPS)' will be used as an alternative of the name 'Smart eOutlet' for a clearer definition of the product market position in future work.)

  14. Trends in Commercial Buildings--Buildings and Floorspace

    Annual Energy Outlook [U.S. Energy Information Administration (EIA)]

    activity. Number of Commercial Buildings In 1979, the Nonresidential Buildings Energy Consumption Survey estimated that there were 3.8 million commercial buildings in the...

  15. Principal Building Activities--1995 CBECS

    U.S. Energy Information Administration (EIA) Indexed Site

    Detailed Tables > Principal Building Activities Table Number of Buildings, Total Floorspace, and Total Site and Primary Energy Consumption for All Principal Building Activities,...

  16. Health Care Buildings: Subcategories Table

    U.S. Energy Information Administration (EIA) Indexed Site

    Subcategories Table Selected Data by Type of Health Care Building Number of Buildings (thousand) Percent of Buildings Floorspace (million square feet) Percent of Floorspace Square...

  17. Health Care Buildings : Basic Characteristics Tables

    U.S. Energy Information Administration (EIA) Indexed Site

    Basic Characteristics Tables Buildings and Size Data by Basic Characteristics for Health Care Buildings Number of Buildings (thousand) Percent of Buildings Floorspace (million...

  18. Faculty Information Security Guide

    E-Print Network [OSTI]

    Myers, Lawrence C.

    society. www.ists.dartmouth.edu THE DARTMOUTH CYBER SECURITY INITIATIVE The Dartmouth Cyber Security, TECHNOLOGY, AND SOCIETY THE DARTMOUTH CYBER SECURITY INITIATIVE #12;The number of laptop thefts at Dartmouth, and Society; and the Dartmouth Cyber Security Initiative offer the following solutions: · Whole

  19. Building International Emergency Management Systems | National...

    National Nuclear Security Administration (NNSA)

    Building International Emergency Management Systems | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  20. Building automation systems (BAS) are concerned with control and monitoring of buildings, while aiming to

    E-Print Network [OSTI]

    Clausen, Michael

    Building automation systems (BAS) are concerned with control and monitoring of buildings, while operating and energy costs Realization and Experiences with a Low-Cost Building Automation Security Testbed for Educational Purposes BUILDING AUTOMATION SYSTEMS Building automation systems dearth the aspect of security

  1. Strategies for smart building realisation 

    E-Print Network [OSTI]

    Manivannan, M.

    2012-01-01

    infrastructure comprises much of the building blocks for smart building enablement alongside automation and controls, electronic security and facility management applications. Converged IP networks, integrated command and control rooms, utility smart metering...

  2. Headquarters Facilities Master Security Plan - Chapter 1, Physical...

    Office of Environmental Management (EM)

    of U.S security interests. These procedures include control of employee and visitor access to HQ buildings, detection and control of dangerous devices, issuance of security...

  3. Building Extensible and Secure Networks

    E-Print Network [OSTI]

    Popa, Lucian

    2011-01-01

    S. Applying nox to the datacenter. In Proc. of workshop onChaiken. The Nature of Datacenter Traffic: Measurements &

  4. Building Extensible and Secure Networks

    E-Print Network [OSTI]

    Popa, Lucian

    2011-01-01

    Applying RBF to Data Centers and Cloud Computing 9.1the same challenges as cloud computing. i To my wife and myaccess control in cloud computing, and present CloudPolice

  5. Summary of Prinicpal Building Activities in Commercial Buildings

    Annual Energy Outlook [U.S. Energy Information Administration (EIA)]

    Sumary Comparison Table Return to: A Look at CBECS Building Activities SUMMARY COMPARISON TABLE Number of Buildings (thousand) Total Floorspace (million square feet) Average Square...

  6. CBECS Buildings Characteristics --Revised Tables

    U.S. Energy Information Administration (EIA) Indexed Site

    Totals and Means of Floorspace, Number of Workers, and Hours of Operation, 1995 Building Characteristics RSE Column Factor: All Buildings (thousand) Total Floorspace (million...

  7. Nuclear security

    SciTech Connect (OSTI)

    Not Available

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected.

  8. Office of Headquarters Personnel Security Operations

    Broader source: Energy.gov [DOE]

    The Office of Headquarters Personnel Security manages and implements safeguards and security access authorization functions for DOE Headquarters and manages the Personal Identity Verification (PIV) process for Headquarters as mandated by Homeland Security Presidential Directive Number 12 (HSPD-12).

  9. Special Building Renovations

    Broader source: Energy.gov [DOE]

    A number of building types have specific energy uses and needs, and as such the renewable opportunities may be different from a typical office building. This section briefly discusses the following...

  10. CWRU awarded grant to build battery for smart grid, renewables New design for iron flow battery would enhance energy and economic security

    E-Print Network [OSTI]

    Rollins, Andrew M.

    CWRU awarded grant to build battery for smart grid, renewables New design for iron flow battery year, the Cleveland-based researchers have been investigating ways to build a flow battery primarily using water and iron, hence the name. A flow battery is essentially an unwrapped battery that can

  11. Spin-out Company PortfolioTechnology Transfer The Sir Colin Campbell Building

    E-Print Network [OSTI]

    Aickelin, Uwe

    -out companies is just one of a number of mechanisms by which universities drive forward the commercialisationSpin-out Company PortfolioTechnology Transfer The Sir Colin Campbell Building The University is to be recognised around the world for our signature contributions, especially in global food security, energy

  12. The role of a security strategy is to align company security and business goals, provide

    E-Print Network [OSTI]

    Fisher, Kathleen

    , and methodologies to assist you in building a complete unified information security program or individual elements's information security program meets its requirements across the board, it is vital to have one enterprise security strategy and one information security framework. Putting in a solid foundational program

  13. Forrestal Security and Safety Procedures

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1983-02-02

    To establish uniform procedures for the security and safety of the Forrestal Building and to inform all personnel of precautionary measures. This directive does not cancel another directive. Canceled by DOE N 251.11.

  14. New techniques to deal with the problem of excessive neutral currents in buildings containing large numbers of computers and other nonlinear loads 

    E-Print Network [OSTI]

    Packebush, Paul Norman

    1994-01-01

    The increased use of computers and other nonlinear loads is beginning to effect the power quality of 208/120V three phase four wire distribution systems. Office buildings, medical facilities and factories that employ large ...

  15. Security on Campus The Security Office and lost

    E-Print Network [OSTI]

    Teaching building (building 104). · Call 9553 7333 (24 hour hotline). Security call buttons are located are located in the Gym. Contact the Student Centre for access. Travel Smart Maps · Travel Smart maps or top up Smart Riders from the Rockingham train station or most newsagents. Maps and timetables

  16. Postal Security Device Security Policy

    E-Print Network [OSTI]

    Postal Security Device Security Policy FRAMA AG PSD - I Version: R01.06 Date: 25.05.2007 Doc.-ID: DE_FNKPSD_510_SPE File name: DE_FNKPSD_510_SPE_R0106_EN.Security Policy PSD Author: Bernd Zinke, Timo » Non-Confidential « #12;Security Policy FRAMA AG CH-3438 LAUPERSWIL / BERN TITLE: POSTAL SECURITY

  17. Building Energy-Efficiency Best Practice Policies and Policy Packages

    E-Print Network [OSTI]

    Levine, Mark

    2014-01-01

    advanced commercial lighting products and less successful at increasing the number of whole-building, HVAC, and building envelope

  18. INDOOR AIR QUALITY IN ENERGY-EFFICIENT BUILDINGS

    E-Print Network [OSTI]

    Hollowell, Craig D.

    2011-01-01

    microbial burden The Energy Efficient Buildings (EEB) Mobilein a number of energy efficient buildings, wherein pollutantenergy~efficient ventilation , institutional and commercial buildings.

  19. 1999 CBECS Summary Table for All Building Activities

    U.S. Energy Information Administration (EIA) Indexed Site

    Tables 1999 Commercial Buildings Consumption Survey SUMMARY TABLES FOR ALL PRINCIPAL BUILDING ACTIVITIES Number of Buildings (thousand) Floorspace (million square feet) Square...

  20. THE UNIVERSITY OF EDINBURGH. Hudson Beare Building.

    E-Print Network [OSTI]

    Edinburgh, University of

    THE UNIVERSITY OF EDINBURGH. Hudson Beare Building. (King's Buildings). A GUIDE TO ACCESS AND FACILITIES. Address: Hudson Beare Building, King's Buildings, Edinburgh, E,H,9 3,J,F. Telephone number: 0131 650 5687. Campus map link: http://www.ed.ac.uk/maps/buildings/hudson-beare-building #12;Page 1

  1. THE UNIVERSITY OF EDINBURGH. Faraday Building.

    E-Print Network [OSTI]

    Edinburgh, University of

    THE UNIVERSITY OF EDINBURGH. Faraday Building. (King's Buildings). A GUIDE TO ACCESS AND FACILITIES. Address: Faraday Building, King's Buildings Edinburgh E,H,9 3,J,L. Telephone number: 0131 650 5687. Campus map link: http://www.ed.ac.uk/maps/buildings/faraday-building #12;Page 1. Alternative Format. If you

  2. 3-100.1 Building Evacuation 1 Building Evacuation

    E-Print Network [OSTI]

    Hua, Kien A.

    3-100.1 Building Evacuation 1 SUBJECT: Building Evacuation Effective Date: 10-20-10 Policy Number and Safety APPLICABILITY/ACCOUNTABILITY: This policy applies to all individuals in all buildings on all University of Central Florida campuses. BACKGROUND INFORMATION: University buildings occasionally need

  3. Cooperative monitoring of regional security agreements

    SciTech Connect (OSTI)

    Pregenzer, A.L.; Vannoni, M.; Biringer, K.L. [Sandia National Labs., Albuquerque, NM (United States). Nonproliferation and Arms Control Analysis Dept.

    1996-11-01

    This paper argues that cooperative monitoring plays a critical role in the implementation of regional security agreements and confidence building measures. A framework for developing cooperative monitoring options is proposed and several possibilities for relating bilateral and regional monitoring systems to international monitoring systems are discussed. Three bilateral or regional agreements are analyzed briefly to illustrate different possibilities. These examples illustrate that the relationship of regional or bilateral arms control or security agreements to international agreements depends on a number of factors: the overlap of provisions between regional and international agreements; the degree of interest in a regional agreement among the international community; efficiency in implementing the agreement; and numerous political considerations. Given the importance of regional security to the international community, regions should be encouraged to develop their own infrastructure for implementing regional arms control and other security agreements. A regional infrastructure need not preclude participation in an international regime. On the contrary, establishing regional institutions for arms control and nonproliferation could result in more proactive participation of regional parties in developing solutions for regional and international problems, thereby strengthening existing and future international regimes. Possible first steps for strengthening regional infrastructures are identified and potential technical requirements are discussed.

  4. Summit on Education in Secure Software Final Report

    E-Print Network [OSTI]

    Burley, Diana L.; Bishop, Matt

    2011-01-01

    Professional. He also teaches software engineering, machineSummit on Education and Secure Software Final Reporteducation in secure software. 1. Increase the number of

  5. COMPUTER SECURITY EDUCATION Past, Present and Future

    E-Print Network [OSTI]

    information. Computer security researchers and practitioners were few in number, worked primarilyCOMPUTER SECURITY EDUCATION Past, Present and Future Carol Taylor, Rose Shumba, and James Walden: This paper presents an overview of computer security education in academia. We examine security education

  6. RCRA Permit for a Hazardous Waste Management Facility Permit Number NEV HW0101 Annual Summary/Waste Minimization Report Calendar Year 2012, Nevada National Security Site, Nevada

    SciTech Connect (OSTI)

    Arnold, P. M.

    2013-02-21

    This report summarizes the U.S. Environmental Protection Agency (EPA) identification number of each generator from which the Permittee received a waste stream, a description and quantity of each waste stream in tons and cubic feet received at the facility, the method of treatment, storage, and/or disposal for each waste stream, a description of the waste minimization efforts undertaken, a description of the changes in volume and toxicity of waste actually received, any unusual occurrences, and the results of tank integrity assessments. This Annual Summary/Waste Minimization Report is prepared in accordance with Section 2.13.3 of Permit Number NEV HW0101, issued 10/17/10.

  7. Building Stones

    E-Print Network [OSTI]

    2012-01-01

    3). Photographs by the author. Building Stones, Harrell, UEEOxford Short Citation: Harrell, 2012, Building Stones. UEE.Harrell, James A. , 2012, Building Stones. In Willeke

  8. Improving web site security with data flow management

    E-Print Network [OSTI]

    Yip, Alexander Siumann, 1979-

    2009-01-01

    This dissertation describes two systems, RESIN and BFLow, whose goal is to help Web developers build more secure Web sites. RESIN and BFLOW use data flow management to help reduce the security risks of using buggy or ...

  9. GridStat – Cyber Security and Regional Deployment Project Report

    SciTech Connect (OSTI)

    Clements, Samuel L.

    2009-02-18

    GridStat is a developing communication technology to provide real-time data delivery services to the electric power grid. It is being developed in a collaborative effort between the Electrical Power Engineering and Distributed Computing Science Departments at Washington State University. Improving the cyber security of GridStat was the principle focus of this project. A regional network was established to test GridStat’s cyber security mechanisms in a realistic environment. The network consists of nodes at Pacific Northwest National Laboratory, Idaho National Laboratory, and Washington State University. Idaho National Laboratory (INL) was tasked with performing the security assessment, the results of which detailed a number or easily resolvable and previously unknown issues, as well as a number of difficult and previously known issues. Going forward we recommend additional development prior to commercialization of GridStat. The development plan is structured into three domains: Core Development, Cyber Security and Pilot Projects. Each domain contains a number of phased subtasks that build upon each other to increase the robustness and maturity of GridStat.

  10. Riverside County- Sustainable Building Policy

    Broader source: Energy.gov [DOE]

    In February 2009, the County of Riverside Board of Supervisors adopted Policy Number H-29, creating the Sustainable Building Policy. The Policy requires that all new county building projects...

  11. Information Security: Coordination of Federal Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO...

  12. Information Security: Coordination of Federal Cyber Security...

    Office of Environmental Management (EM)

    Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

  13. 2014 Headquarters Facilities Master Security Plan - Chapter 1...

    Energy Savers [EERE]

    control of employee and visitor access to HQ buildings, detection and control of dangerous devices, issuance of security badges to HQ employees, protection of government and...

  14. Security Risk Assessment Methodologies (RAM) for Critical Infrastructu...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Building Energy Efficiency Find More Like This Return to Search Security Risk Assessment Methodologies (RAM) for Critical Infrastructures Sandia National Laboratories...

  15. Building Emergency Response Plan Forest Science Centre

    E-Print Network [OSTI]

    British Columbia, University of

    Building Emergency Response Plan Forest Science Centre (Including the Advanced Wood Processing;Building Emergency Response Plan 17/05/2013 Page 1 Table of Contents Emergency Telephone Numbers ......................................................................................................................... 5 Life Safety Systems and Building Features

  16. Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability 

    E-Print Network [OSTI]

    Ragsdale, G.

    2010-01-01

    Cyber Security: Ensuring Security While Promoting Interoperability Communications and Embedded Systems Department Southwest Research Institute Gary Ragsdale, Ph.D., P.E. August 24 ? 25, 2010 ESL-HH-10-08-09 Proceedings of the 17th Symposium... for Improving Building Systems in Hot and Humid Climates Austin Texas August 24-25, 2010 Southwest Research Institute 1947 J. Dan Bates 2009 ? 60+ years, founded 1947 ? 3200+ employees ? 4000+ R&D projects/yr. ? $500M revenue ? 1200 acres ? 170 buildings...

  17. Building Energy Management Open-Source Software Development ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Use in Small Commercial Buildings Recommended Practices Guide For Securing ZigBee Wireless Networks in Process Control System Environments Technical Meeting: Software...

  18. The New Mexico Building and Construction Trades Council and Los...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    sign labor agreements September 21, 2012 Unions, LANL sign labor agreements The New Mexico Building and Construction Trades Council and Los Alamos National Security LLC, have...

  19. Federal Building Energy Use Benchmarking Guidance, August 2014...

    Office of Environmental Management (EM)

    Energy Use Benchmarking Guidance, August 2014 Update Federal Building Energy Use Benchmarking Guidance, August 2014 Update Guidance describes the Energy Independence and Security...

  20. Occupant satisfaction in mixed-mode buildings

    E-Print Network [OSTI]

    Brager, Gail; Baker, Lindsay

    2009-01-01

    building features (75% were LEED-certified, compared to onlyunderfloor air distribution. LEED ® stands for Leadership inmeters /person Number of LEED-certified Number of underfloor

  1. BUILDING NAMES AA Architecture Building

    E-Print Network [OSTI]

    Dawson, Jeff W.

    P18$ P16 BUILDING NAMES AA Architecture Building AC Recreation and Athletics Centre AH Alumni Hall AP Azrieli Pavillion AT Azrieli Theatre CB Canal Building CO Residence Commons DT Dunton Tower FH Interaction Building (HCI) HP Herzberg Laboratories IH Ice House LA Loeb Building LE Leeds House LH Lanark

  2. Secretarial Office: National Nuclear Security Administration

    Office of Environmental Management (EM)

    )Report Number: NA--LASO-LANL-WASTEMGT-2014-0006 After 2003 Redesign Secretarial Office: National Nuclear Security Administration LabSiteOrg: Los Alamos National Laboratory...

  3. Buildings of the Future

    Broader source: Energy.gov [DOE]

    The U.S. Department of Energy (DOE) and the Pacific Northwest National Laboratory are developing a vision for future buildings—at least one hundred years from today—based on the collective views of thought leaders. As part of this effort, we will explore technology and demographic trends that could revolutionize the built environment across energy, water, environment, resilient design, health, security, and productivity.

  4. Global Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    weapons from the James Martin center for Nonproliferation Studies Homeland Security Digital Library HSDL is the nation's premier research collection of open-source resources...

  5. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  6. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  7. Automated Continuous Commissioning of Commercial Buildings

    E-Print Network [OSTI]

    Bailey, Trevor

    2013-01-01

    weather data can be shared among buildings across the base.weather data from the internet or existing weather station on the base.weather data via internet due to IT security issues at the base.

  8. Safeguards and Security and Cyber Security RM

    Office of Environmental Management (EM)

    using security measures such as badging, pre-employment investigation and fitness for duty, training, and security awareness? Cyber Security CS-1 Has the project...

  9. Departmental Business Instrument Numbering System

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-01-27

    The Order prescribes the procedures for assigning identifying numbers to all Department of Energy (DOE) and National Nuclear Security Administration (NNSA) business instruments. Cancels DOE O 540.1. Canceled by DOE O 540.1B.

  10. Departmental Business Instrument Numbering System

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-12-05

    To prescribe procedures for assigning identifying numbers to all Department of Energy (DOE), including the National Nuclear Security Administration, business instruments. Cancels DOE 1331.2B. Canceled by DOE O 540.1A.

  11. Emergency Numbers Campus Security 329-2345

    E-Print Network [OSTI]

    Burg, Theresa

    Council 329-2097 Geography Department 329-2016 Geography Department (WE) 332-4039 Health Centre 329-2466 Health Sci - Dean's Office 329-2668 History Department 329-5108 Housing Services 329-2030 Human Resources

  12. Information Security and Computer Systems: An Integrated Approach

    E-Print Network [OSTI]

    Holliday, Mark A.

    Information Security and Computer Systems: An Integrated Approach Mark A. Holliday Dept in information security that build upon concepts the students will already have seen in their computer systems this integrated approach to information security and computer systems. Categories and Subject Descriptors D.4

  13. A Multi-party Implementation of WS-SecureConversation

    E-Print Network [OSTI]

    as building innovative grid services to integrate existing applications. Security has been one of the most important areas in grids. Researchers on security have been isolating typical grids usage scenarios [4 communication and its security have been thought essential to grids [5]. They have witnessed an increased

  14. Cyber Security | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    System-of-systems analysis Visualization tools for complex information Next-generation smart grid technologies Quantum computing, security, and data fusion For more information,...

  15. Cooperative monitoring of regional security agreements

    SciTech Connect (OSTI)

    Pregenzer, A.L.; Vannoni, M.; Biringer, K.L.

    1995-08-01

    This paper argues that cooperative monitoring plays a critical role in the implementation of regional security agreements and confidence building measures. A framework for developing cooperative monitoring options is proposed and several possibilities for relating bilateral and regional monitoring systems to international monitoring systems are discussed. Three bilateral or regional agreements are analyzed briefly to illustrate different possibilities: (1) the demilitarization of the Sinai region between Israel and Egypt in the 1970s; (2) the 1991 quadripartite agreement for monitoring nuclear facilities among Brazil, Argentina, The Argentine-Brazilian Agency for Accounting and Control of Nuclear Materials and the International Atomic Energy Agency; and (3) a bilateral Open Skies agreement between Hungary and Romania in 1991. These examples illustrate that the relationship of regional or bilateral arms control or security agreements to international agreements depends on a number of factors: the overlap of provisions between regional and international agreements; the degree of interest in a regional agreement among the international community; efficiency in implementing the agreement; and numerous political considerations.Given the importance of regional security to the international community, regions should be encouraged to develop their own infrastructure for implementing regional arms control and other security agreements. A regional infrastructure need not preclude participation in an international regime. On the contrary, establishing regional institutions for arms control and nonproliferation could result in more proactive participation of regional parties in developing solutions for regional and international problems, thereby strengthening existing and future international regimes. Possible first steps for strengthening regional infrastructures are identified and potential technical requirements are discussed.

  16. Administration Building demolition completed under budget

    E-Print Network [OSTI]

    with safe, energy-efficient facilities. The site of the former Administration Building is now a parking lot feet, this was a sizable undertaking," added John Gallegos of the National Nuclear Security. Operated by Los Alamos National Security, LLC for the Department of Energy's NNSA #12;

  17. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  18. Alpha buildings | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsiclouddenDVA N C E D B L O O D S TA I N P A T TSorbentsAllosteric

  19. Building 9731 | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsiclouddenDVA N C E D B L OBransen PlasmaEnergy, science,BuckmanPerformance and213

  20. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    Information Security Group IY5512 Computer Security Part 7b: Windows securityPart 7b: Windows security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security Group) of Windows machines. 2 Information Security Group Objectives II · Focus on Active Directory, authentication

  1. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  2. Secure PVM

    SciTech Connect (OSTI)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  3. Table B6. Building Size, Number of Buildings, 1999

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet)Decade Year-0 Year-1 Year-2Feet)Thousand7,Year Jan995 1555.3 End

  4. Compare Activities by Number of Buildings

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustments (Billion Cubic Feet)DecadeYear Jan Feb Mar Apr May Jun Jul Aug Sep3,118,592

  5. The Future of Cyber Security Prof. Ravi Sandhu

    E-Print Network [OSTI]

    Sandhu, Ravi

    1 The Future of Cyber Security Prof. Ravi Sandhu Executive Director February 2010 ravi! Institute for Cyber Security #12;Good News, Bad News Cyber security profession will not disappear Cyber New attacks Old technologies New technologies #12;Productivity-Security Number 1 cyber-centric nation

  6. Technologies for Energy Efficient Buildings

    E-Print Network [OSTI]

    Resource Technologies for Energy Security Subtask 8.4 Deliverable By GE Global Research Niskayuna, New York.4.2.3 Total electrical energy consumption 33 3.4.2.4 Consumer alert messages 33 3.5 Laboratory TestingTechnologies for Energy Efficient Buildings Prepared for the U.S. Department of Energy Office

  7. Ready to Retrofit: The Process of Project Team Selection, Building Benchmarking, and Financing Commercial Building Energy Retrofit Projects

    E-Print Network [OSTI]

    Sanders, Mark D.

    2014-01-01

    2010 ACEEE Summer Study of Energy Efficiency in Buildings.Concepts and Tools." Energy Engineering. Volume 105, NumberU.S. Department of Energy. (2010). “ARRA Commercial Building

  8. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  9. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  10. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  11. Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D mSecurity Security

  12. Building America

    SciTech Connect (OSTI)

    Brad Oberg

    2010-12-31

    IBACOS researched the constructability and viability issues of using high performance windows as one component of a larger approach to building houses that achieve the Building America 70% energy savings target.

  13. Building technologies

    SciTech Connect (OSTI)

    Jackson, Roderick

    2014-07-14

    After growing up on construction sites, Roderick Jackson is now helping to make buildings nationwide far more energy efficient.

  14. Building technologies

    ScienceCinema (OSTI)

    Jackson, Roderick

    2014-07-15

    After growing up on construction sites, Roderick Jackson is now helping to make buildings nationwide far more energy efficient.

  15. Building Interoperability

    Broader source: Energy.gov (indexed) [DOE]

    Properties, Standard Naming, Standard Logic Hardware Availability Standard Transports Cloud Internet Intranet Roof Top Unit ICONICS, Inc. 2015 Standard Secure Transports Cloud...

  16. Building Energy Optimization Analysis Method (BEopt) - Building...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Building Energy Optimization Analysis Method (BEopt) - Building America Top Innovation Building Energy Optimization Analysis Method (BEopt) - Building America Top Innovation House...

  17. Beardmore Building

    High Performance Buildings Database

    Priest River, ID Originally built in 1922 by Charles Beardmore, the building housed offices, mercantile shops, a ballroom and a theater. After decades of neglect under outside ownership, Brian Runberg, an architect and great-grandson of Charles Beardmore, purchased the building in 2006 and began an extensive whole building historic restoration.

  18. Validating Cyber Security Requirements: A Case Study

    SciTech Connect (OSTI)

    Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2011-01-01

    Vulnerabilities in a system may have widely varying impacts on system security. In practice, security should not be defined as the absence of vulnerabilities. In practice, security should not be quantified by the number of vulnerabilities. Security should be managed by pursuing a policy that leads us first to the highest impact vulnerabilities. In light of these observations, we argue in favor of shifting our focus from vulnerability avoidance/removal to measurable security attributes. To this effect, we recommend a logic be used for system security, which captures/represents security properties in quantifiable, verifiable, measurable terms so that it is possible to reason about security in terms of its observable/perceptible effects rather than its hypothesized causes. This approach is orthogonal to existing techniques for vulnerability avoidance, removal, detection, and recovery, in the sense that it provides a means to assess, quantify, and combine these techniques.

  19. Page 1 of 33 3 STYLE HEADING NUMBER FOR CHP. (USED FOR FIG. NUMBERING)

    E-Print Network [OSTI]

    Baker, Jack W.

    Page 1 of 33 3 STYLE HEADING NUMBER FOR CHP. (USED FOR FIG. NUMBERING) ACCOUNTING FOR GROUND MOTION intensities considered in the original building design. For modern buildings in the western United States for this spectral shape effect is through selection of a set of ground motions that is specific to the building

  20. 1999 Commercial Building Characteristics--Detailed Tables--Size...

    U.S. Energy Information Administration (EIA) Indexed Site

    Complete Set of 1999 CBECS Detailed Tables Detailed Tables- of Buildings Table B6. Building Size, Number of Buildings b6.pdf (PDF file), b6.xls (Excel spreadsheet file), b6.txt...

  1. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio August 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Security

  2. INSTITUTE FOR CYBER SECURITY Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio August-world impact #12;INSTITUTE FOR CYBER SECURITY Institute for Cyber Security Founded June 2007: still in start

  3. NSM Secure UI Crypto Module Security Policy

    E-Print Network [OSTI]

    NSM Secure UI Crypto Module Security Policy Version: 1.4 Revision Date: April 1, 2010 This document. #12;McAfee, Inc NSM Secure UI Crypto Module Security Policy Page 2 of 15 CHANGE RECORD Revision Date Module Security Policy Page 3 of 15 Contents 1 Module Overview

  4. Security for grids

    E-Print Network [OSTI]

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-01-01

    differences between Grid security and host or site securityof requirements for Grid security in order to achieve thecompletely. Index Terms — Grid security, authentication,

  5. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  6. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  7. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6. Canceled by Admin Chg 2 dated 5-15-15.

  8. Building guide : how to build Xyce from source code.

    SciTech Connect (OSTI)

    Keiter, Eric Richard; Russo, Thomas V.; Schiek, Richard Louis; Sholander, Peter E.; Thornquist, Heidi K.; Mei, Ting; Verley, Jason C.

    2013-08-01

    While Xyce uses the Autoconf and Automake system to configure builds, it is often necessary to perform more than the customary %E2%80%9C./configure%E2%80%9D builds many open source users have come to expect. This document describes the steps needed to get Xyce built on a number of common platforms.

  9. Fire in Buildings 

    E-Print Network [OSTI]

    Shorter, G.

    During the lifetime of any building in Canada it is probable that one or more "unwanted" fires will occur. "Fire Loss in Canada, 1959," the report of the Dominion Fire Commissioner, states that for the period 1950-1959 the average number of reported...

  10. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  11. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  12. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  13. Faculty Information Security Guide

    E-Print Network [OSTI]

    Faculty Information Security Guide Dartmouth Your information is vitally important to your teaching protect your information. THE DARTMOUTH INFORMATION SECURITY COMMITTEE The Dartmouth Information Security Committee (DISC) meets monthly to assess vulnerabilities of information security, and to develop and revise

  14. SELECTING INFORMATION TECHNOLOGY SECURITY

    E-Print Network [OSTI]

    April 2004 SELECTING INFORMATION TECHNOLOGY SECURITY PRODUCTS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Information technology security prod ucts are essential to better secure infor mation technology (IT) systems

  15. FOILFEST :community enabled security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr.

    2005-09-01

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

  16. Design and Operation of an Open, Interoperable Automated Demand Response Infrastructure for Commercial Buildings

    E-Print Network [OSTI]

    Piette, Mary Ann

    2010-01-01

    response, automation, commercial, industrial buildings, peakautomation system design. Auto-DR for commercial and industrialautomation server renamed as the DRAS. This server was operated at a secure industrial

  17. Hungary-Employment Impacts of a Large-Scale Deep Building Retrofit...

    Open Energy Info (EERE)

    buildings - beyond its other significant benefits such as reducing or eliminating fuel poverty and improving energy security - is expected to have a consistent impact on...

  18. Climate Change and National Security

    SciTech Connect (OSTI)

    Malone, Elizabeth L.

    2013-02-01

    Climate change is increasingly recognized as having national security implications, which has prompted dialogue between the climate change and national security communities – with resultant advantages and differences. Climate change research has proven useful to the national security community sponsors in several ways. It has opened security discussions to consider climate as well as political factors in studies of the future. It has encouraged factoring in the stresses placed on societies by climate changes (of any kind) to help assess the potential for state stability. And it has shown that, changes such as increased heat, more intense storms, longer periods without rain, and earlier spring onset call for building climate resilience as part of building stability. For the climate change research community, studies from a national security point of view have revealed research lacunae, for example, such as the lack of usable migration studies. This has also pushed the research community to consider second- and third-order impacts of climate change, such as migration and state stability, which broadens discussion of future impacts beyond temperature increases, severe storms, and sea level rise; and affirms the importance of governance in responding to these changes. The increasing emphasis in climate change science toward research in vulnerability, resilience, and adaptation also frames what the intelligence and defense communities need to know, including where there are dependencies and weaknesses that may allow climate change impacts to result in security threats and where social and economic interventions can prevent climate change impacts and other stressors from resulting in social and political instability or collapse.

  19. Building Maintenance Technician | Princeton Plasma Physics Lab

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Thomas Ward Requisition Number: 1500684 POSITION SUMMARY: Under the supervision of the General Lead Technician and Lead Building Maintenance Technician, the candidate will be...

  20. Fact Sheet: Better Buildings Residential Network | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Better Buildings Residential Network, increasing the number of American Homes that are energy efficient. BBRN Fact Sheet More Documents & Publications Fact Sheet - Better...

  1. Residential Buildings Historical Publications reports, data and...

    Gasoline and Diesel Fuel Update (EIA)

    Consumption Expenditures per Total per Square per per per Total Total Floorspace Building Foot per Household per Square per Household Households Number (billion (million...

  2. Commerial Buildings Characteristics, 1995 (Table of Contents...

    U.S. Energy Information Administration (EIA) Indexed Site

    Number of Buildings and Relative Standard Errors, 1995 Table I.2. Participation in Energy Conservation Programs, Floorspace and Relative Standard Errors, 1995 Table J.1....

  3. Security challenges and opportunities in adaptive and reconfigurable hardware

    E-Print Network [OSTI]

    Costan, Victor Marius

    We present a novel approach to building hardware support for providing strong security guarantees for computations running in the cloud (shared hardware in massive data centers), while maintaining the high performance and ...

  4. Building energy calculator : a design tool for energy analysis of residential buildings in Developing countries

    E-Print Network [OSTI]

    Smith, Jonathan Y. (Jonathan York), 1979-

    2004-01-01

    Buildings are one of the world's largest consumers of energy, yet measures to reduce energy consumption are often ignored during the building design process. In developing countries, enormous numbers of new residential ...

  5. Building Technologies Office Overview

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Roland Risser Director, Building Technologies Office Building Technologies Office Energy Efficiency Starts Here. 2 Building Technologies Office Integrated Approach: Improving...

  6. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W. (Albuquerque, NM)

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  7. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. (The original DOE O 471.6 canceled DOE M 470.4-4A, except for Section D). Admin Chg 2, dated 5-15-15, supersedes Admin Chg 1. Certified 5-21-2015.

  8. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  9. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  10. Building America Expert Meeting: Transforming Existing Buildings...

    Energy Savers [EERE]

    Transforming Existing Buildings through New Media--An Idea Exchange Building America Expert Meeting: Transforming Existing Buildings through New Media--An Idea Exchange This report...

  11. Building America Residential Buildings Energy Efficiency Meeting...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Buildings Energy Efficiency Meeting: July 2010 Building America Residential Buildings Energy Efficiency Meeting: July 2010 On this page, you may link to the summary report and...

  12. Sun StorageTekTM Security Policy

    E-Print Network [OSTI]

    Sun StorageTekTM T10000B Tape Drive Security Policy Part Number 316055101 Revision: AB Sun Microsystems, Inc. September 1, 2009 Copyright Sun Microsystems 2009. May be reproduced only in its original entirety [without revision]. #12;Sun Microsystems Sun StorageTek T10000B Tape Drive Security Policy

  13. Sun StorageTekTM Security Policy

    E-Print Network [OSTI]

    Sun StorageTekTM T10000A Tape Drive Security Policy Part Number 316055001 Revision: AB Sun Microsystems, Inc. September 1, 2009 Copyright Sun Microsystems 2009. May be reproduced only in its original entirety [without revision]. #12;Sun Microsystems Sun StorageTek T10000A Tape Drive Security Policy

  14. Sun StorageTekTM Security Policy

    E-Print Network [OSTI]

    Sun StorageTekTM T9840D Tape Drive Security Policy Part Number 316055201 Revision: AA Sun Microsystems, Inc. February 5, 2010 Copyright Sun Microsystems 2009. May be reproduced only in its original entirety [without revision]. #12;Sun Microsystems Sun StorageTek TM T9840D Tape Drive Security Policy

  15. 2014 Headquarters Facilities Master Security Plan- Chapter 14, Cyber Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security Describes the DOE Headquarters Cyber Security Program.

  16. Dalhousie Sustainable Building Policy March 2011

    E-Print Network [OSTI]

    Brownstone, Rob

    .2 LEED Rating System "The Leadership in Energy and Environmental Design (LEED) Green Building Rating of Principles, and Plan. This policy formalizes Dalhousie's existing practice and commitment to green building as demonstrated by the design and construction of a number of energy efficient buildings from the 90s to the LEED

  17. 2014 Headquarters Facilities Master Security Plan- Chapter 3, Personnel Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security Describes DOE Headquarters Personnel Security procedures for acquiring, maintaining, and passing security clearances.

  18. Using Operational Security (OPSEC) to Support a Cyber Security...

    Energy Savers [EERE]

    Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

  19. Command and Control during Security Incidents/Emergencies

    SciTech Connect (OSTI)

    Knipper, W. [NSTec

    2013-10-16

    This presentation builds on our response to events that pose, or have the potential to pose, a serious security or law enforcement risk and must be responded to and controlled in a clear a decisive fashion. We will examine some common concepts in the command and control of security-centric events.

  20. Building debris

    E-Print Network [OSTI]

    Dahmen, Joseph (Joseph F. D.)

    2006-01-01

    This thesis relates architectural practices to intelligent use of resources and the reuse of derelict spaces. The initial investigation of rammed earth as a building material is followed by site-specific operations at the ...

  1. Archive Reference Buildings by Building Type: Warehouse

    Broader source: Energy.gov [DOE]

    Here you will find past versions of the reference buildings for new construction commercial buildings, organized by building type and location. A summary of building types and climate zones is...

  2. Archive Reference Buildings by Building Type: Supermarket

    Broader source: Energy.gov [DOE]

    Here you will find past versions of the reference buildings for new construction commercial buildings, organized by building type and location. A summary of building types and climate zones is...

  3. Table B14. Number of Establishments in Building, Number of Buildings, 1999

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: AlternativeMonthly","10/2015"Monthly","10/2015" ,"Release7CubicthroughtheSeptember 24,4,630.22Primary Consumption of7.A9..0.4.

  4. Weekly Security Incident Log Period of Aug 12 -Aug 18, 2013

    E-Print Network [OSTI]

    2013-001248 THOMPSON ROAD Gas leak Security , Toronto Fire, Toronto Police, and Occupational Health and Safety responded to a report of a natural gas leak in the area of the Life Science BuildingWeekly Security Incident Log Period of Aug 12 - Aug 18, 2013 Incident No. Reported Date Building

  5. Weekly Security Incident Log Period of Apr 29 -May 5, 2013

    E-Print Network [OSTI]

    2013-000845 YORK LANES RETAIL Gas leak Security, Toronto Fire and Enbridge Gas responded to a report of a natural gas odour in the building. The source of the odour was located in a restaurant kitchen. EnbridgeWeekly Security Incident Log Period of Apr 29 - May 5, 2013 Incident No. Reported Date Building

  6. Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    and its more efficient variants such as Toeplitz-LPN and Ring-LPN. Building a man-in-the-middle secure building a man-in-the- middle secure scheme based on any variant of the LPN problem solves the main open-cost devices, such as smart cards and RFID tags, in the real world. One of the most common cryptographic

  7. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 supersedes DOE O 472.2 Admin Chg 1.

  8. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 cancels DOE O 472.2 Admin Chg 1.

  9. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Infrastructure Demonstration for Energy reliability and Security) (web link) program to demonstrate: · Cyber-securityEnergy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security

  10. Our Solution Securing Grid Data Transfer Services with

    E-Print Network [OSTI]

    Motivation Our Solution Summary Securing Grid Data Transfer Services with Active Network Portals by in part by the NSF under award numbers EIA 9911099 and CNS 0454298 Michael R. Head Securing Grid Data/Implementation Experiments Results Michael R. Head Securing Grid Data Transfer Services with Active Network Portals #12

  11. Energy Independence and Security Act of 2007

    SciTech Connect (OSTI)

    2011-12-30

    An Act passed in 2007 to move the United States toward greater energy independence and security, to increase the production of clean renewable fuels, to protect consumers, to increase the efficiency of products, buildings, and vehicles, to promote research on and deploy greenhouse gas capture and storage options, and to improve the energy performance of the Federal Government, and for other purposes.

  12. High speed optical quantum random number generation

    E-Print Network [OSTI]

    Weinfurter, Harald

    High speed optical quantum random number generation Martin F¨urst1,2,, Henning Weier1,2, Sebastian/publicationFile/30276/ais20 pdf.pdf (1999). 2. "Fips 140-2, security requirements for cryptographic modules

  13. Building Technologies Office Overview

    SciTech Connect (OSTI)

    2013-04-01

    Building Technologies Office Overview Presentation for the 2013 Building Technologies Office's Program Peer Review

  14. Building America System Research

    SciTech Connect (OSTI)

    2013-04-01

    Residential Buildings Integration Project for the 2013 Building Technologies Office's Program Peer Review

  15. Energy Efficient Buildings Hub

    SciTech Connect (OSTI)

    2013-04-01

    Energy Efficient Buildings HUB Lunch Presentation for the 2013 Building Technologies Office's Program Peer Review

  16. Making Collusion-Secure Codes (More) Robust against Bit Erasure Research Center for Information Security (RCIS), National Institute of Advanced Industrial Science and

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    for Information Security (RCIS), National Institute of Advanced Industrial Science and Technology (AISTMaking Collusion-Secure Codes (More) Robust against Bit Erasure Koji Nuida Research Center.nuida@aist.go.jp Abstract A collusion-secure code is called robust if it is secure against erasure of a limited number

  17. Parallel and Concurrent Security of the HB and HB + Protocols

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    ## Abstract Juels and Weis (building on prior work of Hopper and Blum) propose and analyze two shared against a passive (eavesdropping) adversary, while the HB + protocol is proven secure against active computationally­intensive to be utilized. With this motivation in mind, Juels and Weis [20] --- building upon work

  18. Parallel and Concurrent Security of the Jonathan Katz

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Juels and Weis (building on prior work of Hopper and Blum) propose and analyze two shared against a passive (eavesdropping) adversary, while the HB+ protocol is proven secure against active computationally-intensive to be utilized. With this motivation in mind, Juels and Weis [20] -- building upon work

  19. Security Asset Elicitation for Collaborative Models Maria Vasilevskaya1

    E-Print Network [OSTI]

    , Norway ABSTRACT Building secure systems is a difficult job for most engineers since it requires in designs which are modelled in collaborative building blocks specifying the behaviour of several entities the smart metering domain. Categories and Subject Descriptors D.2.2 [Software Engineering]: Design Tools

  20. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Information Security Seminar Series

    E-Print Network [OSTI]

    NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Information Security Seminar Series FISMA AND TECHNOLOGY 5 FISMA Strategic Vision We are building a solid foundation of information security across one of the largest information technology infrastructures in the world based on comprehensive security standards

  1. Weekly Security Incident Log Period of Feb 6 -Feb 12, 2012

    E-Print Network [OSTI]

    Gas leak Security and Toronto Fire responded to a report of a natural gas odour in B-wing. TorontoWeekly Security Incident Log Period of Feb 6 - Feb 12, 2012 Incident No. Reported Date Building\\Const. Security, York Fire Prevention and Toronto Fire responded to a fire alarm. The cause of the alarm

  2. POLICY NUMBER 2005-03 January 28, 2005

    E-Print Network [OSTI]

    POLICY NUMBER 2005- 03 January 28, 2005 POLICY: UCHC HIPAA SECURITY ADMINISTRATION PURPOSE: UCHC will comply with the HIPAA Security Rule's requirements pertaining to policies and procedures and documentation requirements and the appointment of an Information Security Officer (ISO). SCOPE: This policy

  3. Office Buildings - Full Report

    Gasoline and Diesel Fuel Update (EIA)

    PDF Office Buildings Although no one building type dominates the commercial buildings sector, office buildings are the most common and account for more than 800,000 buildings or 17...

  4. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia, and reactorsystemoverviews. Training in Action: Gulf Nuclear Energy InfrastructureInstitute In2011,SandiateamedwiththeNuclearSecurity energy safety, security,safeguards,andnonproliferation. Training Sandia National Laboratories experts

  5. Designing security into software

    E-Print Network [OSTI]

    Zhang, Chang Tony

    2006-01-01

    When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

  6. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  7. Security | Department of Energy

    Office of Environmental Management (EM)

    Security Security Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top...

  8. Advancing Global Nuclear Security

    Broader source: Energy.gov [DOE]

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  9. Converging Redundant Sensor Network Information for Improved Building Control

    SciTech Connect (OSTI)

    Dale K. Tiller; Gregor P. Henze

    2005-12-01

    This project is investigating the development and application of sensor networks to enhance building energy management and security. Commercial, industrial and residential buildings often incorporate systems used to determine occupancy, but current sensor technology and control algorithms limit the effectiveness of these systems. For example, most of these systems rely on single monitoring points to detect occupancy, when more than one monitoring point would improve system performance. Phase I of the project focused on instrumentation and data collection. In Phase I, a new occupancy detection system was developed, commissioned and installed in a sample of private offices and open-plan office workstations. Data acquisition systems were developed and deployed to collect data on space occupancy profiles. In phase II of the project, described in this report, we demonstrate that a network of several sensors provides a more accurate measure of occupancy than is possible using systems based on single monitoring points. We also establish that analysis algorithms can be applied to the sensor network data stream to improve the accuracy of system performance in energy management and security applications, and show that it may be possible to use sensor network pulse rate to distinguish the number of occupants in a space. Finally, in this phase of the project we also developed a prototype web-based display that portrays the current status of each detector in a sensor network monitoring building occupancy. This basic capability will be extended in the future by applying an algorithm-based inference to the sensor network data stream, so that the web page displays the likelihood that each monitored office or area is occupied, as a supplement to the actual status of each sensor.

  10. Buildings & Connective

    E-Print Network [OSTI]

    Illinois at Chicago, University of

    Signage Program Complete New Signage, Wayfinding, Campus Identity Program 2 4 4 0 2 2 0 4 2 4 2 5 16 47 Sciences Greenway Interim Landscape New Green Pathway Connecting Parking, Building Entrances Courtyard 2 2 0 0 4 2 0 0 4 2 2 0 16 34 Ashland/Taylor Lot G/K Interim Green Gate Provide New Green

  11. Better Buildings 

    E-Print Network [OSTI]

    Neukomm, M.

    2012-01-01

    replicable programs/solutions. Emphasis on home energy improvement Federal Performance-based Contracting Challenge ?Leverage ARRA ?Overcome Barriers ?Drive Action/Change ?Grow Partnerships Better Buildings promotes energy efficiency as top... Senior Executive --Announce innovations/market solutions Take Action -Showcase project within 9 months -Organization wide plan, schedule and milestones within 9 months Report Results -Share information and implementation models -Share...

  12. Buildings*","Buildings

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: AlternativeMonthly","10/2015"Monthly","10/2015" ,"Release7 Relative Standard ErrorsYear Jan Feb MarA6. BuildingB7. Building6.

  13. Buildings*","Buildings

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: AlternativeMonthly","10/2015"Monthly","10/2015" ,"Release7 Relative Standard ErrorsYear Jan Feb MarA6. BuildingB7. Building6.8.

  14. Moving Forward, Building An Ethics (Panel Statements)

    E-Print Network [OSTI]

    Stavrou, Angelos

    domain of information and communication technology research (e.g., network mea- surement, computerMoving Forward, Building An Ethics Community (Panel Statements) Erin Kenneally1 , Angelos Stavrou2-state-agnostic ethics community in computer security research. 1 Ethics As a Three-Legged Stool To jumpstart

  15. Building Technologies Program Vision, Mission, and Goals

    SciTech Connect (OSTI)

    2011-12-15

    The Vision, Mission, and Goals of the Building Technologies Program (BTP) focus on short term energy efficiency outcomes such as improved economic environment, enhanced comfort, and affordability that collectively benefit our nation. Long-term goals focus on helping secure our nation's energy independence.

  16. Annual Security Report for 2012Annual Security Report for 2012 Published in the Year 2013

    E-Print Network [OSTI]

    Illinois at Urbana-Champaign, University of

    reported to the University of Illinois police, designated campus security officials as defined under. Springfield Ave., Urbana. All phone numbers use the area code (217) unless otherwise noted. The commitment

  17. Building Technologies Office Overview

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Roland Risser Director, Building Technologies Office Building Technologies Office Overview Our Homes and Buildings Use 40% of Our Nation's Energy and 75% of Electricity Energy Use...

  18. Building Performance Simulation

    E-Print Network [OSTI]

    Hong, Tianzhen

    2014-01-01

    Y (2008). DeST—An integrated building simulation toolkit,Part ? : Fundamentals. Building Simulation, 1: 95 ? 110.Y (2008). DeST—An integrated building simulation toolkit,

  19. Building Energy Code

    Broader source: Energy.gov [DOE]

    The Rhode Island Building Code Standards Committee adopts, promulgates and administers the state building code. Compliance is determined through the building permit and inspection process by local...

  20. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  1. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  2. Accessible buildings Moderately accessible buildings*

    E-Print Network [OSTI]

    Lee, Dongwon

    Campus neighborhood map Moderately accessible paths** Accessible building entrance via parking lot to the University Park campus. This map, provided by UAC, is designed to assist persons with disabilities in finding accessibility. Your observations and suggestions regarding architectural For more information on UAC, you can

  3. Secure Interoperable Open Smart Grid Demonstration Project

    SciTech Connect (OSTI)

    Magee, Thoman

    2014-12-31

    The Consolidated Edison, Inc., of New York (Con Edison) Secure Interoperable Open Smart Grid Demonstration Project (SGDP), sponsored by the United States (US) Department of Energy (DOE), demonstrated that the reliability, efficiency, and flexibility of the grid can be improved through a combination of enhanced monitoring and control capabilities using systems and resources that interoperate within a secure services framework. The project demonstrated the capability to shift, balance, and reduce load where and when needed in response to system contingencies or emergencies by leveraging controllable field assets. The range of field assets includes curtailable customer loads, distributed generation (DG), battery storage, electric vehicle (EV) charging stations, building management systems (BMS), home area networks (HANs), high-voltage monitoring, and advanced metering infrastructure (AMI). The SGDP enables the seamless integration and control of these field assets through a common, cyber-secure, interoperable control platform, which integrates a number of existing legacy control and data systems, as well as new smart grid (SG) systems and applications. By integrating advanced technologies for monitoring and control, the SGDP helps target and reduce peak load growth, improves the reliability and efficiency of Con Edison’s grid, and increases the ability to accommodate the growing use of distributed resources. Con Edison is dedicated to lowering costs, improving reliability and customer service, and reducing its impact on the environment for its customers. These objectives also align with the policy objectives of New York State as a whole. To help meet these objectives, Con Edison’s long-term vision for the distribution grid relies on the successful integration and control of a growing penetration of distributed resources, including demand response (DR) resources, battery storage units, and DG. For example, Con Edison is expecting significant long-term growth of DG. The SGDP enables the efficient, flexible integration of these disparate resources and lays the architectural foundations for future scalability. Con Edison assembled an SGDP team of more than 16 different project partners, including technology vendors, and participating organizations, and the Con Edison team provided overall guidance and project management. Project team members are listed in Table 1-1.

  4. 1999 Commercial Building Characteristics--Building Activity Comparison

    U.S. Energy Information Administration (EIA) Indexed Site

    Building Activity Comparison Percentage of Floorspace and Buildings by Principal Building Activity, 1999 Percentage of Floorspace and Buildings by Principal Building Activity,...

  5. Weekly Security Incident Log Period of Jul 9 -Jul 15, 2012

    E-Print Network [OSTI]

    and Safety responded to a report of a natural gas odour in the building. The building was checked and no natural gas was found. Toronto Fire determined that all was in order. 7/12/2012 07:31 AM HazardousWeekly Security Incident Log Period of Jul 9 - Jul 15, 2012 Incident No. Reported Date Building

  6. Why build below

    SciTech Connect (OSTI)

    Rawlings, R.

    1982-01-01

    Building homes underground is a rapidly growing concept. From less than 200 in 1977 to about 6000 homes at present, this trend is discussed in detail. Although dirt is a poor insulator, its temperature moderating properties offer advantages. The need for insulating an underground house is discussed as well as the advantages of this type of home: (1) security advantages (fewer entrances); (2) storm resistance; (3) protection against fire; (4) lower maintenance costs; (5) space for lawn and garden is greater; and (6) these homes are quieter. The three principle types of underground homes are discussed in detail and illustrated with drawings and floor plans. These are: (1) the elevational type (most popular) with all doors and windows on one wall with other walls and roof completely covered; (2) penetrational homes with windows and doors on more than one side; and (3) the atrium home which is built around an open courtyard or atrium. Problems associated with earth-sheltered homes (underground water, structural strength requirements, building codes, indoor air pollution, costs, and financing) are discussed and suggestions are made for cutting costs. 4 references. (MJJ)

  7. Identification of Market Requirements of Smart Buildings Technologies for High Rise Office Buildings 

    E-Print Network [OSTI]

    Reffat, R. M.

    2010-01-01

    , office automation and energy efficiency. In essence, the components of a smart building must include building management system for real time control, utility functions, energy efficiency/energy management, security and life safety systems... in respective order as shown in Figure 8. Other additional features involve interoperable systems that can help in easily integrating current smart technology without substantial modification. ESL-IC-10-10-23 Proceedings of the Tenth...

  8. Page 1Securing the Microsoft Cloud Securing the

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Page 1Securing the Microsoft Cloud Securing the Microsoft Cloud #12;Page 2Securing the Microsoft to have confidence in Microsoft as their preferred cloud provider. Our security policies and practices their security and compliance related needs. Securing the Microsoft Cloud #12;Page 3Securing the Microsoft Cloud

  9. Buildings Interoperability Planning: Connected Buildings Interoperabil...

    Broader source: Energy.gov (indexed) [DOE]

    Vision Context Steve Widergren PNNL 11 March 2015 Topics Purpose of meeting Buildings automation in the transformative time of connectivity Interoperability - a connected buildings...

  10. The Economics of Green Building

    E-Print Network [OSTI]

    Eichholtz, Piet; Kok, Nils; Quigley, John M.

    2010-01-01

    Rental Sample Control Buildings PSM Controls Rated BuildingsSample Control Buildings PSM Controls Appendix Table A2 (Sample Control Buildings PSM Controls Rated Buildings Sales

  11. Los Alamos CCS (Center for Computer Security) formal computer security model

    SciTech Connect (OSTI)

    Dreicer, J.S.; Hunteman, W.J. (Los Alamos National Lab., NM (USA))

    1989-01-01

    This paper provides a brief presentation of the formal computer security model currently being developed at the Los Alamos Department of Energy (DOE) Center for Computer Security (CCS). The initial motivation for this effort was the need to provide a method by which DOE computer security policy implementation could be tested and verified. The actual analytical model was a result of the integration of current research in computer security and previous modeling and research experiences. The model is being developed to define a generic view of the computer and network security domains, to provide a theoretical basis for the design of a security model, and to address the limitations of present models. Formal mathematical models for computer security have been designed and developed in conjunction with attempts to build secure computer systems since the early 70's. The foundation of the Los Alamos DOE CCS model is a series of functionally dependent probability equations, relations, and expressions. The mathematical basis appears to be justified and is undergoing continued discrimination and evolution. We expect to apply the model to the discipline of the Bell-Lapadula abstract sets of objects and subjects. 5 refs.

  12. Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop

    SciTech Connect (OSTI)

    Sheldon, Frederick T; Krings, Axel; Yoo, Seong-Moo; Mili, Ali; Trien, Joseph P

    2006-01-01

    The workshop theme is Cyber Security: Beyond the Maginot Line Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglected or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyberspace including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more . . .

  13. Smart Buildings: Business Case and Action Plan

    SciTech Connect (OSTI)

    Ehrlich, Paul; Diamond, Rick

    2009-04-01

    General Services Administration (GSA) has been a pioneer in using Smart Building technologies but it has yet to achieve the full benefits of an integrated, enterprise-wide Smart Building strategy. In July 2008, GSA developed an initial briefing memorandum that identified five actions for a Smart Buildings feasibility study: (1) Identify and cluster the major building systems under consideration for a Smart Buildings initiative; (2) Identify GSA priorities for these clusters; (3) Plan for future adoption of Smart Building strategies by identifying compatible hardware; (4) Develop a framework for implementing and testing Smart Building strategies and converged networks; and (5) Document relevant GSA and industry initiatives in this arena. Based on this briefing memorandum, PBS and FAS retained consultants from Lawrence Berkeley National Laboratory, Noblis, and the Building Intelligence Group to evaluate the potential for Smart Buildings within GSA, and to develop this report. The project has included extensive interviews with GSA staff (See Appendix A), a review of existing GSA standards and documents, and an examination of relevant GSA and industry initiatives. Based on interviews with GSA staff and a review of GSA standards and documents, the project team focused on four goals for evaluating how Smart Building technology can benefit GSA: (1) Achieve Energy Efficiency Mandates--Use Smart Building technology as a tool to meet EISA 2007 and EO 13423 goals for energy efficiency. (2) Enhance Property Management--Deploy enterprise tools for improved Operations and Maintenance (O&M) performance and verification. (3) Implement Network as the Fourth Utility--Utilize a converged broadband network to support Smart Building systems and provide GSA clients with connectivity for voice, data and video. (4) Enhance Safety and Security--Harmonize Physical Access Control Systems (PACS) with Smart Building Systems.

  14. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    SciTech Connect (OSTI)

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01

    Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

  15. Building Envelope Stakeholder Workshop

    Broader source: Energy.gov [DOE]

    Oak Ridge National Laboratory is hosting a building envelope stakeholder workshop on behalf of the DOE Building Technologies Office.

  16. Texas LoanSTAR Monitoring & Analysis Program- Characterizing Loanstar Buildings & Energy Consumption 

    E-Print Network [OSTI]

    Challa, V.; Athar, A.; Abbas, M.; Claridge, D.; Haberl, J.

    1992-01-01

    This paper presents an overview of the buildings participating in the Texas LoanSTAR program. In this paper, we categorized the buildings in terms of their number, size, percent area effected, types of buildings, types of ...

  17. Wide Area Security Region Final Report

    SciTech Connect (OSTI)

    Makarov, Yuri V.; Lu, Shuai; Guo, Xinxin; Gronquist, James; Du, Pengwei; Nguyen, Tony B.; Burns, J. W.

    2010-03-31

    This report develops innovative and efficient methodologies and practical procedures to determine the wide-area security region of a power system, which take into consideration all types of system constraints including thermal, voltage, voltage stability, transient and potentially oscillatory stability limits in the system. The approach expands the idea of transmission system nomograms to a multidimensional case, involving multiple system limits and parameters such as transmission path constraints, zonal generation or load, etc., considered concurrently. The security region boundary is represented using its piecewise approximation with the help of linear inequalities (so called hyperplanes) in a multi-dimensional space, consisting of system parameters that are critical for security analyses. The goal of this approximation is to find a minimum set of hyperplanes that describe the boundary with a given accuracy. Methodologies are also developed to use the security hyperplanes, pre-calculated offline, to determine system security margins in real-time system operations, to identify weak elements in the system, and to calculate key contributing factors and sensitivities to determine the best system controls in real time and to assist in developing remedial actions and transmission system enhancements offline . A prototype program that automates the simulation procedures used to build the set of security hyperplanes has also been developed. The program makes it convenient to update the set of security hyperplanes necessitated by changes in system configurations. A prototype operational tool that uses the security hyperplanes to assess security margins and to calculate optimal control directions in real time has been built to demonstrate the project success. Numerical simulations have been conducted using the full-size Western Electricity Coordinating Council (WECC) system model, and they clearly demonstrated the feasibility and the effectiveness of the developed technology. Recommendations for the future work have also been formulated.

  18. Nuclear Security Summit | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Summit | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  19. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    for Environment and National Security Scripps Institution ofMultiplying Threats to National Security Higher temperaturesefforts to protect national security. Page 2 The U.S. Armed

  20. Sandia Energy - Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessment Home Climate & Earth Systems WaterEnergy Nexus Water Monitoring & Treatment Technology Security Risk Assessment Security Risk Assessmentcwdd2015-05-04T21:...

  1. Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture

    DOE Patents [OSTI]

    Muller, George; Perkins, Casey J.; Lancaster, Mary J.; MacDonald, Douglas G.; Clements, Samuel L.; Hutton, William J.; Patrick, Scott W.; Key, Bradley Robert

    2015-07-28

    Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture are described. According to one aspect, a computer-implemented security evaluation method includes accessing information regarding a physical architecture and a cyber architecture of a facility, building a model of the facility comprising a plurality of physical areas of the physical architecture, a plurality of cyber areas of the cyber architecture, and a plurality of pathways between the physical areas and the cyber areas, identifying a target within the facility, executing the model a plurality of times to simulate a plurality of attacks against the target by an adversary traversing at least one of the areas in the physical domain and at least one of the areas in the cyber domain, and using results of the executing, providing information regarding a security risk of the facility with respect to the target.

  2. Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES

    E-Print Network [OSTI]

    Newby, Gregory B.

    Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES Gregory B. Newby School an active role in information security. INTRODUCTION By most accounts, the proliferation of the Internet of information security, making concrete recommendations for safeguarding information and information access

  3. Change Number

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsiclouddenDVA N C E D BGene Network ShapingDate: M-16-04-04 Federal FacilityChange Number

  4. Buildings*","Buildings

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: AlternativeMonthly","10/2015"Monthly","10/2015" ,"Release7 Relative Standard ErrorsYear Jan Feb MarA6. BuildingB7.

  5. Building America Building Science Translator

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyTher i n c i p a l De pEnergy IndustrialofofBuilding Science Translator February

  6. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  7. Office of Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  8. INFRASTRUCTURE SECURITY & ENERGY

    E-Print Network [OSTI]

    Schrijver, Karel

    INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Real Time Monitoring of Energy Infrastructure Status Patrick Willging, PE Office of Electricity Delivery and Energy Reliability #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY

  9. nevada national security site

    National Nuclear Security Administration (NNSA)

    7%2A en Nevada National Security Site operator recognized for green fleet http:www.nnsa.energy.govblognevada-national-security-site-operator-recognized-green-fleet

    The...

  10. How to build a living thing

    E-Print Network [OSTI]

    Campbell, MacGregor (MacGregor Ballard)

    2009-01-01

    A number of research groups worldwide are working on various aspects of the problem of building life from scratch. Jack W. Szostak's lab in Cambridge, Massachusetts is one of the centers of the action. Open a recent news ...

  11. Security system signal supervision

    SciTech Connect (OSTI)

    Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  12. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  13. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    Pew Project on National Security, Energy and Climate http://of climate change, energy security and economic stability.DoD is improving U.S. energy security and national security.

  14. Secure Core Contact Information

    E-Print Network [OSTI]

    Secure Core Contact Information C. E. Irvine irvine@nps.edu 831-656-2461 Department of Computer for the secure management of local and/or remote information in multiple contexts. The SecureCore project Science Graduate School of Operations and Information Sciences www.cisr.nps.edu Project Description

  15. Information Security Guide

    E-Print Network [OSTI]

    Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

  16. cyber security guru

    E-Print Network [OSTI]

    Sandhu, Ravi

    cyber security guru By: Virginia Scott Posted: 4/17/07 UTSA has received a grant from the Texas Emerging Fund to create an institute for cyber security research. According to UTSA industry and educational initiatives in Texas. The creation of UTSA's Institute for Cyber Security Research

  17. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Energy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security

  18. About the Better Buildings Residential Network | Department of...

    Broader source: Energy.gov (indexed) [DOE]

    share best practices and learn from one another to increase the number of homes that are energy efficient. Better Buildings Residential programs and partners have invested more...

  19. 1999 Commercial Building Characteristics--Detailed Tables--Year...

    U.S. Energy Information Administration (EIA) Indexed Site

    Year Constructed > Detailed Tables-Year Constructed Complete Set of 1999 CBECS Detailed Tables Detailed Tables-Year Constructed Table B8. Year Constructed, Number of Buildings...

  20. Building America Top Innovations Hall of Fame Profile - Building...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Building America Top Innovations Hall of Fame Profile - Building America's Top Innovations Propel the Home Building Industry toward Higher Performance Building America Top...

  1. Building Science-Based Climate Maps - Building America Top Innovation...

    Energy Savers [EERE]

    Building Science-Based Climate Maps - Building America Top Innovation Building Science-Based Climate Maps - Building America Top Innovation Photo showing climate zone maps based on...

  2. Better Buildings Neighborhood Initiative Upgrades 100,000 Buildings...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Buildings Neighborhood Initiative Upgrades 100,000 Buildings, Saves 730 Million on Energy Bills Better Buildings Neighborhood Initiative Upgrades 100,000 Buildings, Saves...

  3. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W.

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  4. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  5. Advanced Energy Retrofit Guide Retail Buildings

    SciTech Connect (OSTI)

    Liu, Guopeng; Liu, Bing; Zhang, Jian; Wang, Weimin; Athalye, Rahul A.; Moser, Dave; Crowe, Eliot; Bengtson, Nick; Effinger, Mark; Webster, Lia; Hatten, Mike

    2011-09-19

    The Advanced Energy Retrofit Guide for Retail Buildings is a component of the Department of Energy’s Advanced Energy Retrofit Guides for Existing Buildings series. The aim of the guides is to facilitate a rapid escalation in the number of energy efficiency projects in existing buildings and to enhance the quality and depth of those projects. By presenting general project planning guidance as well as financial payback metrics for the most common energy efficiency measures, these guides provide a practical roadmap to effectively planning and implementing performance improvements for existing buildings.

  6. Advanced Energy Retrofit Guide Office Buildings

    SciTech Connect (OSTI)

    Liu, Guopeng; Liu, Bing; Wang, Weimin; Zhang, Jian; Athalye, Rahul A.; Moser, Dave; Crowe, Eliot; Bengtson, Nick; Effinger, Mark; Webster, Lia; Hatten, Mike

    2011-09-27

    The Advanced Energy Retrofit Guide for Office Buildings is a component of the Department of Energy’s Advanced Energy Retrofit Guides for Existing Buildings series. The aim of the guides is to facilitate a rapid escalation in the number of energy efficiency projects in existing buildings and to enhance the quality and depth of those projects. By presenting general project planning guidance as well as financial payback metrics for the most common energy efficiency measures, these guides provide a practical roadmap to effectively planning and implementing performance improvements for existing buildings.

  7. PROGRESS IN ENERGY EFFICIENT BUILDINGS

    E-Print Network [OSTI]

    Wall, L.W.

    2009-01-01

    indoor air quality, buildings energy performance, computervoluntary building-energy-performance guidelines. Recentlyrelated to building-energy-performance standards, guidelines

  8. Building America

    SciTech Connect (OSTI)

    Brad Oberg

    2010-12-31

    Builders generally use a 'spec and purchase' business management system (BMS) when implementing energy efficiency. A BMS is the overall operational and organizational systems and strategies that a builder uses to set up and run its company. This type of BMS treats building performance as a simple technology swap (e.g. a tank water heater to a tankless water heater) and typically compartmentalizes energy efficiency within one or two groups in the organization (e.g. purchasing and construction). While certain tools, such as details, checklists, and scopes of work, can assist builders in managing the quality of the construction of higher performance homes, they do nothing to address the underlying operational strategies and issues related to change management that builders face when they make high performance homes a core part of their mission. To achieve the systems integration necessary for attaining 40% + levels of energy efficiency, while capturing the cost tradeoffs, builders must use a 'systems approach' BMS, rather than a 'spec and purchase' BMS. The following attributes are inherent in a systems approach BMS; they are also generally seen in quality management systems (QMS), such as the National Housing Quality Certification program: Cultural and corporate alignment, Clear intent for quality and performance, Increased collaboration across internal and external teams, Better communication practices and systems, Disciplined approach to quality control, Measurement and verification of performance, Continuous feedback and improvement, and Whole house integrated design and specification.

  9. Secure positioning and non-local correlations

    E-Print Network [OSTI]

    Muhammad Nadeem

    2015-03-31

    Recently, the problem of secure position-verification has been extensively analyzed in a formal notion where distant verifiers send encrypted challenge along with the decryption information to the prover. However, currently it is known that all the existing position-verification scheme are insecure and secure positioning is impossible. We propose here a different notion for position-verification where distant verifiers determine the actions of the prover through non-local correlations generated by local measurements at the provers site. The proposed scheme guarantees secure positioning even if the verifiers do not have any pre-shared data with the prover, position is the only credential of the prover. Our proposed scheme is secure in general and evades known quantum attacks based on instantaneous non-local computations in particular. The scheme enables verifiers to identify dishonest provers with very high probability , where n is the number of entangled pairs used.

  10. Office Buildings: Consumption Tables

    U.S. Energy Information Administration (EIA) Indexed Site

    and Type of Office Building Total (trillion Btu) per Building (million Btu) per Square Foot (thousand Btu) Dollars per Million Btu All Office Buildings 1,089 1,475 90.5 16.32...

  11. Building Energy Code

    Broader source: Energy.gov [DOE]

    In 2006 Iowa enacted H.F. 2361, requiring the State Building Commissioner to adopt energy conservation requirements based on a nationally recognized building energy code. The State Building Code...

  12. Building Energy Monitoring and Analysis

    E-Print Network [OSTI]

    Hong, Tianzhen

    2014-01-01

    platforms and  building automation systems (BAS), a including  basic  building  automation  control,  fault Smart building power management automation. Building

  13. Building Energy Monitoring and Analysis

    E-Print Network [OSTI]

    Hong, Tianzhen

    2014-01-01

    United States and China, Energy and Buildings, 2013. Underin Singapore. Energy and Buildings, 37, 167-174. Eom, J. ,building operations. Energy and Buildings, 33, 783–791.

  14. Building wall construction

    SciTech Connect (OSTI)

    Mulford, C.E.

    1987-04-21

    A building wall construction is described comprising, in combination: (a) an elongated top plate; (b) an elongated bottom plate extending in spaced, horizontal, parallel relation to the top plate; (c) elongated studs arranged in spaced, vertical, parallel relation and affixed at their upper and lower ends to the top and bottom plates, respectively; (d) each of the studs, top plates and bottom plates comprises a pair of spaced wooden members of equal length having a substantially rectangular groove centrally disposed in one face thereof extending for the entire length of the wooden members, and at least one web member of fire-rated gypsum board having opposite, marginal edge portions secured in the grooves; (e) sheathing layers affixed to both sides of the stud members and extending vertically between the bottom and top plates, and horizontally between the studs to enclose the space therebetween; and (f) at least one panel member of fire-rated gypsum board extending horizontally between each successive pair of studs parallel to and spaced from each of the sheathing layers, thus providing at least two, separated spaces between the sheathing layers.

  15. 309 Building transition plan

    SciTech Connect (OSTI)

    Graves, C.E.

    1994-08-31

    The preparation for decontamination and decommissioning (transition) of the 309 Building is projected to be completed by the end of the fiscal year (FY) 1998. The major stabilization and decontamination efforts include the Plutonium Recycle Test Reactor (PRTR), fuel storage and transfer pits, Transfer Waste (TW) tanks and the Ion Exchange Vaults. In addition to stabilizing contaminated areas, equipment, components, records, waste products, etc., will be dispositioned. All nonessential systems, i.e., heating, ventilation, and air conditioning (HVAC), electrical, monitoring, fluids, etc., will be shut down and drained/de-energized. This will allow securing of the process, laboratory, and office areas of the facility. After that, the facility will be operated at a level commensurate with its surveillance needs while awaiting D&D. The implementation costs for FY 1995 through FY 1998 for the transition activities are estimated to be $1,070K, $2,115K, $2,939K, and $4,762K, respectively. Costs include an assumed company overhead of 20% and a 30% out year contingency.

  16. Building America Webinar: Ventilation in Multifamily Buildings...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    multifamily buildings, including how to successfully implement those strategies through smart design, specification, and construction techniques. webinarventilationmultifamily...

  17. Enhancing regional security agreements through cooperative monitoring

    SciTech Connect (OSTI)

    Pregenzer, A.L.

    1995-05-01

    This paper proposes that strengthening regional capabilities for formulating and implementing arms control and confidence-building measures is a tangible method of enhancing regional security. It discusses the importance of developing a regional infrastructure for arms control and confidence building and elucidates the role of technology in facilitating regional arms control and confidence-building agreements. In addition, it identifies numerous applications for regional cooperative monitoring in the areas of arms control, resource management, international commerce and disaster response. The Cooperative Monitoring Center at Sandia National Laboratories, whose aim is to help individual countries and regions acquire the tools they need to develop their own solutions to regional problems, is discussed briefly. The paper ends with recommendations for establishing regional cooperative monitoring centers.

  18. MODELING COUNT DATA FROM MULTIPLE SENSORS: A BUILDING OCCUPANCY MODEL

    E-Print Network [OSTI]

    Ihler, Alexander

    MODELING COUNT DATA FROM MULTIPLE SENSORS: A BUILDING OCCUPANCY MODEL Jon Hutchins, Alexander Ihler using real data from a network of optical counting sensors in a campus building. Index Terms--- sensor Knowledge of the number of people in a building at a given time is crucial for applications

  19. MODELING COUNT DATA FROM MULTIPLE SENSORS: A BUILDING OCCUPANCY MODEL

    E-Print Network [OSTI]

    Ihler, Alexander

    MODELING COUNT DATA FROM MULTIPLE SENSORS: A BUILDING OCCUPANCY MODEL Jon Hutchins, Alexander Ihler using real data from a network of optical counting sensors in a campus building. Index Terms-- sensor Knowledge of the number of people in a building at a given time is crucial for applications

  20. Building Energy Asset Score: Building Owners

    Broader source: Energy.gov [DOE]

    The U.S. Department of Energy's Building Energy Asset Score is a national standardized tool for evaluating the physical and structural energy efficiency of commercial and multifamily residential buildings. The Asset Score generates a simple energy efficiency rating that enables comparison among buildings, and identifies opportunities for users to invest in energy efficiency upgrades. It is web-based and free to use.

  1. Addendum to CSUIT Security Policy Warner College of Natural Resources

    E-Print Network [OSTI]

    Addendum to CSUIT Security Policy for Warner College of Natural Resources Version 1.06 - July 2010 ! Given the ever increasing number of security incidents involving higher educational institutions information technologies, as well as a growing need to protect the computing resources at Colorado State

  2. Security Games for Virtual Machine Allocation in Cloud Computing

    E-Print Network [OSTI]

    Alpcan, Tansu

    Security Games for Virtual Machine Allocation in Cloud Computing Yi Han 1 Tansu Alpcan 2 Jeffrey.hanyi@gmail.com, {tansu.alpcan, jeffrey.chan, caleckie}@unimelb.edu.au Abstract. While cloud computing provides many advantages in accessibility, scalability and cost efficiency, it also introduces a number of new security

  3. Model Building Energy Code

    Broader source: Energy.gov [DOE]

    The Energy Efficiency Building Performance Standards (EEBPS) are statewide minimum requirements that all new construction and additions to existing buildings must satisfy. Exceptions include...

  4. Building-Level Intensities

    U.S. Energy Information Administration (EIA) Indexed Site

    . Electricity Consumption and Expenditure Intensities for Non-Mall Buildings, 2003" ,"Electricity Consumption",,,,,,"Electricity Expenditures" ,"per Building (thousand kWh)","per...

  5. Building Scale DC Microgrids

    E-Print Network [OSTI]

    Marnay, Chris

    2014-01-01

    ABORATORY Building Scale DC Microgrids Chris Marnay, Stevenemployer. Building Scale DC Microgrids Chris Marnay, IEEEgenerally known as microgrids (or µgrids). The dominance of

  6. Building Energy Code

    Broader source: Energy.gov [DOE]

    The Energy Conservation Construction Code of New York State (ECCCNYS) requires that all government, commercial and residential buildings, including renovations involving building system replaceme...

  7. Building Energy Codes Program

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Program U.S. Department of Energy Building Technologies Office Jeremy Williams, Project Manager Building Technologies Peer Review April 2014 Presentation Overview: * Introduction *...

  8. Building Energy Modeling Library

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    303-567-8609 April 2, 2013 Photo by : Dennis Schroeder, NREL 23250 2 | Building Technologies Office eere.energy.gov Project Overview Building Energy Modeling (BEM)...

  9. Wynkoop Building Performance Measurement: Water

    SciTech Connect (OSTI)

    Fowler, Kimberly M.; Kora, Angela R.

    2012-08-26

    This report is a summary of the water analysis performance for the Denver, Colorado Wynkoop Building. The Wynkoop Building (Figure 1) was built in 2006 as the Environmental Protection Agency (EPA) Region 8 Headquarters intended to house over 900 occupants in the 301,292 gross square feet (248,849 rentable square feet). The building was built on a brownfield in the Lower Downtown Historic District as part of an urban redevelopment effort. The building was designed and constructed through a public-private partnership with the sustainable design elements developed jointly by General Services Administration (GSA) and EPA. That partnership is still active with all parties still engaged to optimize building operations and use the building as a Learning Laboratory. The building design achieved U.S. Green Building Council Leadership in Energy and Environmental Design for New Construction (LEED-NC) Gold Certification in 2008 (Figure 2) and a 2008 EPA Energy Star Rating of 96 with design highlights that include: (1) Water use was designed to use 40% less than a typical design baseline. The design included low flow fixtures, waterless urinals and dual flush toilets; (2) Native and adaptive vegetation were selected to minimize the need for irrigation water for landscaping; and (3) Energy use intensity was modeled at 66.1 kBtus/gross square foot, which is 39% better than ASHRAE 90.1 1999. The Wynkoop Building water use (10 gallons/square foot) was measured at lower than industry average (15 gallons/square foot) and GSA goals (13 gallons/square foot), however, it was higher than building management expected it would be. The type of occupants and number of occupants can have a significant impact on fixture water use. The occupancy per floor varied significantly over the study time period, which added uncertainty to the data analysis. Investigation of the fixture use on the 2nd, 5th, and 7th floors identified potential for water use reduction if the flush direction of the dual-flush toilet handles was reversed. The building management retrofitted the building's toilets with handles that operated on reduced flush when pushed down (0.8 gallons) and full flush when pulled up (1.1 gallons). The water pressure on the 5th floor (< 30 psi) is less than half the pressure on the 7th floor (>80 psi). The measured water savings post-retrofit was lower on the 5th floor than the 7th floor. The differences in water pressure may have had an impact on the quantity of water used per floor. The second floor water use was examined prior to and following the toilet fixture retrofit. This floor is where conference rooms for non-building occupants are available for use, thus occupancy is highly variable. The 3-day average volume per flush event was higher post-retrofit (0.79 gallons per event), in contrast to pre-retrofit (0.57 gallons per event). There were 40% more flush events post retrofit, which impacted the findings. Water use in the third floor fitness center was also measured for a limited number of days. Because of water line accessibility, only water use on the men's side of the fitness center was measured and from that the total fitness center water use was estimated. Using the limited data collected, the fitness center shower water use is approximately 2% of the whole building water use. Overall water use in the Wynkoop Building is below the industry baseline and GSA expectations. The dual flush fixture replacement appears to have resulted in additional water savings that are expected to show a savings in the total annual water use.

  10. Security Challenges for User-Oriented RFID Applications within the `Internet of Things'

    E-Print Network [OSTI]

    Hancke, Gerhard

    Security Challenges for User-Oriented RFID Applications within the `Internet of Things' G.P. HANCKE to be an important building block of the `Internet of Things' and examine how RFID, assisted by the deployment of NFC will need to address. Keywords: RFID, NFC, security, `Internet of Things', user-oriented architecture 1

  11. NUMBER: IT 3.00 SECTION: Information Technology

    E-Print Network [OSTI]

    Almor, Amit

    NUMBER: IT 3.00 SECTION: Information Technology SUBJECT: Information Security DATE: September 2: William F. Hogue Issued by: Office of Information Technology I. Policy The University of South Carolina data and information technology assets. The University Information Security Office is therefore

  12. Commercial Building Tenant Energy Usage Aggregation and Privacy

    SciTech Connect (OSTI)

    Livingston, Olga V.; Pulsipher, Trenton C.; Anderson, David M.; Wang, Na

    2014-10-31

    A growing number of building owners are benchmarking their building energy use. This requires the building owner to acquire monthly whole-building energy usage information, which can be challenging for buildings in which individual tenants have their own utility meters and accounts with the utility. Some utilities and utility regulators have turned to aggregation of customer energy use data (CEUD) as a way to give building owners whole-building energy usage data while protecting customer privacy. Meter profile aggregation adds a layer of protection that decreases the risk of revealing CEUD as the number of meters aggregated increases. The report statistically characterizes the similarity between individual energy usage patterns and whole-building totals at various levels of meter aggregation.

  13. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security.cuny.edu Published: November 2014 Holiday Season Phishing Scams and Malware Campaigns CUNY/CIS Information Security.cuny.edu under "CUNY Issued Security Advisories" Visit the Federal Trade Commission's Consumer Information page

  14. INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY

    E-Print Network [OSTI]

    Subramanian, Sriram

    - 1 ­ INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable ­ INFORMATION SECURITY POLICY.doc Introduction Why Information Security? The access, availability

  15. Information Security Governance: When Compliance Becomes more Important than Security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Information Security Governance: When Compliance Becomes more Important than Security Terence Tan1 information security must adapt to changing conditions by extending security governance to middle management for implementing information security are more interested in complying with organizational standards and policies

  16. GAANN -Computer Systems Security GAANN Computer Systems Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important is critical October 7, 2009 GAANN ­ Computer Systems Security 1 #12;GAANN - Computer Systems Security

  17. Federated Cloud Security Architecture for Secure and Agile Clouds

    E-Print Network [OSTI]

    Xu, Shouhuai

    Federated Cloud Security Architecture for Secure and Agile Clouds Weiliang Luo, Li Xu, Zhenxin Zhan. This chapter introduces the novel federated cloud security architecture that includes proactive cloud defense technologies for secure and agile cloud development. The federated security architecture consists of a set

  18. Where computer security meets national security1 Helen Nissenbaum

    E-Print Network [OSTI]

    Nissenbaum, Helen

    of International Relations. Key words: cyber-security, computer security, securitization Introduction OverWhere computer security meets national security1 Helen Nissenbaum Department of Culture conceptions of security in contemporary concerns over the vulnerability of computers and networks to hostile

  19. Towards Secure Information Sharing Models for Community Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu, Ram Krishnan and Gregory B. White Institute for Cyber Security University of Texas at San Antonio #12;Secure Information ­ Security mechanisms such as authentication, cryptography, trusted hardware, etc. #12;Community Cyber

  20. The limits of state building : the politics of war and the ideology of peace

    E-Print Network [OSTI]

    Radin, Andrew M. (Andrew Marc)

    2012-01-01

    When can the international community build strong state institutions - such as security forces or electoral institutions - in post-conflict societies? An influential technical perspective argues that authority, resources, ...

  1. The potential and challenges of monitoring-supported energy efficiency improvement strategies in existing buildings 

    E-Print Network [OSTI]

    Schub, M.; Mahdavi, A.; Simonis, H.; Menzel, K.; Browne, D.

    2012-01-01

    The ongoing EU-supported CAMPUS 21 explores the energy efficiency potential of integrated security, control, and building management software. The main objective of the project is to compare the energy and indoor-environmental performance...

  2. Implementing Advances in Transport Security Technologies | Department...

    Office of Environmental Management (EM)

    Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies More...

  3. Cyber Security & Smart Grid 

    E-Print Network [OSTI]

    Shapiro, J.

    2011-01-01

    and interoperability ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Vulnerabilities In The Legacy Power Grid ? SCADA Security ? Supervisory Control and Data Acquisition (SCADA) systems are used extensively to control and monitor the national... & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart Grid Networks...

  4. Natural convection airflow and heat transport in buildings: experimental results

    SciTech Connect (OSTI)

    Balcomb, J.D.; Jones, G.F.

    1985-01-01

    Observations of natural convection airflow in passive solar buildings are described. Particular results are given for two buildings supplementing other data already published. A number of generalizations based on the monitoring of the 15 buildings are presented. It is concluded that energy can be reasonably well distributed throughout a building by natural convection provided suitable openings are present and that the direction of heat transport is either horizontally across or upward.

  5. Supervisory Industrial Security Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as the Deputy Assistant Manager for Safeguards, Security, and Emergency Management sharing the overall responsibility for execution of the...

  6. Oil Security Metrics Model

    SciTech Connect (OSTI)

    Greene, David L.; Leiby, Paul N.

    2005-03-06

    A presentation to the IWG GPRA USDOE, March 6, 2005, Washington, DC. OSMM estimates oil security benefits of changes in the U.S. oil market.

  7. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  8. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:www.nnsa.energy.govaboutusourprogramsnuclearsecurity

  9. Natlonal Nuclear Security Admlnlstratlon

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Natlonal Nuclear Security Admlnlstratlon Washington, DC 20585 January 18, 2007 OFFICE OF THE ADMINISTRATOR MEMORANDUM FOR The Deputy Secretary FROM: SUBJECT: Linton F. Brooks...

  10. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Washington, DC 20585 MEMORANDUM FOR THE ADMINISTRATOR FROM: THEODORE D. SHERRY II 4 flA. * -. SUBJECT: REFERENCE: NATIONAL SECURITY ENTI's'E FIELD COUNCIL CHAIR ACTION:...

  11. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    30 nonprofit organizations to receive monetary donations from Los Alamos National Security, LLC June 25, 2012 Recognizing employee and retiree volunteer efforts LOS ALAMOS, NEW...

  12. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01

    Information and communication systems’ securityTrust: An Element of Information Security,” in Security andInternational Journal of Information Security, vol. 4, pp.

  13. High Performance Sustainable Buildings

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Buildings Greening Transportation Green Purchasing & Green Technology Pollution Prevention Science Serving Sustainability ENVIRONMENTAL SUSTAINABILITY GOALS at...

  14. Better Buildings Neighborhood Program

    Broader source: Energy.gov [DOE]

    U.S. Department of Energy Better Buildings Neighborhood Program: Business Models Guide, October 27, 2011.

  15. August 2003 IT SECURITY METRICS

    E-Print Network [OSTI]

    August 2003 IT SECURITY METRICS Elizabeth B. Lennon, Editor Information Technology Laboratory approach to measuring information security. Evaluating security at the sys tem level, IT security metrics and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

  16. Cloud Security by Max Garvey

    E-Print Network [OSTI]

    Tolmach, Andrew

    Cloud Security Survey by Max Garvey #12;Cloudy Cloud is Cloudy What is the cloud? On Demand Service, performance SECaaS - Cloud hosted security measures Certifications - measurements for cloud security. #12;Cloud Questions If you have $0 security budget, could cloud be a security improvement? Who owns the data

  17. Security Division 2007 Annual Report

    E-Print Network [OSTI]

    research programs. These programs, which include Cyber Security, Pervasive Information TechnologiesComputer Security Division 2007 Annual Report #12;TAble of ConTenTS Welcome Division Organization The Computer Security Division Responds to the Federal Information Security Management Act of 2002 Security

  18. Updated 4/2/2014 Williams College Cloud Storage Security Policy

    E-Print Network [OSTI]

    Aalberts, Daniel P.

    Updated 4/2/2014 Williams College Cloud Storage Security Policy Data owned, used, created. `Legally protected information' includes personal information (social security numbers, bank account synchronized and kept uptodate. 3. This service makes the secure sharing and collaboration much easier

  19. Ensuring Data Storage Security in Cloud Computing Cong Wang, Qian Wang, and Kui Ren

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Ensuring Data Storage Security in Cloud Computing Cong Wang, Qian Wang, and Kui Ren Department have not been well understood. In this article, we focus on cloud data storage security, which has of service, Cloud Com- puting inevitably poses new challenging security threats for number of reasons

  20. Provably Secure Obfuscation of Diverse Watermarks for Sequential Circuits

    E-Print Network [OSTI]

    cryptographic results of provable obfuscation of this function family to build a secure sequential multi, or memory, and the company's revenue is based on the IP value. A major issue in this business model house A collects the royalty to allow company B the rights of using its intellectual property (denoted

  1. 2014 Headquarters Facilities Master Security Plan- Chapter 1, Physical Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security Describes DOE Headquarters Physical Security procedures related to badges, inspections, access controls, visitor controls, and removal of government property.

  2. Headquarters Facilities Master Security Plan - Chapter 10, Security...

    Office of Environmental Management (EM)

    be completed each year by all those who hold a security clearance; and the Security Termination Briefing, which is conducted when a person no longer requires a security clearance....

  3. Networks in Buildings: Which Path Forward?

    SciTech Connect (OSTI)

    Nordman, Bruce

    2008-08-17

    To date, digital networks have principally been installed for connecting information technology devices, with more modest use in consumer electronics, security, and large building control systems. The next 20 years will see much greater deployment of networks in buildings of all types, and across all end uses. Most of these are likely to be introduced primarily for reasons other than energy efficiency, and add energy use for network interfaces and network products. Widespread networking could easily lead to increased energy use, and experience with IT and CE networks suggests this may be likely. Active engagement by energy efficiency professionals in the architecture and design of future networks could lead to their being a large and highly cost-effective tool for efficiency. However, network standards are complex and take many years to develop and negotiate so that lack of action on this in the near term may foreclose important opportunities for years or decades to come. Digital networks need to be common globally, providing another challenge to building systems and elements that are more commonly designed only for national or regional markets. Key future networks are lighting, climate control, and security/presence. This paper reviews some examples of past network designs and use and the lessons they hold for future building networks. It also highlights key needed areas for research, policy, and standards development.

  4. Security Technology Demonstration and Validation Sustainability Plan

    SciTech Connect (OSTI)

    2008-08-31

    This report describes the process of creating continuity and sustainability for demonstration and validation (DEMVAL) assets at the National Security Technology Incubator (NSTI). The DEMVAL asset program is being developed as part of the National Security Preparedness Project (NSPP), funded by Department of Energy (DOE)/National Nuclear Security Administration (NNSA). The mission of the NSTI program is to identify, incubate, and accelerate technologies with national security applications at various stages of development by providing hands-on mentoring and business assistance to small businesses and emerging or growing companies. Part of this support is envisioned to be research and development of companies’ technology initiatives, at the same time providing robust test and evaluation of actual development activities. This program assists companies in developing technologies under the NSTI program through demonstration and validation of technologies applicable to national security created by incubators and other sources. The NSPP also will support the creation of an integrated demonstration and validation environment. Development of the commercial potential for national security technologies is a significant NSTI focus. As part of the process of commercialization, a comprehensive DEMVAL program has been recognized as an essential part of the overall incubator mission. A number of resources have been integrated into the NSTI program to support such a DEMVAL program.

  5. The New CSUID Social Security Numbers (SSNs) have been ubiquitous

    E-Print Network [OSTI]

    administrative computing systems are well protected, such use exposes University constituents to some risk cards at the beginning of the fall semester. After August 17, 2006, old ID cards will no longer work. Individuals should work with their IT staff to identify where in their files SSNs exist, take appropriate

  6. Visa Mastercard Bill me Exp. date Security number

    E-Print Network [OSTI]

    Goodrich, James

    Fax. Quantity Title ISBN Cost Total Add carriage per copy: UK Ł5; Europe Ł8; USA $5.50; Rest of World Expression A Hidden Layer of Complexity available now! Chapter 1: The Hammerhead Ribozyme Revisited: New, and bluetongue virus, entry

  7. NNSA Achievements: 2015 by the Numbers | National Nuclear Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you notHeatMaRIEdioxide capture CS Seminars CalendarOilPSTargetNIF

  8. Social Security Number Reduction Project | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuels Data CenterFinancialInvestingRenewable Energy (EERE) |Share YourSmart

  9. Building sustainable ecosystem-oriented architectures

    E-Print Network [OSTI]

    Bassil, Youssef

    2012-01-01

    Currently, organizations are transforming their business processes into e-services and service-oriented architectures to improve coordination across sales, marketing, and partner channels, to build flexible and scalable systems, and to reduce integration-related maintenance and development costs. However, this new paradigm is still fragile and lacks many features crucial for building sustainable and progressive computing infrastructures able to rapidly respond and adapt to the always-changing market and environmental business. This paper proposes a novel framework for building sustainable Ecosystem- Oriented Architectures (EOA) using e-service models. The backbone of this framework is an ecosystem layer comprising several computing units whose aim is to deliver universal interoperability, transparent communication, automated management, self-integration, self-adaptation, and security to all the interconnected services, components, and devices in the ecosystem. Overall, the proposed model seeks to deliver a co...

  10. Two worlds, one smart card An integrated solution for physical access and logical security

    E-Print Network [OSTI]

    Hoepman, Jaap-Henk

    issued, controlling access to over 1500 buildings, fitted with in total more than 6000 smart card readers to office buildings and plants, companies these days issue their employees a (smart) card that is bothTwo worlds, one smart card An integrated solution for physical access and logical security using

  11. Two worlds, one smart card # An integrated solution for physical access and logical security

    E-Print Network [OSTI]

    Hoepman, Jaap-Henk

    issued, controlling access to over 1500 buildings, fitted with in total more than 6000 smart card readers#ce buildings and plants, companies these days issue their employees a (smart) card that is both an identityTwo worlds, one smart card # An integrated solution for physical access and logical security using

  12. Sault Tribe Building Efficiency Energy Audits

    SciTech Connect (OSTI)

    Holt, Jeffrey W.

    2013-09-26

    The Sault Ste. Marie Tribe of Chippewa Indians is working to reduce energy consumption and expense in Tribally-owned governmental buildings. The Sault Ste. Marie Tribe of Chippewa Indians will conduct energy audits of nine Tribally-owned governmental buildings in three counties in the Upper Peninsula of Michigan to provide a basis for evaluating and selecting the technical and economic viability of energy efficiency improvement options. The Sault Ste. Marie Tribe of Chippewa Indians will follow established Tribal procurement policies and procedures to secure the services of a qualified provider to conduct energy audits of nine designated buildings. The contracted provider will be required to provide a progress schedule to the Tribe prior to commencing the project and submit an updated schedule with their monthly billings. Findings and analysis reports will be required for buildings as completed, and a complete Energy Audit Summary Report will be required to be submitted with the provider?s final billing. Conducting energy audits of the nine governmental buildings will disclose building inefficiencies to prioritize and address, resulting in reduced energy consumption and expense. These savings will allow Tribal resources to be reallocated to direct services, which will benefit Tribal members and families.

  13. Intelligent Building Energy Information and Control Systems for Low-Energy

    E-Print Network [OSTI]

    for about 70 percent of electricity use. To address energy security issues and environmental concerns&R International, 2011). To address energy security and environmental concerns there is an urgent needLBNL-5894E Intelligent Building Energy Information and Control Systems for Low-Energy Operations

  14. The Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure Computing Corporation

    E-Print Network [OSTI]

    Andersen, Dave

    Computing Corporation Stephen Smalley, Peter Loscocco National Security Agency Mike Hibler, David AndersenThe Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure be flexible in their support for security policies, providing sufficient mechanisms for supporting the wide

  15. Retail Buildings: Assessing and Reducing Plug and Process Loads in Retail Buildings (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2013-04-01

    Plug and process loads (PPLs) in commercial buildings account for almost 5% of U.S. primary energy consumption. Minimizing these loads is a primary challenge in the design and operation of an energy-efficient building. PPLs are not related to general lighting, heating, ventilation, cooling, and water heating, and typically do not provide comfort to the occupants. They use an increasingly large fraction of the building energy use pie because the number and variety of electrical devices have increased along with building system efficiency. Reducing PPLs is difficult because energy efficiency opportunities and the equipment needed to address PPL energy use in retail spaces are poorly understood.

  16. Office Buildings: Assessing and Reducing Plug and Process Loads in Office Buildings (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2013-04-01

    Plug and process loads (PPLs) in commercial buildings account for almost 5% of U.S. primary energy consumption. Minimizing these loads is a primary challenge in the design and operation of an energy-efficient building. PPLs are not related to general lighting, heating, ventilation, cooling, and water heating, and typically do not provide comfort to the occupants. They use an increasingly large fraction of the building energy use pie because the number and variety of electrical devices have increased along with building system efficiency. Reducing PPLs is difficult because energy efficiency opportunities and the equipment needed to address PPL energy use in office spaces are poorly understood.

  17. Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you not findGeoscience/EnvironmentGlobal Security Global Security We

  18. Security tasks are highly interdependent.

    E-Print Network [OSTI]

    Exchange of Information Develop security tools that: · Integrate information from different communication channels · Provide flexible reporting (reports adapted to the recipient) · Communicate security information Security practitioners perform many activities: · Information exchanged in different formats across

  19. Security Cases | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Cases Security Cases RSS June 19, 2015 PSH-15-0011 - In the Matter of Personnel Security Hearing On June 19, 2015, an OHA Administrative Judge (AJ) issued a decision in...

  20. Computer Security Incident Handling Guide

    E-Print Network [OSTI]

    Computer Security Incident Handling Guide Recommendationsof the National Institute of Standards Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD Tom Millar United States Computer Emergency Readiness Team National Cyber Security Division

  1. Security Policy: Radio Network Controller

    E-Print Network [OSTI]

    Security Policy: Radio Network Controller Encryption Module Controller (RNC EMC) Cryptographic, 2007 Security Policy: RNC EMC Page 1 of 22 #12;Security Policy: RNC EMC Page 2 of 22 #12;Table...........................................................14 7. IDENTIFICATION AND AUTHENTICATION POLICY

  2. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  3. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  4. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND 2012-1670P Ensuring the Safe Containment

  5. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear

  6. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  7. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Supersedes DOE P 470.1.

  8. CIOs Uncensored: Security Smarts.

    SciTech Connect (OSTI)

    Johnson, Gerald R.

    2008-02-25

    This commentary for the CIOs Uncensored section of InformationWeek will discuss PNNL’s “defense in depth” approach to cyber security. It will cover external and internal safeguards, as well as the all-important role of employees in the cyber security equation. For employees are your greatest vulnerability – and your last line of defense.

  9. Engineering secure software 

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01

    -the-fact fixes in the form of software patches. The root causes for security problems in software are explored. A survey of research attempts at engineering secure software is presented. The techniques discussed range from those that are very similar...

  10. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  11. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Energy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W the computational, physics

  12. Building Green in Greensburg: Business Incubator Building

    Office of Energy Efficiency and Renewable Energy (EERE)

    This poster highlights energy efficiency, renewable energy, and sustainable features of the high-performing SunChips Business Incubator building in Greensburg, Kansas.

  13. Building Green in Greensburg: City Hall Building

    Office of Energy Efficiency and Renewable Energy (EERE)

    This poster highlights energy efficiency, renewable energy, and sustainable features of the high-performing City Hall building in Greensburg, Kansas.

  14. Building America Webinar: Building America Research Tools

    Broader source: Energy.gov [DOE]

    This webinar was held on March 18, 2015, and reviewed Building America Research Tools, including Field Test Best Practices, BEopt, and National Residential Efficiency Measures Database.

  15. International Nuclear Security

    SciTech Connect (OSTI)

    Doyle, James E.

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  16. Self Managed Security Cell, a security model for the Internet of Things and Services

    E-Print Network [OSTI]

    de Leusse, Pierre; Dimitrakos, Theo; Nair, Srijith K; 10.1109/AFIN.2009.15

    2012-01-01

    The Internet of Things and Services is a rapidly growing concept that illustrates that the ever increasing amount of physical items of our daily life which become addressable through a network could be made more easily manageable and usable through the use of Services. This surge of exposed resources along with the level of privacy and value of the information they hold, together with the increase of their usage make for an augmentation in the number of the security threats and violation attempts that existing security systems do not appear robust enough to address. In this paper, the authors underline this increase in risk and identify the requirements for resources to be more resilient in this type of environment while keeping an important level of flexibility. In addition, the authors propose an architectural model of Self Managed Security Cell, which leverages on current knowledge in large scale security systems, information management and autonomous systems.

  17. Smart-Grid Security Issues

    SciTech Connect (OSTI)

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  18. Secure Virtualization with Formal Methods

    E-Print Network [OSTI]

    Sturton, Cynthia

    2013-01-01

    cloud computing, virtualization software has a variety of security-cloud computing, researchers have proposed using system virtualization software as a platform to increase the security

  19. Program Areas | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Organizations National Security Home | Science & Discovery | National Security | Program Areas SHARE Program Areas image Oak Ridge National Laboratory (ORNL) has a robust...

  20. Office of Secure Transportation Activities

    Office of Environmental Management (EM)

    6th, 2012 WIPP Knoxville, TN OFFICE OF SECURE TRANSPORTATION Agency Integration Briefing Our Mission To provide safe and secure ground and air transportation of nuclear weapons,...

  1. Security Rulemaking | Department of Energy

    Office of Environmental Management (EM)

    Activities Transportation Security Rulemaking Activities at the U.S. Nuclear Regulatory Commission NRC Transportation Security (Part 73 SNF Update and Part 37 Category 1...

  2. National Nuclear Security Administration Overview

    Office of Environmental Management (EM)

    May 11, 2011 Ahmad Al-Daouk Manager, National Security Department (NSD) National Nuclear Security Administration (NNSA) Service Center - Albuquerque, NM May 11, 2011 - Page 2...

  3. Building general purpose security services on trusted computing

    E-Print Network [OSTI]

    Mitchell, Chris

    ). This author is the corresponding author. 1 #12;tion or authenticated key establishment is required

  4. Image, Incorporated : a study of securities buildings in Seoul, Korea

    E-Print Network [OSTI]

    Chang, Ji-in

    1992-01-01

    This study deals with the images of corporate high-rises in Seoul, Korea, the main city of a rapidly growing industrial nation. The questions explored concern mainly the images of office high-rises. Five multi-story ...

  5. Building UPF for Y-12 | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsiclouddenDVA N C E D B L OBransen PlasmaEnergy,Recognizing Top101-HV Feb

  6. Sandia California breaks ground on new building | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPosterNationalProgramsSSGF Magazine

  7. Labor Relations Building | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverseIMPACTThousand CubicResource andfirstDeviceLabLabor Compliance AdvisorLabor

  8. Joseph Vance Building, The

    High Performance Buildings Database

    Seattle, WA In 2006, the Rose Smart Growth Investment Fund acquired the historic Joseph Vance Building with the purpose of transforming it into "the leading green and historic class B" building in the marketplace. The terra cotta Vance Building was constructed in 1929 and has 14 floors - 13 floors of offices over ground-floor retail with a basement for mechanical equipment and storage. In 2009 the U.S. Green Building Council (USGBC) awarded the Vance Building LEED for Existing Buildings (EB) Gold certification.

  9. Building America Webinar: Saving Energy in Multifamily Buildings...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Ventilation Strategies in Multifamily Buildings Webinar Building America Webinar: Advanced Envelope Research for Factory-Built Housing Building America Webinar: Ventilation in...

  10. Building America Top Innovations Hall of Fame Profile - Building...

    Energy Savers [EERE]

    Top Innovations Hall of Fame Profile - Building Energy Optimization Analysis Method (BEopt) Building America Top Innovations Hall of Fame Profile - Building Energy Optimization...

  11. Building America Top Innovations Hall of Fame Profile - Building...

    Energy Savers [EERE]

    Top Innovations Hall of Fame Profile - Building America's Top Innovations Propel the Home Building Industry toward Higher Performance Building America Top Innovations Hall of Fame...

  12. 1999 Commercial Buildings Characteristics--Building Shell and...

    U.S. Energy Information Administration (EIA) Indexed Site

    & Practices > Building Shell & Lighting Conservation Features Building Shell and Lighting Conservation Features The 1999 CBECS collected information on two types of building shell...

  13. Managing Energy in San Antonio Public Buildings 

    E-Print Network [OSTI]

    Gates, P.

    2013-01-01

    Public Buildings Leading by Example Philip Gates, CEM, CMVP, EIT Energy Manager 1 ESL-KT-13-12-27 CATEE 2013: Clean Air Through Energy Efficiency Conference, San Antonio, Texas Dec. 16-18 2 H ow to be gin ? ESL-KT-13-12-27 CATEE 2013: Clean Air... and Policies it i li i Energy Management Responsibilities 3 ESL-KT-13-12-27 CATEE 2013: Clean Air Through Energy Efficiency Conference, San Antonio, Texas Dec. 16-18 Public Buildings: By the Numbers 4 15,000,000 sqft of building area ESL-KT-13-12-27 CATEE...

  14. A P-5 Nuclear Dialogue: Concept, Building Blocks, and Implementation

    E-Print Network [OSTI]

    #12;A P-5 Nuclear Dialogue: Concept, Building Blocks, and Implementation Paul I. Bernstein, biological, radiological, nuclear, and high explosives) by providing capabilities to reduce, eliminate affirmed "America's intention to seek the peace and security of a world without nuclear weapons" and stated

  15. The Building (First Amendment) Regulations 1965 

    E-Print Network [OSTI]

    Pannell, Charles

    1965-01-01

    STATUTORY INSTRUMENTS 1965 No. 2184 BUILDING AND BUILDINGS The Building (First Amendment) Regulations 1965

  16. Building Name: ____________________________________________ Address: __________________________________________ Completed by: ___________________________________________ Date: ______________ File Number: ___________________

    E-Print Network [OSTI]

    input? s Fuel or combustion odors Cooling Tower s Clean? no leaks or overflow? Slime or algae growth air s Actual temperatures supply air mixed air return air outdoor air Coils s Heating fluid discharge temperature T cooling fluid discharge temperature T s Controls (describe) s Condition (note date) Humidifier

  17. Policy Statement Number: PS-49 Title/Topic: Building Coordinator

    E-Print Network [OSTI]

    Harms, Kyle E.

    conditioning, heating and electrical problems to Facility Services Work Control. This includes any changes in the scheduling of air conditioning or heating for offices and classrooms. 6. Report any changes in dates for floor cleaning and waxing, carpet shampooing and painting of offices to Facility Services Work Control

  18. Estimating the number of buildings in Martin Behnisch1

    E-Print Network [OSTI]

    , materials) and dynamic complexity (i.e. construction, maintenance, refurbishment, demolition). Recently and its spatial distribution will provide planning processes of construction and especially refurbishment

  19. Building Number/Name: Date prepared: Responsible Contractor:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsiclouddenDVA N C E D B L OBransen PlasmaEnergy,Recognizing Top101-HV Feb 8 201 WRPS C M

  20. Building Number/Name: Date prepared: Responsible Contractor:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsiclouddenDVA N C E D B L OBransen PlasmaEnergy,Recognizing Top101-HV Feb 8 201 WRPS C

  1. Building Number/Name: Date prepared: Responsible Contractor:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsiclouddenDVA N C E D B L OBransen PlasmaEnergy,Recognizing Top101-HV Feb 8 201 WRPS C3-E

  2. Building Number/Name: Date prepared: Responsible Contractor:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsiclouddenDVA N C E D B L OBransen PlasmaEnergy,Recognizing Top101-HV Feb 8 201 WRPS

  3. Building Number/Name: Date prepared: Responsible Contractor:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsiclouddenDVA N C E D B L OBransen PlasmaEnergy,Recognizing Top101-HV Feb 8 201 WRPS2-AW

  4. Building Number/Name: Date prepared: Responsible Contractor:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsiclouddenDVA N C E D B L OBransen PlasmaEnergy,Recognizing Top101-HV Feb 8 201 WRPS2-AWS

  5. Building Number/Name: Date prepared: Responsible Contractor:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsiclouddenDVA N C E D B L OBransen PlasmaEnergy,Recognizing Top101-HV Feb 8 201

  6. Table B10. Employment Size Category, Number of Buildings, 1999

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: AlternativeMonthly","10/2015"Monthly","10/2015" ,"Release7CubicthroughtheSeptember 24,4,630.22Primary Consumption of7.A9..0.

  7. Table B15. Number of Establishments in Building, Floorspace, 1999

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: AlternativeMonthly","10/2015"Monthly","10/2015" ,"Release7CubicthroughtheSeptember 24,4,630.22Primary Consumption

  8. Hanford Facility Beryllium Fact Sheet Building Number/Name:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (Journalvivo Low-Dose Lowď‚—34October 2014 OctoberChallengeDepartment06KE Rad

  9. Hanford Facility Beryllium Fact Sheet Building Number/Name:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (Journalvivo Low-Dose Lowď‚—34October 2014 OctoberChallengeDepartment06KE

  10. Hanford Facility Beryllium Fact Sheet Building Number/Name:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (Journalvivo Low-Dose Lowď‚—34October 2014 OctoberChallengeDepartment06KE2S

  11. Hanford Facility Beryllium Fact Sheet Building Number/Name:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (Journalvivo Low-Dose Lowď‚—34October 2014

  12. Hanford Facility Beryllium Fact Sheet Building Number/Name:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (Journalvivo Low-Dose Lowď‚—34October 201422T Office Administration

  13. Hanford Facility Beryllium Fact Sheet Building Number/Name:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (Journalvivo Low-Dose Lowď‚—34October 201422T Office Administration45Z

  14. Hanford Facility Beryllium Fact Sheet Building Number/Name:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (Journalvivo Low-Dose Lowď‚—34October 201422T Office Administration45Z36Z

  15. Hanford Facility Beryllium Fact Sheet Building Number/Name:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (Journalvivo Low-Dose Lowď‚—34October 201422T Office Administration45Z36Z

  16. Hanford Facility Beryllium Fact Sheet Building Number/Name:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (Journalvivo Low-Dose Lowď‚—34October 201422T Office Administration45Z36Z71B

  17. Hanford Facility Beryllium Fact Sheet Building Number/Name:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (Journalvivo Low-Dose Lowď‚—34October 201422T Office Administration45Z36Z71B

  18. Hanford Facility Beryllium Fact Sheet Building Number/Name:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (Journalvivo Low-Dose Lowď‚—34October 201422T Office

  19. Hanford Facility Beryllium Fact Sheet Building Number/Name:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (Journalvivo Low-Dose Lowď‚—34October 201422T Office36Z Plutonium Storage

  20. INSTITUTE FOR CYBER SECURITY Application-Centric Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Dr. Robert W. Gracy Vice President

  1. INSTITUTE FOR CYBER SECURITY Application-Centric Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

  2. Towards Secure Information Sharing Models for Community Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu Dept. of Computer Science Institute for Cyber Security University of Texas at San Antonio Email: ravi.sandhu@utsa.edu Ram Krishnan Dept. of Electrical and Computer Engineering Institute for Cyber Security University

  3. INSTITUTE FOR CYBER SECURITY Application-Centric Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio June 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Dr. Robert W. Gracy Vice President

  4. 1Computer Security Shambhu Upadhyaya Cyber Security @CEISARE

    E-Print Network [OSTI]

    Upadhyaya, Shambhu

    , there are 100+ centers ­ Based on curriculum mapping to CNSS (committee of National Security Standards) 4011 at Google (2010) · Threats to national security ­ Insider attacks ­ Examples: Bradley Manning leaked1Computer Security Shambhu Upadhyaya Cyber Security @CEISARE Professor S. Upadhyaya Department

  5. A SECURE EUROPE IN A BETTER WORLD EUROPEAN SECURITY STRATEGY

    E-Print Network [OSTI]

    Sussex, University of

    EN A SECURE EUROPE IN A BETTER WORLD EUROPEAN SECURITY STRATEGY Brussels, 12 December 2003 #12;1 EN's complex problems on its own Introduction Europe has never been so prosperous, so secure nor so free problems on its own. Europe still faces security threats and challenges. The outbreak of conflict

  6. SecuritySmart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D mSecurity SecuritySecuritySmart

  7. UNIVERSITY OF CHICAGO COMPTROLLER FORM 26 REVISED 02/92 Request for Taxpayer Identification Number (SSN or FEIN) &

    E-Print Network [OSTI]

    Sherman, S. Murray

    UNIVERSITY OF CHICAGO COMPTROLLER FORM 26 REVISED 02/92 Request for Taxpayer Identification Number. PAYEE INFORMATION A. TAXPAYER IDENTIFICATION NUMBER (TIN) Social Security Number (SSN): (If the Payee

  8. Building Energy Code

    Broader source: Energy.gov [DOE]

    Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more deta...

  9. Change in historic buildings

    E-Print Network [OSTI]

    Yin, Chien-Ni

    1992-01-01

    Change in historic buildings is inevitable. If these changes are not well-managed, the cityscape will be threatened because a city is composed of buildings. A good city should combine both growth and preservation. Controlling ...

  10. Better Buildings Summit 2015

    Broader source: Energy.gov [DOE]

    The Better Buildings Summit is a national meeting where Better Buildings partners, including AMO’s Better Plants Program partners, and leading organizations can exchange best practices and showcase...

  11. 2015 Better Buildings Summit

    Office of Energy Efficiency and Renewable Energy (EERE)

    The U.S. Department of Energy's Better Buildings Summit is a national meeting where leading organizations across key sectors showcase solutions to cut energy intensity in their buildings portfolio...

  12. Building America Report Template

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and Renewable Energy Prepared by Sam Rashkin Building Technologies Office 950 L'Enfant Building, 6 th floor Washington, DC 20024 May 2014 iii iv Table of Contents List of...

  13. Guam- Building Energy Code

    Broader source: Energy.gov [DOE]

    Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

  14. Building Energy Code

    Broader source: Energy.gov [DOE]

    Missouri does not have a statewide building or energy code for private residential and commercial buildings, and there currently is no state regulatory agency authorized to promulgate, adopt, or...

  15. Building Energy Code

    Broader source: Energy.gov [DOE]

    In 2009 S.B. 1182 created the Oklahoma Uniform Building Code Commission. The 11-member Commission was given the power to conduct rulemaking processes to adopt new building codes. The codes adopted...

  16. Building Energy Code

    Broader source: Energy.gov [DOE]

    Note: Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

  17. Building Energy Code

    Broader source: Energy.gov [DOE]

    Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

  18. Building Energy Code

    Broader source: Energy.gov [DOE]

    Prior to 1997, South Carolina's local governments adopted and enforced the building codes. In 1997, the law required statewide use of the most up-to-date building codes, which then required the...

  19. Building Energy Code

    Broader source: Energy.gov [DOE]

    The Kentucky Building Code (KBC) is updated every three years on a cycle one year behind the publication year for the International Building Code. Any changes to the code by the state of Kentucky...

  20. Building Energy Code

    Broader source: Energy.gov [DOE]

    The 2012 IECC is in effect for all residential and commercial buildings, Idaho schools, and Idaho jurisdictions that adopt and enforce building codes, unless a local code exists that is more...

  1. Building Energy Code

    Broader source: Energy.gov [DOE]

    The Florida Building Commission (FBC) is directed to adopt, revise, update, and maintain the Florida Building Code in accordance with Chapter 120 of the state statutes. The code is mandatory...

  2. Building Energy Code

    Broader source: Energy.gov [DOE]

    Public Act 093-0936 (Illinois Energy Conservation Code for Commercial Buildings) was signed into law in August, 2004. The Illinois Energy Conservation Code for Commercial Buildings became effective...

  3. Building Energy Code

    Broader source: Energy.gov [DOE]

    The Massachusetts Board of Building Regulations and Standards has authority to promulgate the Massachusetts State Building Code (MSBC). The energy provisions in the MSBC were developed by the Boa...

  4. Building Energy Code

    Broader source: Energy.gov [DOE]

    The Virginia Uniform Statewide Building Code (USBC) is a statewide minimum requirement that local jurisdictions cannot amend. The code is applicable to all new buildings in the commonwealth. The...

  5. Building condition monitoring

    E-Print Network [OSTI]

    Samouhos, Stephen V. (Stephen Vincent), 1982-

    2010-01-01

    The building sector of the United States currently consumes over 40% of the United States primary energy supply. Estimates suggest that between 5 and 30% of any building's annual energy consumption is unknowingly wasted ...

  6. Financing green buildings

    E-Print Network [OSTI]

    Pierce, Christopher John, S.M. Massachusetts Institute of Technology

    2013-01-01

    An emerging trend in real estate is the development of sustainable buildings, partially due to the huge environmental impact of the design, construction and operation of commercial buildings. This thesis provides a brief ...

  7. Building America System Research

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Building America System Research Eric Werling, DOE Ren Anderson, NREL eric.werling@ee.doe.gov, 202-586-0410 ren.anderson@nrel.gov, 303-384-7443 April 2, 2013 Building America...

  8. The Economics of Green Building

    E-Print Network [OSTI]

    Eichholtz, Piet; Kok, Nils; Quigley, John M.

    2010-01-01

    cost savings in energy efficient buildings. To test for thisrisk inherent in energy efficient buildings. Importantly,of energy-efficient and sustainable buildings through

  9. Building Energy Monitoring and Analysis

    E-Print Network [OSTI]

    Hong, Tianzhen

    2014-01-01

    methodology for building energy data definition, collection,analyze good building energy data to provide valuable and9  A Standard Building Energy Data 

  10. The Economics of Green Building

    E-Print Network [OSTI]

    Eichholtz, Piet; Kok, Nils; Quigley, John M.

    2010-01-01

    Benjamin. "Do LEED-Certified Buildings Save Energy? Yes,But,." Energy and Buildings, 2009, 41, pp. 897-905. Royalrating, and publicizing buildings along these dimensions (

  11. Building Energy Monitoring and Analysis

    E-Print Network [OSTI]

    Hong, Tianzhen

    2014-01-01

    Summer Study on Energy Efficiency in Buildings. LBNL (2012).Summer Study on Energy Efficiency in Buildings. UNEP (2009).Standard for Energy Efficiency of Public Buildings. Energy

  12. PROGRESS IN ENERGY EFFICIENT BUILDINGS

    E-Print Network [OSTI]

    Wall, L.W.

    2009-01-01

    improving energy efficiency of buildings is being addressedimprovement of energy efficiency in buildings are brieflyimproving the energy efficiency of buildings in the U.S. New

  13. Advanced Building Systems & Architectural Design

    E-Print Network [OSTI]

    Subramanian, Venkat

    primary research interests are whole building performance analysis, passive Advanced Building Systems & Architectural Design University with a Ph.D. in Building Performance and Diagnostics. Currently he

  14. Building Energy Monitoring and Analysis

    E-Print Network [OSTI]

    Hong, Tianzhen

    2014-01-01

    exchange of building energy performance data difficult.  understand  building  energy  performance  and  improve to understanding building energy performance and supporting 

  15. Building Energy Monitoring and Analysis

    E-Print Network [OSTI]

    Hong, Tianzhen

    2014-01-01

    exchange of building energy performance data difficult.  understand  building  energy  performance  and  improve Reliable  Building  Energy  Performance Characterization 

  16. PROGRESS IN ENERGY EFFICIENT BUILDINGS

    E-Print Network [OSTI]

    Wall, L.W.

    2009-01-01

    I Figure 21. Sample building energy use label expressed inanalyses of actual buildings energy consumption data confirm1983. PROGRESS IN ENERGY EFFICIENT BUILDINGS Leonard W. Wall

  17. 2014 Headquarters Facilities Master Security Plan- Chapter 8, Operations Security Program

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program Describes the DOE Headquarters Operations Security (OPSEC) Program.

  18. 2014 Headquarters Facilities Master Security Plan- Chapter 10, Security Awareness Program

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program Describes the DOE Headquarters Security Awareness Program

  19. Buildings Stock Load Control 

    E-Print Network [OSTI]

    Joutey, H. A.; Vaezi-Nejad, H.; Clemoncon, B.; Rosenstein, F.

    2006-01-01

    , Shenzhen, China Building Commissioning for Energy Efficiency and Comfort, Vol.VI-9-4 Buildings Stock Load Control Ms H. Amrani Joutey Mr H. Vaezi-Nejad Mr B. Clemonçon Mr F.Rosenstein PHD student Research engineer Research... electricity consumption and curtail peak demand but in local form: building by building. Few developments are carried out for multi sites management. Multi sites management is essential in crisis and/or peak periods (large energy demand in particular during...

  20. Kiowa County Commons Building

    Office of Energy Efficiency and Renewable Energy (EERE)

    This poster describes the energy efficiency features and sustainable materials used in the Kiowa County Commons Building in Greensburg, Kansas.

  1. Building Abbreviations Alumni Hall

    E-Print Network [OSTI]

    Johnson Jr.,, Ray

    20A/B 44 20A/B 44 20A/B 44 58 17 17 88 34 25 Building Abbreviations Alumni Hall Campbell Dome Colden FitzGerald Gym Frese Hall G Building Gertz Center Goldstein Theatre Honors Hall GC GB GT HH MU KY KG KS KP PH I Building Jefferson Hall Kiely Hall King Hall Kissena Hall Klapper Hall Music Building

  2. Building Scale DC Microgrids

    E-Print Network [OSTI]

    Marnay, Chris

    2013-01-01

    CHP, which can improve overall efficiency significantly. In many climates, using the waste heat to cool buildings

  3. Building Energy Code

    Broader source: Energy.gov [DOE]

    In March 2006, SB 459 was enacted to promote renewable energy and update the state's building energy codes.

  4. Building Operator Certification 

    E-Print Network [OSTI]

    Lilley, D.

    2013-01-01

    Certification Energy Efficiency through Operator Training CATEE December 18, 2013 – San Antonio, TX Dennis Lilley, CEM, PMP ESL-KT-13-12-49 CATEE 2013: Clean Air Through Energy Efficiency Conference, San Antonio, Texas Dec. 16-18 Building Operator Certification... Energy Efficiency through Operator Training What is Building Operator Certification? Industry-recognized credential in energy efficient building operation practices Created with 100 industry experts Launched in 1996 9,000 building engineers...

  5. BROADER National Security Missions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Metal Chips (U) Uranium Trioxide (UO 3 ) UO 2 (NO 3 ) 2 Ur anyl Nitrate Ammonium Uranyl Carbonate (NH 4 ) 2 UO 2 (CO 3 ) 4 DEVELOP NEW NATIONAL SECURITY MISSIONS Y-12 has...

  6. AMALGAMATED SECURITY COMMUNITIES

    E-Print Network [OSTI]

    Harvey, Andrew Stephen

    2011-08-31

    This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

  7. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-25

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  8. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-01-22

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  9. Operations Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-04-30

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  10. Archive Reference Buildings by Building Type: Primary school

    Broader source: Energy.gov [DOE]

    Here you will find past versions of the reference buildings for new construction commercial buildings, organized by building type and location. A summary of building types and climate zones is...

  11. Archive Reference Buildings by Building Type: Secondary school

    Broader source: Energy.gov [DOE]

    Here you will find past versions of the reference buildings for new construction commercial buildings, organized by building type and location. A summary of building types and climate zones is...

  12. Archive Reference Buildings by Building Type: Stand-alone retail

    Broader source: Energy.gov [DOE]

    Here you will find past versions of the reference buildings for new construction commercial buildings, organized by building type and location. A summary of building types and climate zones is...

  13. Archive Reference Buildings by Building Type: Fast food

    Broader source: Energy.gov [DOE]

    Here you will find past versions of the reference buildings for new construction commercial buildings, organized by building type and location. A summary of building types and climate zones is...

  14. Archive Reference Buildings by Building Type: Small office

    Broader source: Energy.gov [DOE]

    Here you will find past versions of the reference buildings for new construction commercial buildings, organized by building type and location. A summary of building types and climate zones is...

  15. Archive Reference Buildings by Building Type: Strip mall

    Broader source: Energy.gov [DOE]

    Here you will find past versions of the reference buildings for new construction commercial buildings, organized by building type and location. A summary of building types and climate zones is...

  16. Archive Reference Buildings by Building Type: Large office

    Office of Energy Efficiency and Renewable Energy (EERE)

    Here you will find past versions of the reference buildings for new construction commercial buildings, organized by building type and location. A summary of building types and climate zones is...

  17. Building Toxic Metal Characterization and Decontamination Report: Area 6, Building 914

    SciTech Connect (OSTI)

    NSTec Industrial Hygiene

    2011-08-15

    The purpose of this report is to outline the toxic metal characterization and decontamination efforts in Area 6, Building 914. This includes the initial building inspection, the hotspot sampling, results/findings, building cleanup, and the verification sampling. Building 914 is a steel light frame building that was constructed in 1992. It is about 16,454 square feet, and five employees are assigned to this building. According to the building's floor plan blueprints, it could be inferred that this building was once a Wiremen/Lineman shop. In 2002-2004, the National Nuclear Security Administration Nevada Site Office embarked on a broad characterization of beryllium (Be) surface concentrations throughout the North Las Vegas Facility, the Nevada National Security Site (NNSS), and ancillary facilities like the Special Technologies Laboratory, Remote Sensing Laboratory, etc. Building 914 was part of this characterization. The results of the 2002 study illustrated that the metal housekeeping limits were within acceptable limits and from a Be standpoint, the building was determined to be fit for occupancy. On March 2, 2011, based on a request from Building 914 users, National Security Technologies, LLC (NSTec) Industrial Hygiene (IH) collected bulk samples from the southwest corner of Building 914 at heights above 6 feet where black dust had been noticed on this particular wall. IH conducted surface swipe sampling of the area and analyzed the samples for toxic metals, namely, beryllium (Be), cadmium (Cd), chromium (Cr), lead (Pb), and manganese (Mn). The sample results indicated values two to four times above the housekeeping threshold for Be, Cd, Cr, Pb, and Mn. Subsequently, the facility was closed and posted; the necessary personnel were notified; and controls were instituted for ingress and egress of the building. On March 17, 2011, IH performed an extensive sampling event involving the entire warehouse in accordance with NSTec Organization Procedure OP-P250.004, Sampling Procedures. Analysis of the results from this exercise illustrated that toxic metal contamination was ubiquitous throughout the warehouse section of this building but did not extend into the office, restroom, and break room areas. On March 22, 2011, a planning meeting was held with Environment, Safety, Health & Quality management; Operations & Infrastructure (O&I) mangement; Facility Management; Occupational Medicine; O&I Operations; and IH. After a brief discussion concerning the salient facts of the surface sample results, it was agreed that the facility and its contents required cleaning. The facility would then be re-sampled to verify cleanliness and suitability for re-occupancy. On April 18, 2011, warehouse cleanup activites began. On July 5, 2011, upon receipt of the results from the last cleaned section, the cleanup operations were concluded. The building was statistically determined to be clean; thus, it could be reoccupied and the warehouse operations could resume immediately.

  18. Weizmann Workshop on Multi Party Secure Computation

    E-Print Network [OSTI]

    Naor, Moni

    The Workshop will be held Ziskind Building, Room number 1, at the Weizmann Institute of Science, Rehovot reservations in either cities, if you let her know in advance. In case you are looking for an inexpensive hotel the key to your room and an envelope with all necessary information to direct you to your room

  19. Weizmann Workshop on Multi Party Secure Computation

    E-Print Network [OSTI]

    Naor, Moni

    -4122 Email: carol@wisdom.weizmann.ac.il Location The Workshop will be held Ziskind Building, Room number cities, if you let her know in advance. In case you are * *looking for an inexpensive hotel (say will have the key t* *o your room and an envelope with all necessary information to direct you to your

  20. ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1

    E-Print Network [OSTI]

    Su, Xiao

    ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1 Information................................................................................................................................................................................3 Information Security Policy...............................................................................................................................................4 Information Security Policy Management

  1. Policy Paper 35: Energy and Security in Northeast Asia: Fueling Security

    E-Print Network [OSTI]

    Calder, Kent; Fesharaki, Fereidun; Shirk, Susan L.; Stankiewicz, Michael

    1998-01-01

    Deese (editors). Energy and Security. 3. Fereidun Fesharaki,Energy and Security in Northeast Asia: Fueling Security Anrising energy demand. Energy and Security in Northeast Asia

  2. Secure Quantum Key Distribution

    E-Print Network [OSTI]

    Hoi-Kwong Lo; Marcos Curty; Kiyoshi Tamaki

    2015-05-20

    Secure communication plays a crucial role in the Internet Age. Quantum mechanics may revolutionise cryptography as we know it today. In this Review Article, we introduce the motivation and the current state of the art of research in quantum cryptography. In particular, we discuss the present security model together with its assumptions, strengths and weaknesses. After a brief introduction to recent experimental progress and challenges, we survey the latest developments in quantum hacking and counter-measures against it.

  3. Incidents of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-17

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  4. Data port security lock

    DOE Patents [OSTI]

    Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

    2008-06-24

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  5. Security systems engineering overview

    SciTech Connect (OSTI)

    Steele, B.J.

    1996-12-31

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).

  6. Passive solar buildings

    SciTech Connect (OSTI)

    Balcomb, J.D.

    1992-10-01

    Developments in passive solar buildings that took place from the early 1970`s through 1989 are described. Much of the work covered was federally sponsored during the period 1975 through 1986. About half the volume is devoted to quantitative methods for modeling, simulation, and design analysis of passive buildings; the other half summarizes the quantitative results of testing and monitoring of models and buildings. The following are covered: building solar gain modeling, simulation analysis, simplified methods, materials and components, analytical results for specific systems, test modules, building integration, performance monitoring and results, and design tools. (MHR)

  7. Passive solar buildings

    SciTech Connect (OSTI)

    Balcomb, J.D. )

    1992-01-01

    Developments in passive solar buildings that took place from the early 1970's through 1989 are described. Much of the work covered was federally sponsored during the period 1975 through 1986. About half the volume is devoted to quantitative methods for modeling, simulation, and design analysis of passive buildings; the other half summarizes the quantitative results of testing and monitoring of models and buildings. The following are covered: building solar gain modeling, simulation analysis, simplified methods, materials and components, analytical results for specific systems, test modules, building integration, performance monitoring and results, and design tools. (MHR)

  8. Towards Building Occupants Positioning: Track and Trace for Optimal Process Control 

    E-Print Network [OSTI]

    Zeiler, W.; Labeodan, T.; Bozem, G.; Maaijen, R.

    2013-01-01

    Building occupancy information is a crucial factor that should be considered in the control strategy of building operations for improved energy efficiency and occupant comfort. As occupancy is stochastic and challenging to measure, a number of real...

  9. PROGRESS IN ENERGY EFFICIENT BUILDINGS

    E-Print Network [OSTI]

    Wall, L.W.

    2009-01-01

    addressed by the Buildings Energy Data (BED) Group at LBL.buildings by the Buildings Energy Data (BED) Group at LBL,results from our buildings energy data bases. Actual energy

  10. Commercial Building Asset Rating Program

    Broader source: Energy.gov [DOE]

    Slides from a Commercial Building Initiative webinar outlining the Commercial Building Asset Rating Program on August 23, 2011.

  11. Building Technologies | Clean Energy | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Systems Biology Transportation Clean Energy Home | Science & Discovery | Clean Energy | Research Areas | Buildings SHARE Building Technologies Reducing the energy...

  12. Quantum Strongly Secure Ramp Secret Sharing

    E-Print Network [OSTI]

    Paul Zhang; Ryutaroh Matsumoto

    2014-08-08

    Quantum secret sharing is a scheme for encoding a quantum state (the secret) into multiple shares and distributing them among several participants. If a sufficient number of shares are put together, then the secret can be fully reconstructed. If an insufficient number of shares are put together however, no information about the secret can be revealed. In quantum ramp secret sharing, partial information about the secret is allowed to leak to a set of participants, called an unqualified set, that cannot fully reconstruct the secret. By allowing this, the size of a share can be drastically reduced. This paper introduces a quantum analog of classical strong security in ramp secret sharing schemes. While the ramp secret sharing scheme still leaks partial information about the secret to unqualified sets of participants, the strong security condition ensures that qudits with critical information can no longer be leaked.

  13. About Singapore Green Building Council

    E-Print Network [OSTI]

    - friendly, energy efficiency building materials, design and architecture ­ reaching out to Green buildingAbout Singapore Green Building Council About SGBC Green Building Conference Conference Programme Green Building Conference In line with the mission of the Singapore Green Building Council (SGBC

  14. IY5512: Part 1 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    IY5512: Part 1 1 Information Security Group IY5512 Computer Security Part 1: Introduction to computer security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security) ... 2 Information Security Group Agenda · Overview · Security goals · Security approaches ­ prevention

  15. Re-Assessing Green Building Performance: A Post Occupancy Evaluation of 22 GSA Buildings

    SciTech Connect (OSTI)

    Fowler, Kimberly M.; Rauch, Emily M.; Henderson, Jordan W.; Kora, Angela R.

    2010-06-01

    2nd report on the performance of GSA's sustainably designed buildings. The purpose of this study was to provide an overview of measured whole building performance as it compares to GSA and industry baselines. The PNNL research team found the data analysis illuminated strengths and weaknesses of individual buildings as well as the portfolio of buildings. This section includes summary data, observations that cross multiple performance metrics, discussion of lessons learned from this research, and opportunities for future research. The summary of annual data for each of the performance metrics is provided in Table 25. The data represent 1 year of measurements and are not associated with any specific design features or strategies. Where available, multiple years of data were examined and there were minimal significant differences between the years. Individually focused post occupancy evaluation (POEs) would allow for more detailed analysis of the buildings. Examining building performance over multiple years could potentially offer a useful diagnostic tool for identifying building operations that are in need of operational changes. Investigating what the connection is between the building performance and the design intent would offer potential design guidance and possible insight into building operation strategies. The 'aggregate operating cost' metric used in this study represents the costs that were available for developing a comparative industry baseline for office buildings. The costs include water utilities, energy utilities, general maintenance, grounds maintenance, waste and recycling, and janitorial costs. Three of the buildings that cost more than the baseline in Figure 45 have higher maintenance costs than the baseline, and one has higher energy costs. Given the volume of data collected and analyzed for this study, the inevitable request is for a simple answer with respect to sustainably designed building performance. As previously stated, compiling the individual building values into single metrics is not statistically valid given the small number of buildings, but it has been done to provide a cursory view of this portfolio of sustainably designed buildings. For all metrics except recycling cost per rentable square foot and CBE survey response rate, the averaged building performance was better than the baseline for the GSA buildings in this study.

  16. Achieving 50% Energy Savings in Office Buildings, Advanced Energy Design Guides: Office Buildings (Brochure)

    SciTech Connect (OSTI)

    Not Available

    2014-09-01

    This fact sheet summarizes recommendations for designing new office buildings that result in 50% less energy use than conventional designs meeting minimum code requirements. The recommendations are drawn from the Advanced Energy Design Guide for Small to Medium Office Buildings, an ASHRAE publication that provides comprehensive recommendations for designing low-energy-use office buildings with gross floor areas up to 100,000 ft2 (see sidebar). Designed as a stand-alone document, this fact sheet provides key principles and a set of prescriptive design recommendations appropriate for smaller office buildings with insufficient budgets to fully implement best practices for integrated design and optimized performance. The recommendations have undergone a thorough analysis and review process through ASHRAE, and have been deemed the best combination of measures to achieve 50% savings in the greatest number of office buildings.

  17. Unconditionally Secure Quantum Signatures

    E-Print Network [OSTI]

    Ryan Amiri; Erika Andersson

    2015-08-08

    Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern communications. They allow for the exchange of messages from one sender to multiple recipients, with the guarantees that messages cannot be forged or tampered with and that messages also can be forwarded from one recipient to another without compromising their validity. Signatures are different from, but no less important than encryption, which ensures the privacy of a message. Commonly used signature protocols - signatures based on the Rivest-Adleman-Shamir (RSA) algorithm, the digital signature algorithm (DSA), and the elliptic curve digital signature algorithm (ECDSA) - are only computationally secure, similar to public key encryption methods. In fact, since these rely on the difficulty of finding discrete logarithms or factoring large primes, it is known that they will become completely insecure with the emergence of quantum computers. We may therefore see a shift towards signature protocols that will remain secure even in a post-quantum world. Ideally, such schemes would provide unconditional or information-theoretic security. In this paper, we aim to provide an accessible and comprehensive review of existing unconditionally secure signature schemes for signing classical messages, with a focus on unconditionally secure quantum signature schemes.

  18. Strategies for Overcoming Key Barriers to Development of a National Security Workforce

    SciTech Connect (OSTI)

    2008-06-30

    This report documents the strategies for overcoming identified key barriers to development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP) being performed under a Department of Energy (DOE) National Nuclear Security Administration (NNSA) grant. Many barriers currently exist that prevent the development of an adequate number of properly trained national security personnel. The identified strategies to address the barriers will focus on both short-term and long-term efforts, as well as strategies to capture legacy knowledge of retiring national security workforce personnel.

  19. Building a Universal Nuclear Energy Density Functional

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room News PublicationsAudits &Bradbury Science Museum -BrooklinSecurityBetter BatteryBuilding a

  20. Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDidDevelopment Top Scientific Impact Since its SearchSecurity

  1. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D m r345 UnlimitedSecure

  2. national security campus | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouthReporteeo | National Nuclear Securityhr | Nationalnational security

  3. Tag: security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorking With U.S. Coal StocksSuppliers Tag: Supplierssecurity Tag: security

  4. physical security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorkingLosThe 26thI D- 6 0 4 2 r m m m m port m fm f mphysical security |

  5. Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

    Office of Environmental Management (EM)

    4, Cyber Security Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2015 2015 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security...

  6. Some Thoughts on Teaching Secure Programming

    E-Print Network [OSTI]

    Bishop, Matt

    2013-01-01

    Teaching Context in Information Security,” ACM Journal onWorld Conference on Information Security Education pp. 23–Colloquium on Information Systems Security Education (CISSE)

  7. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01

    Analysis of Information Security Games, Proceedings of theon the Economics of Information Security WEIS’, Hanover, NH,on the Economics of Information Security’. Anderson, R. and

  8. Securities Class Actions and Bankrupt Companies

    E-Print Network [OSTI]

    Park, James J.

    2014-01-01

    the utility of securities class actions. Certainly, contextthe merit of securities class actions. UCLA | SCHOOL OF LAWof James J. Park, Securities Class Actions and Bankrupt

  9. Security enhanced with increased vehicle inspections

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security enhanced with increased vehicle inspections Security measures increase as of March: vehicle inspections won't delay traffic New increased security procedures meet LANL's...

  10. Review of digital image security in Dermatology

    E-Print Network [OSTI]

    Nielson, Colton; West, Cameron; Shimizu, Ikue

    2015-01-01

    encrypted communications, cloud security breaches, and phonebreaches in security demonstrate, such cloud storage ofand security rules 22 Audits of CSP data center operations and cloud

  11. Integrated Security System | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems architecture Integrated...

  12. Data security on the national fusion grid

    E-Print Network [OSTI]

    Burruss, Justine R.; Fredian, Tom W.; Thompson, Mary R.

    2005-01-01

    of any computational grid is security. Effective sharing oflike ITER. Keywords: security, FusionGrid, grid computing 1.A Security Architecture for Computational Grids,” Proc. 5th

  13. Security on the US Fusion Grid

    E-Print Network [OSTI]

    Burruss, Justin R.; Fredian, Tom W.; Thompson, Mary R.

    2005-01-01

    of any computational grid is security. Effective sharing oflike ITER. Keywords: security, FusionGrid, grid computing 1.A Security Architecture for Computational Grids,” Proc. 5th

  14. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01

    CERT. (2010, Dec) Technical Cyber Security Alerts. [Online].a broad overview of cyber security incidents in the laststrategic war and viable cyber security solutions should be

  15. Mathematical and Statistical Opportunities in Cyber Security

    E-Print Network [OSTI]

    Meza, Juan

    2009-01-01

    development approach to cyber security. Report submitted to2007. Committee on Improving Cyber- security Research in theOpportunities in Cyber Security ? Juan Meza † Scott

  16. Security and United States Immigration Policy

    E-Print Network [OSTI]

    Totten, Robbie James

    2012-01-01

    2009 [1981]. American National Security, 6th ed. Baltimore,1977. Economic Issues and National Security. Lawrence, KS:Immigration and National Security. Westport, CT: Praeger

  17. Office of Security Assessments | Department of Energy

    Energy Savers [EERE]

    Security Assessments Office of Security Assessments MISSION The Office of Security Assessments is responsible for the independent evaluation of the effectiveness of safeguards and...

  18. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Broader source: Energy.gov (indexed) [DOE]

    A vulnerability was reported in Cisco Secure Access Control System. A remote user can change the passwords of arbitrary users. PLATFORM: Cisco Secure ACS versions 5.1 patch 3, 4,...

  19. AUDIT REPORT Security at the Nevada National Security Site

    Broader source: Energy.gov (indexed) [DOE]

    Security at the Nevada National Security Site OAS-L-15-06 May 2015 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections . Department of Energy...

  20. Security Requirements Engineering Support for Security-Annotated Business Processes

    E-Print Network [OSTI]

    Security Requirements Engineering Support for Security-Annotated Business Processes Elda Paja1 that business analysts are not secu- rity experts and assume that this will be bolted on later. Fortunately