Sample records for building number secure

  1. SOCIAL SECURITY NUMBER AND NAME VERIFICATION

    E-Print Network [OSTI]

    Amin, S. Massoud

    SOCIAL SECURITY NUMBER AND NAME VERIFICATION Academic Year 2014­2015 *FA552-A* Please recycle. DIRECTIONS--You must verify your name and Social Security number for processing of your 2014­2015 Free Application for Federal Student Aid (FAFSA) to continue. Please attach a legible copy of your Social Security

  2. SOCIAL SECURITY NUMBER AND NAME VERIFICATION

    E-Print Network [OSTI]

    Amin, S. Massoud

    SOCIAL SECURITY NUMBER AND NAME VERIFICATION Academic Year 2013­2014 *FA552-A* Please recycle. DIRECTIONS--You must verify your name and Social Security number for processing of your 2013­2014 Free Application for Federal Student Aid (FAFSA) to continue. Please attach a legible copy of your Social Security

  3. Building fast and secure Web services with OKWS

    E-Print Network [OSTI]

    Krohn, Maxwell (Maxwell N.)

    2005-01-01T23:59:59.000Z

    OKWS is a Web server specialized for secure and fast delivery of dynamic content. It provides Web developers with a small set of tools powerful enough to build complex Web-based systems. Despite its emphasis on security, ...

  4. Energy Security Planning for Sustainable Buildings

    Broader source: Energy.gov [DOE]

    For energy security, Federal facility managers have a responsibility to consider a broad array of potential threats and incident scenarios. An underlying process or methodology is essential to...

  5. Building 9731 | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041clothAdvanced Materials Advanced MaterialsEnergy, science,Energy,BubblesBuilding 9731 Building 9731

  6. Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage

    E-Print Network [OSTI]

    Minnesota, University of

    Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage Vishal Kher Yongdae Kim are witnessing a revival of Storage Service Providers (SSP) in the form of new vendors as well as traditional players. While storage outsourcing is cost-effective, many companies are hesitating to outsource

  7. CONSENT TO RELEASE EDUCATIONAL RECORDS I, _________________________________, Social Security Number _______________,

    E-Print Network [OSTI]

    Qiu, Weigang

    ) ____ Transcript ____ Student Information Management System (SIMS) records ____ Bursar's Receipt ____ AcademicCONSENT TO RELEASE EDUCATIONAL RECORDS I, _________________________________, Social Security Number records protected under the Family Educational Rights and Privacy Act (FERPA) as follows: 1. Records

  8. Laboratory Chemical Hygiene Plan Building and Room Numbers

    E-Print Network [OSTI]

    Evans, Paul G.

    1 Laboratory Chemical Hygiene Plan Building and Room Numbers: Engineering Research Building 1125 or other Person in Charge: Paul G. Evans Phone: (608) 265-6773 Email: evans@engr.wisc.edu Chemical Hygiene. It is also available online at http://xray.engr.wisc.edu/resources/chemical_hygiene_plan_8-08.pdf

  9. Building Grassmann Numbers from PI-Algebras

    E-Print Network [OSTI]

    Ricardo M. Bentin; Sergio Mota

    2012-04-06T23:59:59.000Z

    This works deals with the formal mathematical structure of so called Grassmann Numbers applied to Theoretical Physics, which is a basic concept on Berezin integration. To achieve this purpose we make use of some constructions from relative modern Polynomial Identity Algebras (PI-Algebras) applied to the special case of the Grassmann algebra.

  10. CAMPUS ANNUAL SAFETY & SECURITY CRIME REPORT 2011 EMERGENCY NUMBERS

    E-Print Network [OSTI]

    Olsen, Stephen L.

    Security service is currently handled through a private security guard service contract, which provides

  11. Compare Activities by Number of Buildings

    Annual Energy Outlook 2013 [U.S. Energy Information Administration (EIA)]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 111 1,613 122 40CoalLease(Billion2,128 2,469 2,321Spain,606,602and Tables and99EnergyNumber

  12. 2014-2015 Verification of Social Security Number & Date of Birth A. STUDENT INFORMATION SPIRE ID#: ____________________

    E-Print Network [OSTI]

    Mountziaris, T. J.

    2014-2015 Verification of Social Security Number & Date of Birth A. STUDENT INFORMATION SPIRE ID YYYY My correct Social Security Number is: ________ - _____ - _________ B. SIGNATURE- For corrections to date of birth. · Signed Social Security card or passport- For corrections to social security

  13. A. Name: Information Systems Security Incident Response Policy B. Number: 20070103-secincidentresp

    E-Print Network [OSTI]

    Bushman, Frederic

    Page 1 I. Title A. Name: Information Systems Security Incident Response Policy B. Number: 20070103-secincidentresp C. Author(s): David Millar (ISC Information Security) and Lauren Steinfeld (Chief Privacy OfficerNet) as well as the establishment of information security policies, guidelines, and standards. The Office

  14. Building boundary is necessary for the real estate industry, flood management, and homeland security applications.

    E-Print Network [OSTI]

    Shan, Jie

    Abstract Building boundary is necessary for the real estate industry, flood management, and homeland security applications. The extraction of building boundary is also a crucial and difficult step, and Purdue University campus are evaluated. Introduction Airborne lidar (light detection and ranging

  15. Secure Pesticide Storage: Essential Structural Features of a Storage Building1

    E-Print Network [OSTI]

    Watson, Craig A.

    PI30 Secure Pesticide Storage: Essential Structural Features of a Storage Building1 Thomas W. Dean2 be present in any building constructed for pesticide storage. Introduction The main job of a pesticide storage facility is to suitably house and protect packages of pesticide. To do this in Florida

  16. On-Line Monitoring of Random Number Generators for Embedded Security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    On-Line Monitoring of Random Number Generators for Embedded Security Renaud Santoro, Olivier@gel.ulaval.ca Abstract-- Many embedded security chips require a high- quality Random Number Generator (RNG for randomness. The battery is selected for its efficient imple- mentation, making the area and power consumption

  17. Building UPF for Y-12 | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041clothAdvanced Materials Advanced MaterialsEnergy,Envelope SHARE BuildingBuildingBuilding UPF for

  18. Building America Developments, September 2000, Information Bulletin Number 1 (Revised)

    SciTech Connect (OSTI)

    Hendron, R.; Anderson, J.; Epstein, K.

    2001-12-01T23:59:59.000Z

    Building America Developments on-line newsletter highlights the Erie-Ellington Homes publicly-funded housing project in Boston, Massachusetts. A Building America and industry partnership that produced energy-efficient manufactured homes built with foam core panels is featured. Also, Habitat for Humanity dedicates two energy-efficient test houses in East Tennessee, and affordable, healthy homes are offered in metro Atlanta. Upcoming events in the Building America Program are also listed.

  19. Eavesdropping on secure deterministic communication with qubits through photon-number-splitting attacks

    SciTech Connect (OSTI)

    Lin Song [State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876 (China); School of Mathematics and Computer Science, Fujian Normal University, Fuzhou 350007 (China); Wen Qiaoyan; Gao Fei [State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Zhu Fuchen [National Laboratory for Modern Communications, P.O. Box 810, Chengdu 610041 (China)

    2009-05-15T23:59:59.000Z

    A collective photon-number-splitting attack strategy is proposed, which combines photon-number-splitting attack with an unambiguous set discrimination of quantum state. Verified by this attack strategy, it is shown that a two-way quantum secure direct communication protocol with qubits is insecure in real circumstance. Finally, we present a possible improved version of this kind of quantum secure direct communication protocol.

  20. Safeguarding Health Information: Building Assurance through HIPAA Security Hosted by the HHS Office for Civil Rights (OCR) and the National Institute of Standards and Technology (NIST)

    E-Print Network [OSTI]

    1 Safeguarding Health Information: Building Assurance through HIPAA Security Hosted by the HHS, Acting Chief, Computer Security Division, Information Technology Laboratory (ITL), NIST 9 Data Using Encryption Matthew Scholl, Computer Security Division, Information Technology Laboratory

  1. Building Name: ____________________________________________ Address: __________________________________________ Completed by: ___________________________________________ Date: ______________ File Number: ___________________

    E-Print Network [OSTI]

    s Rated Btu input Condition s Combustion air: is there at least one square inch free area per 2,000 Btu input? s Fuel or combustion odors Cooling Tower s Clean? no leaks or overflow? Slime or algae growth? s Waste oil and refrigerant properly stored and disposed of? #12;Building Name

  2. CONTROLLING ACCESS TO UNIVERSITY FACILITIES 1. It is the Policy of Syracuse University that all electronically secured University buildings will

    E-Print Network [OSTI]

    Mather, Patrick T.

    that all electronically secured University buildings will have a single access control system for managing) and the Department of Energy and Computing Management (ECM). B. INFORMATION 1.The policy establishes responsibility of electronic security systems and provides for the monitoring of external access to University facilities

  3. Building Number/Name: Date prepared: Responsible Contractor:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041clothAdvanced Materials Advanced MaterialsEnergy,Envelope SHARE Building Envelopes101-HV Feb 8 201

  4. Building Number/Name: Date prepared: Responsible Contractor:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041clothAdvanced Materials Advanced MaterialsEnergy,Envelope SHARE Building Envelopes101-HV Feb 8

  5. Building Number/Name: Date prepared: Responsible Contractor:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041clothAdvanced Materials Advanced MaterialsEnergy,Envelope SHARE Building Envelopes101-HV Feb 83-E

  6. Building Number/Name: Date prepared: Responsible Contractor:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041clothAdvanced Materials Advanced MaterialsEnergy,Envelope SHARE Building Envelopes101-HV Feb

  7. Building Number/Name: Date prepared: Responsible Contractor:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041clothAdvanced Materials Advanced MaterialsEnergy,Envelope SHARE Building Envelopes101-HV Feb2-AW Feb

  8. Building Number/Name: Date prepared: Responsible Contractor:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041clothAdvanced Materials Advanced MaterialsEnergy,Envelope SHARE Building Envelopes101-HV Feb2-AW

  9. Building Number/Name: Date prepared: Responsible Contractor:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041clothAdvanced Materials Advanced MaterialsEnergy,Envelope SHARE Building Envelopes101-HV Feb2-AWWA

  10. Property:Buildings/ReportNumber | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to: navigation,PillarPublicationType Jump to: navigation, search This is a propertyReportNumber

  11. Table B15. Number of Establishments in Building, Floorspace, 1999

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are nowTotal" (Percent) Type: Sulfur Content API GravityDakota" "Fuel, quality", 2013,Iowa"Dakota" ,"FullWestQuantity of2". Summary5. Number

  12. information security

    E-Print Network [OSTI]

    Faculty listing for "information security" ... 1167; Phone: +1 765 49-46022; Email: wagstaff@purdue.edu; Research Interests: number theory, information security.

  13. Final Status Survey Report for Corrective Action Unit 117 - Pluto Disassembly Facility, Building 2201, Nevada National Security Site, Nevada

    SciTech Connect (OSTI)

    Jeremy Gwin and Douglas Frenette

    2010-09-30T23:59:59.000Z

    This document contains the process knowledge, radiological data and subsequent statistical methodology and analysis to support approval for the radiological release of Corrective Action Unit (CAU) 117 – Pluto Disassembly Facility, Building 2201 located in Area 26 of the Nevada National Security Site (NNSS). Preparations for release of the building began in 2009 and followed the methodology described in the Multi-Agency Radiation Survey and Site Investigation Manual (MARSSIM). MARSSIM is the DOE approved process for release of Real Property (buildings and landmasses) to a set of established criteria or authorized limits. The pre-approved authorized limits for surface contamination values and corresponding assumptions were established by DOE O 5400.5. The release criteria coincide with the acceptance criteria of the U10C landfill permit. The U10C landfill is the proposed location to dispose of the radiologically non-impacted, or “clean,” building rubble following demolition. However, other disposition options that include the building and/or waste remaining at the NNSS may be considered providing that the same release limits apply. The Final Status Survey was designed following MARSSIM guidance by reviewing historical documentation and radiological survey data. Following this review a formal radiological characterization survey was performed in two phases. The characterization revealed multiple areas of residual radioactivity above the release criteria. These locations were remediated (decontaminated) and then the surface activity was verified to be less than the release criteria. Once remediation efforts had been successfully completed, a Final Status Survey Plan (10-015, “Final Status Survey Plan for Corrective Action Unit 117 – Pluto Disassembly Facility, Building 2201”) was developed and implemented to complete the final step in the MARSSIM process, the Final Status Survey. The Final Status Survey Plan consisted of categorizing each individual room into one of three categories: Class 1, Class 2 or Class 3 (a fourth category is a “Non-Impacted Class” which in the case of Building 2201 only pertained to exterior surfaces of the building.) The majority of the rooms were determined to fall in the less restrictive Class 3 category, however, Rooms 102, 104, 106, and 107 were identified as containing Class 1 and 2 areas. Building 2201 was divided into “survey units” and surveyed following the requirements of the Final Status Survey Plan for each particular class. As each survey unit was completed and documented, the survey results were evaluated. Each sample (static measurement) with units of counts per minute (cpm) was corrected for the appropriate background and converted to a value with units of dpm/100 cm2. With a surface contamination value in the appropriate units, it was compared to the surface contamination limits, or in this case the derived concentration guideline level (DCGLw). The appropriate statistical test (sign test) was then performed. If the survey unit was statistically determined to be below the DCGLw, then the survey unit passed and the null hypothesis (that the survey unit is above limits) was rejected. If the survey unit was equal to or below the critical value in the sign test, the null hypothesis was not rejected. This process was performed for all survey units within Building 2201. A total of thirty-three “Class 1,” four “Class 2,” and one “Class 3” survey units were developed, surveyed, and evaluated. All survey units successfully passed the statistical test. Building 2201 meets the release criteria commensurate with the Waste Acceptance Criteria (for radiological purposes) of the U10C landfill permit residing within NNSS boundaries. Based on the thorough statistical sampling and scanning of the building’s interior, Building 2201 may be considered radiologically “clean,” or free of contamination.

  14. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security's IT Security Procedures require that non-public University information, including social security numbers and professional information in a secure and appropriate manner. #12;

  15. FY 2004 Energy Use and Recommended Energy Conservation Measures - Environmental Technology and National Security Buildings at Pacific Northwest National Laboratory

    SciTech Connect (OSTI)

    Olson, Norman J.; Hadley, Donald L.; Routh, Richard M.

    2005-12-15T23:59:59.000Z

    This report addresses the question of why the ETB on PNNL's campus used about 20% more electricity than the NSB in FY 2004, even though ETB has more energy conservations installed than NSB and the two buildings were built using nearly identical floor plans. It was determined that the difference in electricity use between the two buildings was due to the large number of computers in the basement of ETB. It was further determined that ETB's high electricity consumption rate cannot be remedied until these computers can be relocated to a more suitable facility.

  16. With the increase in the number of security breaches and the passage of many new laws

    E-Print Network [OSTI]

    Fisher, Kathleen

    protection, incident prevention, and detection and response, consistent with industry best practices. Our and compliance. Organizations strive to provide the best customer care while maintaining the security, privacy be defined and executed to meet the dynamic and unique demands of the business and its industry. Most

  17. Campus Security Report 1 Campus seCurity

    E-Print Network [OSTI]

    Wilmers, Chris

    Campus Security Report 1 Campus seCurity and Fire saFety report UC Santa Cruz 2010 #12;Campus Security Report 2 UC Santa Cruz Geography ........................................................ 8 Security and Access to Campus Buildings and Grounds ........................................ 8

  18. CWRU awarded grant to build battery for smart grid, renewables New design for iron flow battery would enhance energy and economic security

    E-Print Network [OSTI]

    Rollins, Andrew M.

    from wind turbines and solar panels and supplying energy when wind wanes and the sun sets. This versionCWRU awarded grant to build battery for smart grid, renewables New design for iron flow battery would enhance energy and economic security DECEMBER 3, 2012 BY THEDAILY CLEVELAND -- A Department

  19. MasteringWeb Services Security MasteringWeb Services Security

    E-Print Network [OSTI]

    Preview of MasteringWeb Services Security Preview of MasteringWeb Services Security Konstantin introduction Highlights of the book Web Services security problem XML Security WS-Security Security mechanisms for ASP.NET Web Services Planning and building secure Web Service systems ­ Architectural and policy

  20. CAMPUS SECURITY CARD REQUISITION

    E-Print Network [OSTI]

    CAMPUS SECURITY CARD REQUISITION DEPARTMENT LAST NAME GIVEN NAME(S) SFU ID NUMBER CARD NUMBER CAMPUS SECURITY OFFICE USE ONLY SERVICE CHARGE: ___________________________ DEPOSIT be reported or returned to Campus Security TC 050 (291-5448). CARDHOLDER SIGNATURE DATE: #12;

  1. 9. Driver's Age 13. Driver's Date of Birth 14. Driver's Social Security Number 19. Driver's Telephone

    E-Print Network [OSTI]

    Gering, Jon C.

    of Accident (city, state; if on a highway, give number and nearest community) DRIVER INFORMATION OTHER VEHICLE OR PROPERTY Occupied Unoccupied 17. Driver's Age VEHICLE OPERATED BY UNIVERSITY EMPLOYEE Occupied Unoccupied 8. Driver's Name 16. Driver's Name TRUMAN STATE UNIVERSITY VEHICLE ACCIDENT REPORT NAME AND ADDRESS AREA

  2. Property:Number of Build Out Units Deployed | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I Geothermal PwerPerkins County, Nebraska:PrecourtOid JumpEligSysSizeNbrGeneratingUnitsBuild Out Units

  3. Sensor Networks Challenges for Intelligent Buildings Alberto Eduardo Cerpa

    E-Print Network [OSTI]

    Cerpa, Alberto E.

    , in particular in clutter environments common inside buildings, with many interfering electromagnetic fields security, it is clear that having a large number of sensors in the building that can monitor human movement greater capability, as is leveraged commonly by sensor arrays such as in radar systems or binocular vision

  4. Corrective action investigation plan for Corrective Action Unit Number 423: Building 03-60 Underground Discharge Point, Tonopah Test Range, Nevada

    SciTech Connect (OSTI)

    NONE

    1997-10-27T23:59:59.000Z

    This Corrective Action Investigation Plan (CAIP) contains the environmental sample collection objectives and the criteria for conducting site investigation activities at Corrective Action Unit (CAU) Number 423, the Building 03-60 Underground Discharge Point (UDP), which is located in Area 3 at the Tonopah Test Range (TTR). The TTR, part of the Nellis Air Force Range, is approximately 225 kilometers (140 miles) northwest of Las Vegas, Nevada. CAU Number 423 is comprised of only one Corrective Action Site (CAS) which includes the Building 03-60 UDP and an associated discharge line extending from Building 03-60 to a point approximately 73 meters (240 feet) northwest. The UDP was used between approximately 1965 and 1990 to dispose of waste fluids from the Building 03-60 automotive maintenance shop. It is likely that soils surrounding the UDP have been impacted by oil, grease, cleaning supplies and solvents as well as waste motor oil and other automotive fluids released from the UDP.

  5. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

    2012-01-31T23:59:59.000Z

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or â?? tunnelsâ?ť, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

  6. National Security Science and Technology Initiative: Air Cargo Screening, Final Report for CRADA Number NFE-07-01081

    SciTech Connect (OSTI)

    Bingham, Philip [ORNL] [ORNL; Bush, John [Battelle Memorial Institute] [Battelle Memorial Institute; Bowerman, Biays [Brookhaven National Laboratory] [Brookhaven National Laboratory; Cespedes, Ernesto [Idaho National Laboratory] [Idaho National Laboratory; White, Timothy [Pacific Northwest National Laboratory] [Pacific Northwest National Laboratory

    2004-12-01T23:59:59.000Z

    The non-intrusive inspection (NII) of consolidated air cargo carried on commercial passenger aircraft continues to be a technically challenging, high-priority requirement of the Department of Homeland Security’s Science and Technology Directorate (DHS S&T), the Transportation Security Agency and the Federal Aviation Administration. The goal of deploying a screening system that can reliably and cost-effectively detect explosive threats in consolidated cargo without adversely affecting the flow of commerce will require significant technical advances that will take years to develop. To address this critical National Security need, the Battelle Memorial Institute (Battelle), under a Cooperative Research and Development Agreement (CRADA) with four of its associated US Department of Energy (DOE) National Laboratories (Oak Ridge, Pacific Northwest, Idaho, and Brookhaven), conducted a research and development initiative focused on identifying, evaluating, and integrating technologies for screening consolidated air cargo for the presence of explosive threats. Battelle invested $8.5M of internal research and development funds during fiscal years 2007 through 2009.

  7. BUILDING MANAGEMENT & RESTRICTED ACCESS

    E-Print Network [OSTI]

    Johnston, Daniel

    BUILDING MANAGEMENT & RESTRICTED ACCESS Plan Annex 2014 VIII #12;#12;#12;The University of Texas at Austiniv #12;Building Management & Restricted Access Plan Annex v CONTENTS RECORD OF CHANGES .......................................................................................................15 J. BUILDING SECURITY OPERATIONS RESTRICTED ACCESS PROCEDURES FOR BUILDINGS ON ELECTRONIC ACCESS

  8. Mobile Building Energy Audit and Modeling Tools: Cooperative Research and Development Final Report, CRADA Number CRD-11-00441

    SciTech Connect (OSTI)

    Brackney, L.

    2013-04-01T23:59:59.000Z

    Broadly accessible, low cost, accurate, and easy-to-use energy auditing tools remain out of reach for managers of the aging U.S. building population (over 80% of U.S. commercial buildings are more than 10 years old*). concept3D and NREL's commercial buildings group will work to translate and extend NREL's existing spreadsheet-based energy auditing tool for a browser-friendly and mobile-computing platform. NREL will also work with concept3D to further develop a prototype geometry capture and materials inference tool operable on a smart phone/pad platform. These tools will be developed to interoperate with NREL's Building Component Library and OpenStudio energy modeling platforms, and will be marketed by concept3D to commercial developers, academic institutions and governmental agencies. concept3D is NREL's lead developer and subcontractor of the Building Component Library.

  9. Property Claim Packet Instructions CONTACT UVAPD -security assistance & crime reporting; Facilities Management -building damage and clean up;

    E-Print Network [OSTI]

    Acton, Scott

    , potential mold etc.; LSP/LSA - IT equipment impacted by water/soot. PREVENT FURTHER DAMAGE (e.g. move items; Facilities Management - building damage and clean up; Environmental Health and Safety - hazardous materials) should be used for Non-exempt & Wage University Labor for actual repair. Managerial and exempt labor

  10. Buildings by Name Bldg No Map Grid Func ons & Places Bldg No or Map

    E-Print Network [OSTI]

    #12;Buildings by Name Bldg No Map Grid Func ons & Places Bldg No or Map Grid Bldg No Buildings by Number Map Grid 1320 E San Pasqual (Caltech Y) 56 E4 24-Hour Security 66 1 Brown Gymnasium B5 1350 E San

  11. Building International Emergency Management Systems | National...

    National Nuclear Security Administration (NNSA)

    Building International Emergency Management Systems | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  12. Advanced Load Identification and Management for Buildings: Cooperative Research and Development Final Report, CRADA Number: CRD-11-422

    SciTech Connect (OSTI)

    Gentile-Polese, L.

    2014-05-01T23:59:59.000Z

    The goal of this CRADA work is to support Eaton Innovation Center (Eaton) efforts to develop advanced load identification, management technologies, and solutions to reduce building energy consumption by providing fine granular visibility of energy usage information and safety protection of miscellaneous electric loads (MELs) in commercial and residential buildings. MELs load identification and prediction technology will be employed in a novel 'Smart eOutlet*' to provide critical intelligence and information to improve the capability and functionality of building load analysis and design tools and building power management systems. The work scoped in this CRADA involves the following activities: development and validation of business value proposition for the proposed technologies through voice of customer investigation, market analysis, and third-party objective assessment; development and validation of energy saving impact as well as assessment of environmental and economic benefits; 'smart eOutlet' concept design, prototyping, and validation; field validation of the developed technologies in real building environments. (*Another name denoted as 'Smart Power Strip (SPS)' will be used as an alternative of the name 'Smart eOutlet' for a clearer definition of the product market position in future work.)

  13. UNIT NUMBER:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    193 UNIT NUMBER: 197 UNIT NAME: CONCRETE RUBBLE PILE (30) REGULATORY STATUS: AOC LOCATION: Outside plant security fence, north of the plant on Big Bayou Creek on private property....

  14. Office Buildings - Full Report

    Gasoline and Diesel Fuel Update (EIA)

    1). Table 1. Totals and means of of floorspace, number of workers, and hours of operation for office buildings, 2003 Buildings (thousand) Total Floorspace (million sq. ft.)...

  15. Building Name Street Number Street Prefix Direction Street Name Suffix Street Direction Community 1901 1901 INNOVATION DR VIRGINIA TECH

    E-Print Network [OSTI]

    Buehrer, R. Michael

    Hall 240 KENT ST VIRGINIA TECH Battery House 2507 GLADE RD VIRGINIA TECH Battery House 677 RESEARCH And Laying House 2507 GLADE RD VIRGINIA TECH Brick Building at Airport 1601 RESEARCH CENTER DR VIRGINIA TECH Brodie Hall 310 ALUMNI MALL VIRGINIA TECH Brooder And Hatchery 2507 GLADE RD VIRGINIA TECH Brooder House

  16. Critical Simulation Based Evaluation of Thermally Activated Building Systems (TABS) Design Models

    E-Print Network [OSTI]

    Basu, Chandrayee

    2012-01-01T23:59:59.000Z

    supply temperature Zero energy buildings vi MS Thesis, Dept.marketable zero-energy commercial buildings (ZEBs) by 2025securing net zero energy commercial buildings is development

  17. KNOWLEDGE: Building, Securing, Sharing & Applying

    E-Print Network [OSTI]

    Non-intrusive data gathering techniques Rutgers University - Lead Institution Alcatel-Lucent Bell Labs

  18. Office of Headquarters Personnel Security Operations

    Broader source: Energy.gov [DOE]

    The Office of Headquarters Personnel Security manages and implements safeguards and security access authorization functions for DOE Headquarters and manages the Personal Identity Verification (PIV) process for Headquarters as mandated by Homeland Security Presidential Directive Number 12 (HSPD-12).

  19. Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

  20. The role of a security strategy is to align company security and business goals, provide

    E-Print Network [OSTI]

    Fisher, Kathleen

    , and methodologies to assist you in building a complete unified information security program or individual elements's information security program meets its requirements across the board, it is vital to have one enterprise security strategy and one information security framework. Putting in a solid foundational program

  1. Special Building Renovations

    Broader source: Energy.gov [DOE]

    A number of building types have specific energy uses and needs, and as such the renewable opportunities may be different from a typical office building. This section briefly discusses the following...

  2. Forrestal Security and Safety Procedures

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1983-02-02T23:59:59.000Z

    To establish uniform procedures for the security and safety of the Forrestal Building and to inform all personnel of precautionary measures. This directive does not cancel another directive. Canceled by DOE N 251.11.

  3. Homeland Security Issues for Facilities

    E-Print Network [OSTI]

    McClure, J. D.; Fisher, D.; Fenter, T.

    2004-01-01T23:59:59.000Z

    more aware of safety, security, and protecting property and people should similar incidents occur in the future. The initial steps in facility protection are identifying potential threats and evaluating the condition of existing building infrastructure...

  4. Bradshaw Construction New Office Building

    High Performance Buildings Database

    Eldersburg, MD The New Office Building is part of an effort by Bradshaw Construction Corporation to combine office, off-site shop buildings and off-site storage yards at one consolidated location. The new site, located off Maryland Route 26, shall provide space for an office building and parking; and secured shop building and storage yard. The New Office Building Project has achieved LEED Silver certification. The office building is designed as a free standing building of approximately 8,200 square feet in area, one story in height.

  5. IBM Internet Security Systems Threat Insight Monthly

    E-Print Network [OSTI]

    the Report 01 Keylogging, by the numbers 02 Securing the Secure Shell ­ Advanced user authentication and key Page 1 #12;Keylogging, by the numbers Introduction During the course of malware analysis, especially

  6. What Programmers Should Know About Security

    E-Print Network [OSTI]

    Cantlon, Jessica F.

    What Programmers Should Know About Security University of Rochester Matthew Dalton, CISSP #12;Goals Brief Overview of Programming Practices Major Pitfalls in Secure Programming Examples (if are taken from "Building Secure Software" by John Viega & Gary McGraw. I would suggest buying it if you

  7. Building a Sustainable Future FACILITIES & OPERATIONS

    E-Print Network [OSTI]

    Building a Sustainable Future FACILITIES & OPERATIONS #12;A Laboratory on a Mission ...to meet: The Environmental Technology Building and National Security Building house more than 650 staff members. #12;Pacific capacity "The Facilities & Operations organization is dedicated to safely and sustainably building

  8. Corporate Security and Conflict Outcomes 

    E-Print Network [OSTI]

    Tkach, Benjamin K

    2013-10-21T23:59:59.000Z

    militaries (Avant 2000). Existing research has shown a steady increase in the number and employment of private security firms (PSFs) over the last five decades due to expansion of global market demand for private security (Avant 2005; Dunigan 2011; Singer... prominent role in international aviation security (Abrahamsen and Williams 2011). Because PSFs are based largely on corporate profit motivations, contract fulfillment and reputation are critical for firms to secure market share. The international market...

  9. Cyber Security

    Energy Savers [EERE]

    Associate CIO for Cyber Security (IM-30) Rod Turk Deputy Associate CIO for Cyber Security (IM-30) Michael Maraya Incident Management Division (IM-32) Rob Ciochon Director Policy,...

  10. Cooperative monitoring of regional security agreements

    SciTech Connect (OSTI)

    Pregenzer, A.L.; Vannoni, M.; Biringer, K.L. [Sandia National Labs., Albuquerque, NM (United States). Nonproliferation and Arms Control Analysis Dept.

    1996-11-01T23:59:59.000Z

    This paper argues that cooperative monitoring plays a critical role in the implementation of regional security agreements and confidence building measures. A framework for developing cooperative monitoring options is proposed and several possibilities for relating bilateral and regional monitoring systems to international monitoring systems are discussed. Three bilateral or regional agreements are analyzed briefly to illustrate different possibilities. These examples illustrate that the relationship of regional or bilateral arms control or security agreements to international agreements depends on a number of factors: the overlap of provisions between regional and international agreements; the degree of interest in a regional agreement among the international community; efficiency in implementing the agreement; and numerous political considerations. Given the importance of regional security to the international community, regions should be encouraged to develop their own infrastructure for implementing regional arms control and other security agreements. A regional infrastructure need not preclude participation in an international regime. On the contrary, establishing regional institutions for arms control and nonproliferation could result in more proactive participation of regional parties in developing solutions for regional and international problems, thereby strengthening existing and future international regimes. Possible first steps for strengthening regional infrastructures are identified and potential technical requirements are discussed.

  11. COMPUTER SECURITY EDUCATION Past, Present and Future

    E-Print Network [OSTI]

    information. Computer security researchers and practitioners were few in number, worked primarilyCOMPUTER SECURITY EDUCATION Past, Present and Future Carol Taylor, Rose Shumba, and James Walden: This paper presents an overview of computer security education in academia. We examine security education

  12. ITL BULLETIN FOR AUGUST 2010 ASSESSING THE EFFECTIVENESS OF SECURITY CONTROLS IN FEDERAL

    E-Print Network [OSTI]

    discusses the process for assessing the security controls in organizational information systems that are implemented in federal information systems. The selection and assessment of appropriate security controls Controls in Federal Information Systems and Organizations: Building Effective Security Assessment Plans

  13. Security Asset Elicitation for Collaborative Models Maria Vasilevskaya1

    E-Print Network [OSTI]

    Security Asset Elicitation for Collaborative Models Maria Vasilevskaya1 maria, Norway ABSTRACT Building secure systems is a difficult job for most engineers since it requires in-depth understanding of security aspects. This task, however, can be assisted by capturing security knowledge

  14. Improving web site security with data flow management

    E-Print Network [OSTI]

    Yip, Alexander Siumann, 1979-

    2009-01-01T23:59:59.000Z

    This dissertation describes two systems, RESIN and BFLow, whose goal is to help Web developers build more secure Web sites. RESIN and BFLOW use data flow management to help reduce the security risks of using buggy or ...

  15. Information Security: Coordination of Federal Cyber Security...

    Office of Environmental Management (EM)

    Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

  16. 3-100.1 Building Evacuation 1 Building Evacuation

    E-Print Network [OSTI]

    Glebov, Leon

    3-100.1 Building Evacuation 1 SUBJECT: Building Evacuation Effective Date: 10-20-10 Policy Number and Safety APPLICABILITY/ACCOUNTABILITY: This policy applies to all individuals in all buildings on all University of Central Florida campuses. BACKGROUND INFORMATION: University buildings occasionally need

  17. Commercial Buildings Characteristics, 1992

    SciTech Connect (OSTI)

    Not Available

    1994-04-29T23:59:59.000Z

    Commercial Buildings Characteristics 1992 presents statistics about the number, type, and size of commercial buildings in the United States as well as their energy-related characteristics. These data are collected in the Commercial Buildings Energy Consumption Survey (CBECS), a national survey of buildings in the commercial sector. The 1992 CBECS is the fifth in a series conducted since 1979 by the Energy Information Administration. Approximately 6,600 commercial buildings were surveyed, representing the characteristics and energy consumption of 4.8 million commercial buildings and 67.9 billion square feet of commercial floorspace nationwide. Overall, the amount of commercial floorspace in the United States increased an average of 2.4 percent annually between 1989 and 1992, while the number of commercial buildings increased an average of 2.0 percent annually.

  18. GridStat – Cyber Security and Regional Deployment Project Report

    SciTech Connect (OSTI)

    Clements, Samuel L.

    2009-02-18T23:59:59.000Z

    GridStat is a developing communication technology to provide real-time data delivery services to the electric power grid. It is being developed in a collaborative effort between the Electrical Power Engineering and Distributed Computing Science Departments at Washington State University. Improving the cyber security of GridStat was the principle focus of this project. A regional network was established to test GridStat’s cyber security mechanisms in a realistic environment. The network consists of nodes at Pacific Northwest National Laboratory, Idaho National Laboratory, and Washington State University. Idaho National Laboratory (INL) was tasked with performing the security assessment, the results of which detailed a number or easily resolvable and previously unknown issues, as well as a number of difficult and previously known issues. Going forward we recommend additional development prior to commercialization of GridStat. The development plan is structured into three domains: Core Development, Cyber Security and Pilot Projects. Each domain contains a number of phased subtasks that build upon each other to increase the robustness and maturity of GridStat.

  19. Building Name Room Support By

    E-Print Network [OSTI]

    Mohaghegh, Shahab

    Building Name Room Technology Classroom? Technology Support By: Phone Number: Contact Name: Agricultural Sciences Building G29 Standard iDC 304-293-2832 n/a Agricultural Sciences Building G31 Standard iDC 304-293-2832 n/a Agricultural Sciences Building G101 Standard iDC 304-293-2832 n/a Agricultural

  20. Building Stones

    E-Print Network [OSTI]

    2012-01-01T23:59:59.000Z

    3). Photographs by the author. Building Stones, Harrell, UEEOxford Short Citation: Harrell, 2012, Building Stones. UEE.Harrell, James A. , 2012, Building Stones. In Willeke

  1. CONVERGING REDUNDANT SENSOR NETWORK INFORMATION FOR IMPROVED BUILDING CONTROL

    SciTech Connect (OSTI)

    Dale K. Tiller; Gregor P. Henze

    2004-11-01T23:59:59.000Z

    Knowing how many people occupy a building, and where they are located, is a key component of building energy management and security. Commercial, industrial and residential buildings often incorporate systems used to determine occupancy, however, current sensor technology and control algorithms limit the effectiveness of both energy management and security systems. This topical report describes results from the first phase of a project to design, implement, validate, and prototype new technologies to monitor occupancy, control indoor environment services, and promote security in buildings. Phase I of the project focused on instrumentation and data collection. In this project phase a new occupancy detection system was developed, commissioned and installed in a sample of private offices and open-plan office workstations. Data acquisition systems were developed and deployed to collect data on space occupancy profiles. Analysis tools based on Bayesian probability theory were applied to the occupancy data generated by the sensor network. The inference of primary importance is a probability distribution over the number of occupants and their locations in a building, given past and present sensor measurements. Inferences were computed for occupancy and its temporal persistence in individual offices as well as the persistence of sensor status. The raw sensor data were also used to calibrate the sensor belief network, including the occupancy transition matrix used in the Markov model, sensor sensitivity, and sensor failure models. This study shows that the belief network framework can be applied to the analysis of data streams from sensor networks, offering significant benefits to building operation compared to current practice.

  2. Riverside County- Sustainable Building Policy

    Broader source: Energy.gov [DOE]

    In February 2009, the County of Riverside Board of Supervisors adopted Policy Number H-29, creating the Sustainable Building Policy. The Policy requires that all new county building projects...

  3. RCRA Permit for a Hazardous Waste Management Facility Permit Number NEV HW0101 Annual Summary/Waste Minimization Report Calendar Year 2012, Nevada National Security Site, Nevada

    SciTech Connect (OSTI)

    Arnold, P. M.

    2013-02-21T23:59:59.000Z

    This report summarizes the U.S. Environmental Protection Agency (EPA) identification number of each generator from which the Permittee received a waste stream, a description and quantity of each waste stream in tons and cubic feet received at the facility, the method of treatment, storage, and/or disposal for each waste stream, a description of the waste minimization efforts undertaken, a description of the changes in volume and toxicity of waste actually received, any unusual occurrences, and the results of tank integrity assessments. This Annual Summary/Waste Minimization Report is prepared in accordance with Section 2.13.3 of Permit Number NEV HW0101, issued 10/17/10.

  4. The New Mexico Building and Construction Trades Council and Los...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    LANL sign labor agreements September 21, 2012 Unions, LANL sign labor agreements The New Mexico Building and Construction Trades Council and Los Alamos National Security LLC, have...

  5. UNIT NUMBER SWMU 175 UNIT NAME: Concrete Rubble Pile (28...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    75 UNIT NAME: Concrete Rubble Pile (28) REGULATORY STATUS: AOC LOCATION: Outside Security Fence, East of C-360 Building in KPDES Outfall Ditch 002. APPROXIMATE DIMENSIONS: 400 ft...

  6. OFFICE OF STUDENT FINANCIAL AID 0102 Lee Building

    E-Print Network [OSTI]

    Milchberg, Howard

    11PASSET OFFICE OF STUDENT FINANCIAL AID 0102 Lee Building College Park, Maryland 20742-5145 TEL, other securities. $ $ Business and Investment Farm. Include the market value of land, buildings

  7. FORESTRY BUILDING: BUILDING EMERGENCY PLAN

    E-Print Network [OSTI]

    FORESTRY BUILDING: BUILDING EMERGENCY PLAN Date Adopted: August 18, 2009 Date Revised June 17, 2013 Prepared By: Diana Evans and Jennifer Meyer #12;PURDUE UNIVERSITY BUILDING EMERGENCY PLAN VERSION 3 2 Table Suspension or Campus Closure SECTION 3: BUILDING INFORMATION 3.1 Building Deputy/Alternate Building Deputy

  8. BUILDING NAME HEYDON-LAURENCE BUILDING

    E-Print Network [OSTI]

    Viglas, Anastasios

    BUILDING NAME HEYDON-LAURENCE BUILDING PHARMACY AND BANK BUILDING JOHN WOOLEY BUILDING OLD TEARCHER'S BUILDING PHYSICS BUILDING BAXTER'S LODGE INSTITUTE BUILDING CONSERVATION WORKS R.D.WATT BUILDING MACLEAY BUILDING THE QUARANGLE BADHAM BUILDING J.D. STEWART BUILDING BLACKBURN BUILDING MADSEN BUILDING STORE

  9. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14T23:59:59.000Z

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  10. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15T23:59:59.000Z

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  11. Information Security and Computer Systems: An Integrated Approach

    E-Print Network [OSTI]

    Holliday, Mark A.

    Information Security and Computer Systems: An Integrated Approach Mark A. Holliday Dept curriculum we are developing an Information Security option. Our approach highlights the many topics in information security that build upon concepts the students will already have seen in their computer systems

  12. Status of the National Security Workforce

    SciTech Connect (OSTI)

    None

    2008-03-31T23:59:59.000Z

    This report documents the status of the national security workforce as part of the National Security Preparedness Project, being performed by the Arrowhead Center of New Mexico State University under a DOE/NNSA grant. This report includes an assessment of the current workforce situation. The national security workforce is an important component of national security for our country. With the increase of global threats of terrorism, this workforce is being called upon more frequently. This has resulted in the need for an increasing number of national security personnel. It is imperative to attract and retain a skilled and competitive national security workforce.

  13. Buildings of the Future

    Broader source: Energy.gov [DOE]

    The U.S. Department of Energy (DOE) and the Pacific Northwest National Laboratory are developing a vision for future buildings—at least one hundred years from today—based on the collective views of thought leaders. As part of this effort, we will explore technology and demographic trends that could revolutionize the built environment across energy, water, environment, resilient design, health, security, and productivity.

  14. Embedded Controllers Control. Connectivity. Security.

    E-Print Network [OSTI]

    Grantner, Janos L.

    Application Summary MCF5282 HVAC and Security Control Panel Application Summary MCF5307 Music Media Player controllers to help get their products to market quickly and cost-effectively. Aggressive price of continuous innovative technology--provides customers with the opportunity to build market share

  15. Around Buildings

    E-Print Network [OSTI]

    Treib, Marc

    1987-01-01T23:59:59.000Z

    Around Buildings W h y startw i t h buildings and w o r k o u t wa r d ? For one, buildings are difficult t o a v o i d these

  16. BUILDING INSPECTION Building, Infrastructure, Transportation

    E-Print Network [OSTI]

    BUILDING INSPECTION Building, Infrastructure, Transportation City of Redwood City 1017 Middlefield Sacramento, Ca 95814-5514 Re: Green Building Ordinance and the Building Energy Efficiency Standards Per of Redwood City enforce the current Title 24 Building Energy Efficiency Standards as part

  17. Cooperative monitoring of regional security agreements

    SciTech Connect (OSTI)

    Pregenzer, A.L.; Vannoni, M.; Biringer, K.L.

    1995-08-01T23:59:59.000Z

    This paper argues that cooperative monitoring plays a critical role in the implementation of regional security agreements and confidence building measures. A framework for developing cooperative monitoring options is proposed and several possibilities for relating bilateral and regional monitoring systems to international monitoring systems are discussed. Three bilateral or regional agreements are analyzed briefly to illustrate different possibilities: (1) the demilitarization of the Sinai region between Israel and Egypt in the 1970s; (2) the 1991 quadripartite agreement for monitoring nuclear facilities among Brazil, Argentina, The Argentine-Brazilian Agency for Accounting and Control of Nuclear Materials and the International Atomic Energy Agency; and (3) a bilateral Open Skies agreement between Hungary and Romania in 1991. These examples illustrate that the relationship of regional or bilateral arms control or security agreements to international agreements depends on a number of factors: the overlap of provisions between regional and international agreements; the degree of interest in a regional agreement among the international community; efficiency in implementing the agreement; and numerous political considerations.Given the importance of regional security to the international community, regions should be encouraged to develop their own infrastructure for implementing regional arms control and other security agreements. A regional infrastructure need not preclude participation in an international regime. On the contrary, establishing regional institutions for arms control and nonproliferation could result in more proactive participation of regional parties in developing solutions for regional and international problems, thereby strengthening existing and future international regimes. Possible first steps for strengthening regional infrastructures are identified and potential technical requirements are discussed.

  18. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  19. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    Information Security Group IY5512 Computer Security Part 7b: Windows securityPart 7b: Windows security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security Group) of Windows machines. 2 Information Security Group Objectives II · Focus on Active Directory, authentication

  20. Moving Toward Zero Energy Buildings 

    E-Print Network [OSTI]

    Ginsberg, M.

    2008-01-01T23:59:59.000Z

    of Directors U.S. Department of Energy 1000 Independence Avenue, SW Washington, DC 20585 00 12 02/ 5 86 - 12 11 mark.ginsberg@ee.doe.gov Moving Toward Zero Energy Buildings When I began discussing the idea of Zero Energy Buildings in the mid...-1990s, I received sceptical looks and laughter. Today, we are seeing the concept blossom into a large number of buildings throughout the world that are net zero fossil fuel buildings. I use the term zero energy buildings to mean ?buildings...

  1. Moving Toward Zero Energy Buildings

    E-Print Network [OSTI]

    Ginsberg, M.

    2008-01-01T23:59:59.000Z

    -1990s, I received sceptical looks and laughter. Today, we are seeing the concept blossom into a large number of buildings throughout the world that are net zero fossil fuel buildings. I use the term zero energy buildings to mean ?buildings... of Directors U.S. Department of Energy 1000 Independence Avenue, SW Washington, DC 20585 00 12 02/ 5 86 - 12 11 mark.ginsberg@ee.doe.gov Moving Toward Zero Energy Buildings When I began discussing the idea of Zero Energy Buildings in the mid...

  2. On Building Secure SCADA Systems using Security Eduardo B. Fernandez

    E-Print Network [OSTI]

    Wu, Jie

    power generation plants and oil refineries often involve components that are geographically distributed. To continuously monitor and control the different sections of the plant in order to ensure its appropriate the concepts of SCADA systems, analyze the threats and vulnerabilities of these systems, and illustrate

  3. Transportation Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

  4. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08T23:59:59.000Z

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  5. Review of a design-build option

    SciTech Connect (OSTI)

    NONE

    1999-06-01T23:59:59.000Z

    Development of the Nonproliferation and International Security Center (NISC) project was started originally in 1996. The NISC project is to provide 163,375 square feet of laboratory and office space for 465 technical and support staff, The total estimated cost for the facility is about sixty million dollars. DOE has a number of policies and procedures related to the authorization and construction of projects. These policies and procedures generally favor the Design, Bid and Build process. The process include the following key items: (1) Authorization to develop a Conceptual Design Report (CDR); (2) Development of the CDR; (3) Validation of the CDR; (4) Authorization and funding to design the facility; (5) Validation of the design; and (6) Authorization and funding to build the facility. This approach placed the project management team in the position of resolving conflicts between the A/E and the contractor. The project management often also has to resolve conflicts between the facility uses and the A/E and contractor. These activities often distracted from the project management`s main objectives of controlling costs, schedule, and quality assurance. The generally accepted definition of Design-Build is that it is a very condensed process ruled by a single contract between the owner and the design-build team (firm) from the beginning of the project. The main advantages to the design-build approach are single point of responsibility, accurate identification of project costs, faster delivery of facility, improved risk management, and better quality control. Each of these points will be discussed later as related to the NISC project at Los Alamos. Many of these points can be applied to other projects as well.

  6. Security Checklist A publication of the Cornell University Office of Fraternities, Sororities & Independent Living

    E-Print Network [OSTI]

    Keinan, Alon

    the outside? · Can windows be left open for ventilation be secured? · Are window air-conditioners secured from the landlord have a published policy about issuing and replacing keys? · Does the building have a doorman

  7. Alpha buildings | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProducts (VAP) VAP7-0973ManagedStrategic|AljazeeraO S o'ware a nd Dbuildings

  8. Operations building | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's Possible for RenewableSpeeding accessSpeedingOctoberResearchOpen→

  9. Security Specialist

    Broader source: Energy.gov [DOE]

    The position is located in the Office of Environmental Management (EM),Office of Safeguards, Security and Emergency Preparedness (EM-44). The mission of EM-44 is to develop and oversee the...

  10. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  11. US Army Corps of Engineers BUILDING STRONG

    E-Print Network [OSTI]

    US Army Corps of Engineers

    resources challenges: · Lack of a national water resources Vision to elevate water infrastructure Securing the Nation's Future Through Water Click link to view video #12;BUILDING STRONG® National Water Demand for Water Flood Risk Water Quality Persistent Conflict Energy Environmental Values 3 #12;BUILDING

  12. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27T23:59:59.000Z

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  13. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20T23:59:59.000Z

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  14. Departmental Business Instrument Numbering System

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-12-05T23:59:59.000Z

    To prescribe procedures for assigning identifying numbers to all Department of Energy (DOE), including the National Nuclear Security Administration, business instruments. Cancels DOE 1331.2B. Canceled by DOE O 540.1A.

  15. Departmental Business Instrument Numbering System

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-01-27T23:59:59.000Z

    The Order prescribes the procedures for assigning identifying numbers to all Department of Energy (DOE) and National Nuclear Security Administration (NNSA) business instruments. Cancels DOE O 540.1. Canceled by DOE O 540.1B.

  16. Taxation and Social Security

    E-Print Network [OSTI]

    Kaplow, Louis

    2006-01-01T23:59:59.000Z

    Re: Taxation and Social Security Attached is draft chapter11 TAXATION AND SOCIAL SECURITY A substantial fraction ofaspects of social security schemes in a setting in which

  17. Security and Elections

    E-Print Network [OSTI]

    Bishop, Matt; Peisert, Sean

    2012-01-01T23:59:59.000Z

    World Conf. Information Security Education, 2007, pp. 17–24;Security andElections IEEE Security & Privacy, 10(5):64–67, Sept. -

  18. CAMPUS SECURITY REPORT 2009

    E-Print Network [OSTI]

    CAMPUS SECURITY REPORT 2009 San Francisco State University University Police Department 1600 & Procedure Concerning Security, Access & Maintenance of Campus Facilities & Weapons Policies........................................................... 6 g. Safety & Security

  19. Building America

    SciTech Connect (OSTI)

    Brad Oberg

    2010-12-31T23:59:59.000Z

    IBACOS researched the constructability and viability issues of using high performance windows as one component of a larger approach to building houses that achieve the Building America 70% energy savings target.

  20. Building technologies

    SciTech Connect (OSTI)

    Jackson, Roderick

    2014-07-14T23:59:59.000Z

    After growing up on construction sites, Roderick Jackson is now helping to make buildings nationwide far more energy efficient.

  1. Building technologies

    ScienceCinema (OSTI)

    Jackson, Roderick

    2014-07-15T23:59:59.000Z

    After growing up on construction sites, Roderick Jackson is now helping to make buildings nationwide far more energy efficient.

  2. Beardmore Building

    High Performance Buildings Database

    Priest River, ID Originally built in 1922 by Charles Beardmore, the building housed offices, mercantile shops, a ballroom and a theater. After decades of neglect under outside ownership, Brian Runberg, an architect and great-grandson of Charles Beardmore, purchased the building in 2006 and began an extensive whole building historic restoration.

  3. Building America Residential Buildings Energy Efficiency Meeting...

    Energy Savers [EERE]

    Building America Residential Buildings Energy Efficiency Meeting: July 2010 Building America Residential Buildings Energy Efficiency Meeting: July 2010 On this page, you may link...

  4. The long and winding road of state building

    E-Print Network [OSTI]

    Richner, Heinz

    Chapter 15 The long and winding road of state building Sagar Raj Sharma1 1. Context Post and services, including security. In this book, we have attempted to view state-building as essentially with various such aspects of state-building in today's post-conflict Nepal. The first two chapters have dealt

  5. A Data and Knowledge Management System for Intelligent Buildings

    E-Print Network [OSTI]

    Hong, J.; Chen, Z.; Li, H.; Xu, Q.

    2006-01-01T23:59:59.000Z

    words: Intelligent building; Assessment; Methodology; Information system 1. INTRODUCTION It is the development and application of modern technologies in the areas of information, communication, materials, and machinery in the construction.... According to our literature review [12], key technologies that support IBs include sustainable architecture, building structure control, building facility control, computer and network, information and communication, safety and security control...

  6. Tag: Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Tag: Security Displaying 1 - 6 of 6... Category: Security Sheltering in Place If you are advised to shelter-in-place by local news or our website, please follow these...

  7. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29T23:59:59.000Z

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  8. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  9. Security Rulemaking

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergy SmallImplementingSecurity SymposiumSecuring the Nation's509Department2

  10. Table B6. Building Size, Number of Buildings, 1999

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are nowTotal" (Percent) Type: Sulfur Content API GravityDakota" "Fuel, quality", 2013,Iowa"Dakota" ,"FullWestQuantity of2".9. Percent4,657

  11. Table B6. Building Size, Number of Buildings, 1999

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are nowTotal" (Percent) Type: Sulfur Content API GravityDakota" "Fuel, quality", 2013,Iowa"Dakota" ,"FullWestQuantity of2".9. Percent4,657B6.

  12. Faculty Information Security Guide

    E-Print Network [OSTI]

    Myers, Lawrence C.

    Faculty Information Security Guide Dartmouth Your information is vitally important to your teaching protect your information. THE DARTMOUTH INFORMATION SECURITY COMMITTEE The Dartmouth Information Security Committee (DISC) meets monthly to assess vulnerabilities of information security, and to develop and revise

  13. SELECTING INFORMATION TECHNOLOGY SECURITY

    E-Print Network [OSTI]

    April 2004 SELECTING INFORMATION TECHNOLOGY SECURITY PRODUCTS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Information technology security prod ucts are essential to better secure infor mation technology (IT) systems

  14. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    FROM: SUBJECT: USIUK Memorandum of Understanding between National Nuclear Security Administration's (NNSA) Associate Administrator for Defense Nuclear Security (AADNS)...

  15. FOILFEST :community enabled security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

    2005-09-01T23:59:59.000Z

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

  16. Hungary-Employment Impacts of a Large-Scale Deep Building Retrofit...

    Open Energy Info (EERE)

    buildings - beyond its other significant benefits such as reducing or eliminating fuel poverty and improving energy security - is expected to have a consistent impact on...

  17. Design and Operation of an Open, Interoperable Automated Demand Response Infrastructure for Commercial Buildings

    E-Print Network [OSTI]

    Piette, Mary Ann

    2010-01-01T23:59:59.000Z

    response, automation, commercial, industrial buildings, peakautomation system design. Auto-DR for commercial and industrialautomation server renamed as the DRAS. This server was operated at a secure industrial

  18. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27T23:59:59.000Z

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  19. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29T23:59:59.000Z

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Admin Chg 2, dated 5-15-15, cancels Admin Chg 1.

  20. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18T23:59:59.000Z

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  1. Climate Change and National Security

    SciTech Connect (OSTI)

    Malone, Elizabeth L.

    2013-02-01T23:59:59.000Z

    Climate change is increasingly recognized as having national security implications, which has prompted dialogue between the climate change and national security communities – with resultant advantages and differences. Climate change research has proven useful to the national security community sponsors in several ways. It has opened security discussions to consider climate as well as political factors in studies of the future. It has encouraged factoring in the stresses placed on societies by climate changes (of any kind) to help assess the potential for state stability. And it has shown that, changes such as increased heat, more intense storms, longer periods without rain, and earlier spring onset call for building climate resilience as part of building stability. For the climate change research community, studies from a national security point of view have revealed research lacunae, for example, such as the lack of usable migration studies. This has also pushed the research community to consider second- and third-order impacts of climate change, such as migration and state stability, which broadens discussion of future impacts beyond temperature increases, severe storms, and sea level rise; and affirms the importance of governance in responding to these changes. The increasing emphasis in climate change science toward research in vulnerability, resilience, and adaptation also frames what the intelligence and defense communities need to know, including where there are dependencies and weaknesses that may allow climate change impacts to result in security threats and where social and economic interventions can prevent climate change impacts and other stressors from resulting in social and political instability or collapse.

  2. Security challenges and opportunities in adaptive and reconfigurable hardware

    E-Print Network [OSTI]

    Costan, Victor Marius

    We present a novel approach to building hardware support for providing strong security guarantees for computations running in the cloud (shared hardware in massive data centers), while maintaining the high performance and ...

  3. Climate Change and National Security | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Climate Change and National Security May 4, 2015 10:00AM to 11:00AM Presenter Brigadier General Stephen A. Cheney, USMC (Ret.) Location Building 203 Type Meeting Argonne employees...

  4. Building guide : how to build Xyce from source code.

    SciTech Connect (OSTI)

    Keiter, Eric Richard; Russo, Thomas V.; Schiek, Richard Louis; Sholander, Peter E.; Thornquist, Heidi K.; Mei, Ting; Verley, Jason C.

    2013-08-01T23:59:59.000Z

    While Xyce uses the Autoconf and Automake system to configure builds, it is often necessary to perform more than the customary %E2%80%9C./configure%E2%80%9D builds many open source users have come to expect. This document describes the steps needed to get Xyce built on a number of common platforms.

  5. Building Stones

    E-Print Network [OSTI]

    2012-01-01T23:59:59.000Z

    was no good source of local building stone, rock was usuallyrock-cut shrines and especially tombs, and these are the sources

  6. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  7. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  8. Security Procedures Caltech Campus Security Dispatch

    E-Print Network [OSTI]

    Goddard III, William A.

    Security Procedures Caltech Campus Security Dispatch: 5000 (from any Caltech phone) or (626) 395-5000 (from any phone) When emergencies arise, contact Caltech Campus Security MEDICAL If someone experiences a medical emergency: · Remain calm · Notify Campus Security Dispatch · Do NOT move victim EARTHQUAKE When

  9. Security rules versus Security properties Mathieu Jaume

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Security rules versus Security properties Mathieu Jaume SPI ­ LIP6 ­ University Pierre & Marie components of security policies can be expressed, and we identify their role in the de- scription of a policy, of a system and of a secure system. In this setting, we formally describe two approaches to define policies

  10. Using Building Commissioning to Improve Performance in State Buildings

    E-Print Network [OSTI]

    Haasl, T.; Wilkinson, R.

    1998-01-01T23:59:59.000Z

    Using the commissioning process, states are beginning to improve and optimize their existing building stock as well as ensure that their new construction projects perform according to design. This paper reports on the progress a number of states...

  11. Fire in Buildings 

    E-Print Network [OSTI]

    Shorter, G.

    During the lifetime of any building in Canada it is probable that one or more "unwanted" fires will occur. "Fire Loss in Canada, 1959," the report of the Dominion Fire Commissioner, states that for the period 1950-1959 the average number of reported...

  12. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Energy Savers [EERE]

    92: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System...

  13. Using Operational Security (OPSEC) to Support a Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

  14. V-186: Drupal Login Security Module Security Bypass and Denial...

    Office of Environmental Management (EM)

    186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability V-186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability June...

  15. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W. (Albuquerque, NM)

    1985-01-01T23:59:59.000Z

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  16. Sandia Energy - Installation Energy Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Installation Energy Security Home Stationary Power Grid Modernization Resilient Electric Infrastructures Military Installation Energy Security Installation Energy SecurityTara...

  17. Command and Control during Security Incidents/Emergencies

    SciTech Connect (OSTI)

    Knipper, W. [NSTec

    2013-10-16T23:59:59.000Z

    This presentation builds on our response to events that pose, or have the potential to pose, a serious security or law enforcement risk and must be responded to and controlled in a clear a decisive fashion. We will examine some common concepts in the command and control of security-centric events.

  18. Better Buildings

    E-Print Network [OSTI]

    Neukomm, M.

    2012-01-01T23:59:59.000Z

    efficiency as top priority energy resource Revolutionary change in market Robust energy efficiency industry Prime the market for new technology Better Buildings Challenge Goals Make commercial & industrial buildings 20% more efficient by 2020... opportunities for energy efficiency 2 Great opportunities in the residential, commercial and industrial sectors 20% + savings is average Other benefits: Jobs, Environment, Competitiveness But persistent barriers exist?? ?Energy efficiency...

  19. Weekly Security Incident Log Period of Aug 12 -Aug 18, 2013

    E-Print Network [OSTI]

    2013-001248 THOMPSON ROAD Gas leak Security , Toronto Fire, Toronto Police, and Occupational Health and Safety responded to a report of a natural gas leak in the area of the Life Science BuildingWeekly Security Incident Log Period of Aug 12 - Aug 18, 2013 Incident No. Reported Date Building

  20. Weekly Security Incident Log Period of Apr 29 -May 5, 2013

    E-Print Network [OSTI]

    2013-000845 YORK LANES RETAIL Gas leak Security, Toronto Fire and Enbridge Gas responded to a report of a natural gas odour in the building. The source of the odour was located in a restaurant kitchen. EnbridgeWeekly Security Incident Log Period of Apr 29 - May 5, 2013 Incident No. Reported Date Building

  1. UNIT NUMBER:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    10 feet wide by 30 feet long FUNCTION: Provide cooling water for computer systems and HVAC systems various plant buildings. OPERATIONAL STATUS: Active DATES OPERATED: 1953 to...

  2. A number of organizations,

    E-Print Network [OSTI]

    installed solar electric systems on a number of the city's buildings, including the Chicago Center for Green Technology shown here. CityofChicago Aggregated Purchasing--A Clean Energy Strategy SOLAR TODAY Aggregated Purchasing--A Clean Energy Strategy by Lori A. Bird and Edward A. Holt #12;November/December 2002 35 Power

  3. Fact Sheet: Better Buildings Residential Network | Department...

    Broader source: Energy.gov (indexed) [DOE]

    Fact Sheet: Better Buildings Residential Network, increasing the number of American Homes that are energy efficient. doebbrnfactsheet.pdf More Documents & Publications Fact Sheet...

  4. Safety and Security Fact Sheet York University March 2014

    E-Print Network [OSTI]

    ) and are empowered to effect a citizen's power of arrest where circumstances warrant. · Current number of Security Resolution, Sport York, Security Services, Sexual Assault Survivors' Support Line & Leadership (SASSL, Security Services, Office of the Secretariat & General Counsel, Sexual Assault Survivors' Support Line

  5. *Sandia National Laboratories is Hiring Computer Scientists!* Do you want to be part of an exceptional team building cuttingedge

    E-Print Network [OSTI]

    Plotkin, Joshua B.

    ? At Sandia National Laboratories, we build firstofakind information systems for compelling national security employ cuttingedge technology to produce critical national security systems. The work exemplifies task planning and scheduling * command and control * data acquisition, processing, and exploitation

  6. Building energy calculator : a design tool for energy analysis of residential buildings in Developing countries

    E-Print Network [OSTI]

    Smith, Jonathan Y. (Jonathan York), 1979-

    2004-01-01T23:59:59.000Z

    Buildings are one of the world's largest consumers of energy, yet measures to reduce energy consumption are often ignored during the building design process. In developing countries, enormous numbers of new residential ...

  7. Weekly Security Incident Log Period of Feb 6 -Feb 12, 2012

    E-Print Network [OSTI]

    Gas leak Security and Toronto Fire responded to a report of a natural gas odour in B-wing. TorontoWeekly Security Incident Log Period of Feb 6 - Feb 12, 2012 Incident No. Reported Date Building\\Const. Security, York Fire Prevention and Toronto Fire responded to a fire alarm. The cause of the alarm

  8. Weekly Security Incident Log Period of May 14 -May 20, 2012

    E-Print Network [OSTI]

    Weekly Security Incident Log Period of May 14 - May 20, 2012 Incident No. Reported Date Building-000955 PARKING GARAGE - ARBORETUM LANE (PS2) Mech\\Electrical Security responded to a report that an automotive York Security responded to a report of an unknown male causing a disturbance in the food court

  9. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Information Security Seminar Series

    E-Print Network [OSTI]

    NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Information Security Seminar Series FISMA AND TECHNOLOGY 5 FISMA Strategic Vision We are building a solid foundation of information security across one of the largest information technology infrastructures in the world based on comprehensive security standards

  10. Secure Database Development Jan Jurjens (1) and Eduardo B. Fernandez (2)

    E-Print Network [OSTI]

    Jurjens, Jan

    , Florida Atlantic University, Boca Raton, FL 33431, USA http://www.cse.fau.edu/~ed Synonyms Secure DBMS in this encyclopedia (Database security). This section concentrates mostly on how to build the software of a DBMS, 6], there is little work on how to implement a secure Database Management System (DBMS). It is true

  11. Building America Webinar: Ventilation in Multifamily Buildings...

    Energy Savers [EERE]

    Ventilation in Multifamily Buildings Building America Webinar: Ventilation in Multifamily Buildings This webinar was presented by research team Consortium for Advanced Residential...

  12. Building America Expert Meeting: Transforming Existing Buildings...

    Energy Savers [EERE]

    Transforming Existing Buildings through New Media--An Idea Exchange Building America Expert Meeting: Transforming Existing Buildings through New Media--An Idea Exchange This report...

  13. Security Perimeter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol HomeFacebook TwitterSearch-Comments Sign InNuclear SecurityUnder Budget

  14. Safety, Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Scienceand Requirements RecentlyElectronicResourcesjobsJuly throughR EMaterialsSafety, Security

  15. Computer Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMForms AboutRESEARCHHydrosilylationComputer Security All JLF

  16. INFRASTRUCTURE SECURITY & ENERGY

    E-Print Network [OSTI]

    Schrijver, Karel

    INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Delivery and Energy Reliability #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY Federal agencies to support waivers and specific response legal authorities #12;INFRASTRUCTURE SECURITY

  17. Designing security into software

    E-Print Network [OSTI]

    Zhang, Chang Tony

    2006-01-01T23:59:59.000Z

    When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

  18. Dalhousie Sustainable Building Policy March 2011

    E-Print Network [OSTI]

    Brownstone, Rob

    .2 LEED Rating System "The Leadership in Energy and Environmental Design (LEED) Green Building Rating of Principles, and Plan. This policy formalizes Dalhousie's existing practice and commitment to green building as demonstrated by the design and construction of a number of energy efficient buildings from the 90s to the LEED

  19. Building Science

    Broader source: Energy.gov [DOE]

    This presentation was given at the Summer 2012 DOE Building America meeting on July 25, 2012, and addressed the question ŤHow do we first do no harm with high-r enclosures??

  20. Building debris

    E-Print Network [OSTI]

    Dahmen, Joseph (Joseph F. D.)

    2006-01-01T23:59:59.000Z

    This thesis relates architectural practices to intelligent use of resources and the reuse of derelict spaces. The initial investigation of rammed earth as a building material is followed by site-specific operations at the ...

  1. Building Stones

    E-Print Network [OSTI]

    2012-01-01T23:59:59.000Z

    1992 Are the pyramids of Egypt built of poured concreteel-Anba’ut, Red Sea coast, Egypt. Marmora 6, pp. 45 - 56.building stones of ancient Egypt are those relatively soft,

  2. Healthy buildings

    SciTech Connect (OSTI)

    Not Available

    1991-01-01T23:59:59.000Z

    This book is covered under the following headings: Healthy building strategies/productivity, Energy and design issues, Ventilation, Contaminants, Thermal, airflow, and humidity issues, School-related issues, Sources and sinks, Filtering, Operation and maintenance.

  3. Networks in Buildings: Which Path Environmental Energy Technologies Division

    E-Print Network [OSTI]

    modest use in consumer electronics, security, and large building control systems. The next 20 years markets. Key future networks are lighting, climate control, and security/presence. This paper reviews some, product, or process disclosed, or represents that its use would not infringe privately owned rights

  4. Healthy buildings

    SciTech Connect (OSTI)

    Geshwiler, M.; Montgomery, L.; Moran, M. (eds.)

    1991-01-01T23:59:59.000Z

    This proceedings is of the Indoor Air Quality (IAQ) Conference held September 4--8, 1991 in Washington, D.C. Entitled the IAQ 91, Healthy Buildings,'' the major topics of discussion included: healthy building strategies/productivity; energy and design issues; ventilation; contaminants; thermal, airflow, and humidity issues; school-related issues; sources and sinks; filtering; and operation and maintenance. For these conference proceedings, individual papers are processed separately for input into the Energy Data Base. (BN)

  5. Archive Reference Buildings by Building Type: Supermarket

    Broader source: Energy.gov [DOE]

    Here you will find past versions of the reference buildings for new construction commercial buildings, organized by building type and location. A summary of building types and climate zones is...

  6. Archive Reference Buildings by Building Type: Warehouse

    Broader source: Energy.gov [DOE]

    Here you will find past versions of the reference buildings for new construction commercial buildings, organized by building type and location. A summary of building types and climate zones is...

  7. Cyber Security | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power Administration would likeConstitution4Customer-Comments Sign In About |Cyber SecurityCyber

  8. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25T23:59:59.000Z

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  9. Security & Privacy | EMSL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security & Privacy Security & Privacy Privacy Notice We collect no personal information about you without your knowledge when you visit this site, although you may choose to...

  10. Advancing Global Nuclear Security

    Broader source: Energy.gov [DOE]

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  11. Security tasks are highly interdependent.

    E-Print Network [OSTI]

    Motivation Security tasks are highly interdependent. To improve security tools, we need to understand how security practitioners collaborate in their organizations. Security practitioners in context Exchange of Information Develop security tools that: · Integrate information from different communication

  12. Security Policies Dr. Ahmad Almulhem

    E-Print Network [OSTI]

    Almulhem, Ahmad

    Security Policies Dr. Ahmad Almulhem Computer Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 51 #12;Security Policies Types of Security Policies Trust Types of Access Control Summary Part I Overview Ahmad Almulhem - Network Security Engineering

  13. Cyber Security

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the YouTube platformBuildingCoalComplex(GC-72)ColumbiaCurrentEnergyTroy Manigault

  14. Accumulating Automata and Cascaded Equations Automata for Communicationless Information Theoretically Secure Multi-Party Computation

    E-Print Network [OSTI]

    number 428/11), Cabarnit Cyber Security MAGNET Consortium, Grant from the Institute for Future Defense;1 Introduction Secure multi-party computation (MPC) is a powerful concept in secure distributed computing Theoretically Secure Multi-Party Computation (Preliminary Report) Shlomi Dolev1 and Niv Gilboa2 and Ximing Li1 1

  15. POLICY NUMBER 2005-03 January 28, 2005

    E-Print Network [OSTI]

    Oliver, Douglas L.

    POLICY NUMBER 2005- 03 January 28, 2005 POLICY: UCHC HIPAA SECURITY ADMINISTRATION PURPOSE: UCHC will comply with the HIPAA Security Rule's requirements pertaining to policies and procedures and documentation requirements and the appointment of an Information Security Officer (ISO). SCOPE: This policy

  16. Converging Redundant Sensor Network Information for Improved Building Control

    SciTech Connect (OSTI)

    Dale K. Tiller; Gregor P. Henze

    2005-12-01T23:59:59.000Z

    This project is investigating the development and application of sensor networks to enhance building energy management and security. Commercial, industrial and residential buildings often incorporate systems used to determine occupancy, but current sensor technology and control algorithms limit the effectiveness of these systems. For example, most of these systems rely on single monitoring points to detect occupancy, when more than one monitoring point would improve system performance. Phase I of the project focused on instrumentation and data collection. In Phase I, a new occupancy detection system was developed, commissioned and installed in a sample of private offices and open-plan office workstations. Data acquisition systems were developed and deployed to collect data on space occupancy profiles. In phase II of the project, described in this report, we demonstrate that a network of several sensors provides a more accurate measure of occupancy than is possible using systems based on single monitoring points. We also establish that analysis algorithms can be applied to the sensor network data stream to improve the accuracy of system performance in energy management and security applications, and show that it may be possible to use sensor network pulse rate to distinguish the number of occupants in a space. Finally, in this phase of the project we also developed a prototype web-based display that portrays the current status of each detector in a sensor network monitoring building occupancy. This basic capability will be extended in the future by applying an algorithm-based inference to the sensor network data stream, so that the web page displays the likelihood that each monitored office or area is occupied, as a supplement to the actual status of each sensor.

  17. Building 400 P.O. Box 5000

    E-Print Network [OSTI]

    Ohta, Shigemi

    as principal licensing executive, technology transfer. In 2005, Copan moved to Clean Diesel Technologies, Inc. In 2009, he became managing director at EnergyInsight, a consultancy providing technology, and environmental sciences, as well as in energy technologies and national security. Brookhaven Lab also builds

  18. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22T23:59:59.000Z

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  19. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16T23:59:59.000Z

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  20. Office of Security Assistance

    Broader source: Energy.gov [DOE]

    The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

  1. Building Interoperability

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: Theof Energy FutureDepartment of Energy Building Energy-EfficientBuilding

  2. Building Interoperability

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: Theof Energy FutureDepartment of Energy Building Energy-EfficientBuilding

  3. Annual Security Report for 2012Annual Security Report for 2012 Published in the Year 2013

    E-Print Network [OSTI]

    Illinois at Urbana-Champaign, University of

    reported to the University of Illinois police, designated campus security officials as defined under. Springfield Ave., Urbana. All phone numbers use the area code (217) unless otherwise noted. The commitment

  4. The Data and Application Security and Privacy (DASPY) Challenge

    E-Print Network [OSTI]

    Sandhu, Ravi

    Computer security Information security = Computer security + Communications security Information Computer security Information security = Computer security + Communications security Information Cyber security (defensive) goals have evolved Computer security Information security = Computer

  5. Table B14. Number of Establishments in Building, Number of Buildings, 1999

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are nowTotal" (Percent) Type: Sulfur Content API GravityDakota" "Fuel, quality", 2013,Iowa"Dakota" ,"FullWestQuantity of2". Summary

  6. Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop

    SciTech Connect (OSTI)

    Sheldon, Frederick T [ORNL; Krings, Axel [ORNL; Yoo, Seong-Moo [ORNL; Mili, Ali [ORNL; Trien, Joseph P [ORNL

    2006-01-01T23:59:59.000Z

    The workshop theme is Cyber Security: Beyond the Maginot Line Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglected or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyberspace including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more . . .

  7. Weekly Security Incident Log Period of Jul 9 -Jul 15, 2012

    E-Print Network [OSTI]

    and Safety responded to a report of a natural gas odour in the building. The building was checked and no natural gas was found. Toronto Fire determined that all was in order. 7/12/2012 07:31 AM HazardousWeekly Security Incident Log Period of Jul 9 - Jul 15, 2012 Incident No. Reported Date Building

  8. Secure Interoperable Open Smart Grid Demonstration Project

    SciTech Connect (OSTI)

    Magee, Thoman

    2014-12-31T23:59:59.000Z

    The Consolidated Edison, Inc., of New York (Con Edison) Secure Interoperable Open Smart Grid Demonstration Project (SGDP), sponsored by the United States (US) Department of Energy (DOE), demonstrated that the reliability, efficiency, and flexibility of the grid can be improved through a combination of enhanced monitoring and control capabilities using systems and resources that interoperate within a secure services framework. The project demonstrated the capability to shift, balance, and reduce load where and when needed in response to system contingencies or emergencies by leveraging controllable field assets. The range of field assets includes curtailable customer loads, distributed generation (DG), battery storage, electric vehicle (EV) charging stations, building management systems (BMS), home area networks (HANs), high-voltage monitoring, and advanced metering infrastructure (AMI). The SGDP enables the seamless integration and control of these field assets through a common, cyber-secure, interoperable control platform, which integrates a number of existing legacy control and data systems, as well as new smart grid (SG) systems and applications. By integrating advanced technologies for monitoring and control, the SGDP helps target and reduce peak load growth, improves the reliability and efficiency of Con Edison’s grid, and increases the ability to accommodate the growing use of distributed resources. Con Edison is dedicated to lowering costs, improving reliability and customer service, and reducing its impact on the environment for its customers. These objectives also align with the policy objectives of New York State as a whole. To help meet these objectives, Con Edison’s long-term vision for the distribution grid relies on the successful integration and control of a growing penetration of distributed resources, including demand response (DR) resources, battery storage units, and DG. For example, Con Edison is expecting significant long-term growth of DG. The SGDP enables the efficient, flexible integration of these disparate resources and lays the architectural foundations for future scalability. Con Edison assembled an SGDP team of more than 16 different project partners, including technology vendors, and participating organizations, and the Con Edison team provided overall guidance and project management. Project team members are listed in Table 1-1.

  9. Los Alamos CCS (Center for Computer Security) formal computer security model

    SciTech Connect (OSTI)

    Dreicer, J.S.; Hunteman, W.J. (Los Alamos National Lab., NM (USA))

    1989-01-01T23:59:59.000Z

    This paper provides a brief presentation of the formal computer security model currently being developed at the Los Alamos Department of Energy (DOE) Center for Computer Security (CCS). The initial motivation for this effort was the need to provide a method by which DOE computer security policy implementation could be tested and verified. The actual analytical model was a result of the integration of current research in computer security and previous modeling and research experiences. The model is being developed to define a generic view of the computer and network security domains, to provide a theoretical basis for the design of a security model, and to address the limitations of present models. Formal mathematical models for computer security have been designed and developed in conjunction with attempts to build secure computer systems since the early 70's. The foundation of the Los Alamos DOE CCS model is a series of functionally dependent probability equations, relations, and expressions. The mathematical basis appears to be justified and is undergoing continued discrimination and evolution. We expect to apply the model to the discipline of the Bell-Lapadula abstract sets of objects and subjects. 5 refs.

  10. Assessing the Potential of Developing a Tool for Residential Facility Management Using Building Information Modeling Software

    E-Print Network [OSTI]

    Madhani, Himanshu 1986-

    2012-11-29T23:59:59.000Z

    for scheduled, proactive and (when necessary) reactive maintenance work. Globally, use of smart phones and various applications for home and office security has amplified. With increase in use of smart phones and applications by owners, such a tool would... that the building is a smart building which is synced with the system. Smart Buildings LLC (a US-based engineering and design firm) offers this definition: ?A smart building is the integration of building, technology, and energy systems. These systems may include...

  11. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    SciTech Connect (OSTI)

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01T23:59:59.000Z

    Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

  12. Wide Area Security Region Final Report

    SciTech Connect (OSTI)

    Makarov, Yuri V.; Lu, Shuai; Guo, Xinxin; Gronquist, James; Du, Pengwei; Nguyen, Tony B.; Burns, J. W.

    2010-03-31T23:59:59.000Z

    This report develops innovative and efficient methodologies and practical procedures to determine the wide-area security region of a power system, which take into consideration all types of system constraints including thermal, voltage, voltage stability, transient and potentially oscillatory stability limits in the system. The approach expands the idea of transmission system nomograms to a multidimensional case, involving multiple system limits and parameters such as transmission path constraints, zonal generation or load, etc., considered concurrently. The security region boundary is represented using its piecewise approximation with the help of linear inequalities (so called hyperplanes) in a multi-dimensional space, consisting of system parameters that are critical for security analyses. The goal of this approximation is to find a minimum set of hyperplanes that describe the boundary with a given accuracy. Methodologies are also developed to use the security hyperplanes, pre-calculated offline, to determine system security margins in real-time system operations, to identify weak elements in the system, and to calculate key contributing factors and sensitivities to determine the best system controls in real time and to assist in developing remedial actions and transmission system enhancements offline . A prototype program that automates the simulation procedures used to build the set of security hyperplanes has also been developed. The program makes it convenient to update the set of security hyperplanes necessitated by changes in system configurations. A prototype operational tool that uses the security hyperplanes to assess security margins and to calculate optimal control directions in real time has been built to demonstrate the project success. Numerical simulations have been conducted using the full-size Western Electricity Coordinating Council (WECC) system model, and they clearly demonstrated the feasibility and the effectiveness of the developed technology. Recommendations for the future work have also been formulated.

  13. Social Security Administration Information Phone: (706) 542-2900 Fax: (706) 583-0123 Web: international.uga.edu Email: issis@uga.edu

    E-Print Network [OSTI]

    Hall, Daniel

    Social Security Administration Information Phone: (706) 542-2900 Fax: (706) 583-0123 Web and return, you will keep the same number. For additional information you may visit the Social Security with your new Social Security information. #12;

  14. Home | Better Buildings Workforce

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Better Buildings Logo EERE Home | Programs & Offices | Consumer Information Search form Search Search Better Buildings Logo Connect with Us LinkedIn Twitter Better Buildings...

  15. Sandia Energy - Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessment Home Climate & Earth Systems WaterEnergy Nexus Water Monitoring & Treatment Technology Security Risk Assessment Security Risk Assessmentcwdd2015-05-04T21:...

  16. Sandia National Laboratories: Climate Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    MonitoringClimate Security Climate Security Climate Security Global reductions in greenhouse gases will eventually be motivated by an international climate treaty and will entail...

  17. Smart Buildings: Business Case and Action Plan

    SciTech Connect (OSTI)

    Ehrlich, Paul; Diamond, Rick

    2009-04-01T23:59:59.000Z

    General Services Administration (GSA) has been a pioneer in using Smart Building technologies but it has yet to achieve the full benefits of an integrated, enterprise-wide Smart Building strategy. In July 2008, GSA developed an initial briefing memorandum that identified five actions for a Smart Buildings feasibility study: (1) Identify and cluster the major building systems under consideration for a Smart Buildings initiative; (2) Identify GSA priorities for these clusters; (3) Plan for future adoption of Smart Building strategies by identifying compatible hardware; (4) Develop a framework for implementing and testing Smart Building strategies and converged networks; and (5) Document relevant GSA and industry initiatives in this arena. Based on this briefing memorandum, PBS and FAS retained consultants from Lawrence Berkeley National Laboratory, Noblis, and the Building Intelligence Group to evaluate the potential for Smart Buildings within GSA, and to develop this report. The project has included extensive interviews with GSA staff (See Appendix A), a review of existing GSA standards and documents, and an examination of relevant GSA and industry initiatives. Based on interviews with GSA staff and a review of GSA standards and documents, the project team focused on four goals for evaluating how Smart Building technology can benefit GSA: (1) Achieve Energy Efficiency Mandates--Use Smart Building technology as a tool to meet EISA 2007 and EO 13423 goals for energy efficiency. (2) Enhance Property Management--Deploy enterprise tools for improved Operations and Maintenance (O&M) performance and verification. (3) Implement Network as the Fourth Utility--Utilize a converged broadband network to support Smart Building systems and provide GSA clients with connectivity for voice, data and video. (4) Enhance Safety and Security--Harmonize Physical Access Control Systems (PACS) with Smart Building Systems.

  18. SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS

    E-Print Network [OSTI]

    SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology The selection and implementation of security controls are critical decisions for protecting

  19. Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES

    E-Print Network [OSTI]

    Newby, Gregory B.

    Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES Gregory B. Newby School an active role in information security. INTRODUCTION By most accounts, the proliferation of the Internet of information security, making concrete recommendations for safeguarding information and information access

  20. Building Energy Optimization Analysis Method (BEopt) - Building...

    Energy Savers [EERE]

    about BEopt. See an example of a Building America project that used BEopt. Find more case studies of Building America projects across the country that incorporate BEopt when...

  1. ANNUAL SECURITY FIRE SAFETY REPORT

    E-Print Network [OSTI]

    ANNUAL SECURITY AND FIRE SAFETY REPORT OCTOBER 1, 2013 DARTMOUTH COLLEGE http://www.dartmouth.edu/~security/ #12;1 Table of Contents MESSAGE FROM THE DIRECTOR OF SAFETY AND SECURITY................................................................................................................................................................... 7 ANNUAL SECURITY REPORT

  2. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01T23:59:59.000Z

    of climate change, energy security and economic stability.DoD is improving U.S. energy security and national security.www.greenpacks.org • Energy Security & Climate Change:

  3. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  4. Office of Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  5. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    for process that controls interactions between users and resources. · Access control system implements Information Security Group Agenda · Access control basics · ACLs and capabilities · Information flow policies· Information flow policies · Bell-LaPadula Model · Role-Based Access Control · Resources 3 Information Security

  6. Security system signal supervision

    SciTech Connect (OSTI)

    Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

    1991-09-01T23:59:59.000Z

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  7. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12T23:59:59.000Z

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  8. Securing Infrastructure from High Explosive Threats

    SciTech Connect (OSTI)

    Glascoe, L; Noble, C; Reynolds, J; Kuhl, A; Morris, J

    2009-03-20T23:59:59.000Z

    Lawrence Livermore National Laboratory (LLNL) is working with the Department of Homeland Security's Science and Technology Directorate, the Transportation Security Administration, and several infrastructure partners to characterize and help mitigate principal structural vulnerabilities to explosive threats. Given the importance of infrastructure to the nation's security and economy, there is a clear need for applied research and analyses (1) to improve understanding of the vulnerabilities of these systems to explosive threats and (2) to provide decision makers with time-critical technical assistance concerning countermeasure and mitigation options. Fully-coupled high performance calculations of structural response to ideal and non-ideal explosives help bound and quantify specific critical vulnerabilities, and help identify possible corrective schemes. Experimental validation of modeling approaches and methodologies builds confidence in the prediction, while advanced stochastic techniques allow for optimal use of scarce computational resources to efficiently provide infrastructure owners and decision makers with timely analyses.

  9. Industrial Buildings

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 111 1,613 122 40 Building FloorspaceThousandWithdrawals0.0 0.0Decade4Year114,937

  10. SECURITY AND FIRE SAFETY

    E-Print Network [OSTI]

    Barrash, Warren

    ANNUAL SECURITY AND FIRE SAFETY REPORT 2014 #12;2 Boise State University 2014 Annual Security and Fire Safety Report From the Vice President for Campus Operations and General Counsel At Boise State University, we are committed to providing a safe and secure environment for students, staff

  11. UNIVERSITY POLICE ANNUAL SECURITY

    E-Print Network [OSTI]

    Kulp, Mark

    UNIVERSITY POLICE 2013 ANNUAL SECURITY AND FIRE SAFETY GUIDE In compliance with the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act The University of New Orleans. Please take a moment to read the following information. #12;ANNUAL SECURITY AND FIRE SAFETY GUIDE 2013

  12. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1846P CustomTraining Sandia providesPRAsandhowtheycanbemanaged to increase levels of safety and security. Like othertrainings,Sandiaexpertsdesigncoursesto beasbroadorin

  13. Secure Core Contact Information

    E-Print Network [OSTI]

    Secure Core Contact Information C. E. Irvine irvine@nps.edu 831-656-2461 Department of Computer for the secure management of local and/or remote information in multiple contexts. The SecureCore project Science Graduate School of Operations and Information Sciences www.cisr.nps.edu Project Description

  14. Information Security Guide

    E-Print Network [OSTI]

    Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

  15. 3Building a Business Building a Business

    E-Print Network [OSTI]

    Arnold, Jonathan

    15 3Building a Business Building a Business This section provides direction on the kinds. If you contemplate building a "garage- based" company to sell a product into a niche market, you should-ups conjure up images of future wealth, of building the next Amgen or Microsoft, of launching what will become

  16. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05T23:59:59.000Z

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  17. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W. [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2014-10-15T23:59:59.000Z

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  18. A new secure process for steganography: CI2 Stego-security and topological-security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    A new secure process for steganography: CI2 Stego-security and topological-security Nicolas Friot1- formation hiding security fields. We show that the proposed scheme is stego-secure, which is the highest level of security in a well defined and studied category of attack called "watermark-only attack

  19. Secure positioning and non-local correlations

    E-Print Network [OSTI]

    Muhammad Nadeem

    2015-03-31T23:59:59.000Z

    Recently, the problem of secure position-verification has been extensively analyzed in a formal notion where distant verifiers send encrypted challenge along with the decryption information to the prover. However, currently it is known that all the existing position-verification scheme are insecure and secure positioning is impossible. We propose here a different notion for position-verification where distant verifiers determine the actions of the prover through non-local correlations generated by local measurements at the provers site. The proposed scheme guarantees secure positioning even if the verifiers do not have any pre-shared data with the prover, position is the only credential of the prover. Our proposed scheme is secure in general and evades known quantum attacks based on instantaneous non-local computations in particular. The scheme enables verifiers to identify dishonest provers with very high probability , where n is the number of entangled pairs used.

  20. THERMAL BUILDING PERFORMANCE OPTIMIZATION USING SPATIAL ARCHETYPES

    E-Print Network [OSTI]

    Papalambros, Panos

    process. An increasing number of countries in the world are developing or updating their building energy is spent for heating and cooling systems, see Figure 1.2. Figure 1.1 Primary energy consumption by sector encouragement, love and support #12;1 CHAPTER 1 INTRODUCTION 1.1. Energy Consumption Energy conscious building

  1. Permanent Home Number: Residential Number

    E-Print Network [OSTI]

    Viglas, Anastasios

    Permanent Home Number: Residential Number: Mobile: Please update my contact details. Signature nominated correspondence address as indicated below. Permanent Home Adress Residential Address Other Address (Must not be a PO Box) Residential Address (Must not be a PO Box) Other - Postal/Optional Address

  2. Information SecurityInformation Security--Applications andApplications and

    E-Print Network [OSTI]

    Ahmed, Farid

    Information SecurityInformation Security-- Applications andApplications and Techniques about? InformationInformation SecuritySecurity Information SecurityInformation Security What?What? Why of Information SecuritySecurity Network SecurityNetwork Security PGP, SSL,PGP, SSL, IPsecIPsec Data Security

  3. Security Trade Control Guidelines for Academic Exchange Agreements

    E-Print Network [OSTI]

    Takada, Shoji

    Security Trade Control Guidelines for Academic Exchange Agreements at Kyoto University Committee for Security Trade Control December 28, 2012 Recent years have seen an increasing number of academic exchange globalization. Under the Foreign Exchange and Foreign Trade Act (FEFTA), which was put into effect in April 2010

  4. Computationally Secure Oblivious Transfer Moni Naor y Benny Pinkas z

    E-Print Network [OSTI]

    Computationally Secure Oblivious Transfer #3; Moni Naor y Benny Pinkas z Abstract We describe a new Information Retrieval (PIR) protocol to a Symmetric PIR (SPIR) protocol without increasing the number security de#12;nitions. Section 2 presents protocols for 1-out-of-N and k-out-of-N OT. Section 3 presents

  5. Authentication Control Point and Its Implications For Secure Processor Design

    E-Print Network [OSTI]

    Lee, Hsien-Hsin "Sean"

    Authentication Control Point and Its Implications For Secure Processor Design Weidong Shi Hsien. Despite a number of secure processor designs have been proposed, the delicate relationship between privacy and integrity protection in the context of modern out-of-order processor design is not well understood

  6. Dynamic access policies for unconditionally secure secret sharing schemes

    E-Print Network [OSTI]

    Martin, Keith

    Dynamic access policies for unconditionally secure secret sharing schemes Keith M. Martin.martin@rhul.ac.uk Abstract--- Secret sharing schemes are cryptographic primitives that can be employed in any situation where it is desirable to distribute information relating to secret data amongst a number of entities. Following a secure

  7. Building America Webinar: Saving Energy in Multifamily Buildings...

    Energy Savers [EERE]

    More Documents & Publications Building America Webinar: Retrofit Ventilation Strategies in Multifamily Buildings Webinar Energy Saver Guide Building America...

  8. Securing Internet Routing Securing Internet Routing

    E-Print Network [OSTI]

    Goldberg, Sharon

    Plane (Routing protocols): S h b d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc · Set up paths between nodes [Kent Lynn Seo 00] Listen-Whisper, etc., Data Plane: · Given d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc · Set up paths

  9. Muon Fluence Measurements for Homeland Security Applications

    SciTech Connect (OSTI)

    Ankney, Austin S.; Berguson, Timothy J.; Borgardt, James D.; Kouzes, Richard T.

    2010-08-10T23:59:59.000Z

    This report focuses on work conducted at Pacific Northwest National Laboratory to better characterize aspects of backgrounds in RPMs deployed for homeland security purposes. Two polyvinyl toluene scintillators were utilized with supporting NIM electronics to measure the muon coincidence rate. Muon spallation is one mechanism by which background neutrons are produced. The measurements performed concentrated on a broad investigation of the dependence of the muon flux on a) variations in solid angle subtended by the detector; b) the detector inclination with the horizontal; c) depth underground; and d) diurnal effects. These tests were conducted inside at Building 318/133, outdoors at Building 331G, and underground at Building 3425 at Pacific Northwest National Laboratory.

  10. Enhancing regional security agreements through cooperative monitoring

    SciTech Connect (OSTI)

    Pregenzer, A.L.

    1995-05-01T23:59:59.000Z

    This paper proposes that strengthening regional capabilities for formulating and implementing arms control and confidence-building measures is a tangible method of enhancing regional security. It discusses the importance of developing a regional infrastructure for arms control and confidence building and elucidates the role of technology in facilitating regional arms control and confidence-building agreements. In addition, it identifies numerous applications for regional cooperative monitoring in the areas of arms control, resource management, international commerce and disaster response. The Cooperative Monitoring Center at Sandia National Laboratories, whose aim is to help individual countries and regions acquire the tools they need to develop their own solutions to regional problems, is discussed briefly. The paper ends with recommendations for establishing regional cooperative monitoring centers.

  11. Fault attacks on "secure" Smart Card Jie Ling and Brian King

    E-Print Network [OSTI]

    Zhou, Yaoqi

    of building secure systems from untrustworthy components, which used widely in everyday life. A Smart Card on the card will be securely stored, and access control to the information will be properly maintained simulated the process of key recovery for both Elliptic Curve Cryptography (ECC) and RSA systems. Our work

  12. and Pollutant Safeguarding Buildings

    E-Print Network [OSTI]

    commercial buildings, these flows are driven primarily by the building's ventilation system, but natural2004 Airflow and Pollutant Transport Group Safeguarding Buildings Against Chemical and Biological research since 1998 to protect buildings and building occupants from threats posed by airborne chemical

  13. Building America Webinar: Building America Research Tools | Department...

    Energy Savers [EERE]

    Building America Research Tools Building America Webinar: Building America Research Tools This webinar was held on March 18, 2015, and reviewed Building America research tools,...

  14. Building America Top Innovations Hall of Fame Profile - Building...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Building America Top Innovations Hall of Fame Profile - Building Energy Optimization Analysis Method (BEopt) Building America Top Innovations Hall of Fame Profile - Building Energy...

  15. SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2013)

    E-Print Network [OSTI]

    2013-01-01T23:59:59.000Z

    SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2013) Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/sec.819 SPECIAL ISSUE PAPER Integrating security mechanisms, must be protected against security threats. Due to the security and also resource constraint concerns

  16. Using Security and Domain ontologies for Security Requirements Analysis

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Using Security and Domain ontologies for Security Requirements Analysis Amina Souag, Camille.Mouratidis@uel.ac.uk Abstract-- Recent research has argued about the importance of considering security during Requirements that security being a multi-faceted problem, a single security ontology is not enough to guide SR Engineering

  17. Information Security Governance: When Compliance Becomes more Important than Security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Information Security Governance: When Compliance Becomes more Important than Security Terence Tan1 information security must adapt to changing conditions by extending security governance to middle management for implementing information security are more interested in complying with organizational standards and policies

  18. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security.cuny.edu Published: November 2014 Holiday Season Phishing Scams and Malware Campaigns CUNY/CIS Information Security.cuny.edu under "CUNY Issued Security Advisories" Visit the Federal Trade Commission's Consumer Information page

  19. INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY

    E-Print Network [OSTI]

    Subramanian, Sriram

    - 1 ­ INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable ­ INFORMATION SECURITY POLICY.doc Introduction Why Information Security? The access, availability

  20. 309 Building transition plan

    SciTech Connect (OSTI)

    Graves, C.E.

    1994-08-31T23:59:59.000Z

    The preparation for decontamination and decommissioning (transition) of the 309 Building is projected to be completed by the end of the fiscal year (FY) 1998. The major stabilization and decontamination efforts include the Plutonium Recycle Test Reactor (PRTR), fuel storage and transfer pits, Transfer Waste (TW) tanks and the Ion Exchange Vaults. In addition to stabilizing contaminated areas, equipment, components, records, waste products, etc., will be dispositioned. All nonessential systems, i.e., heating, ventilation, and air conditioning (HVAC), electrical, monitoring, fluids, etc., will be shut down and drained/de-energized. This will allow securing of the process, laboratory, and office areas of the facility. After that, the facility will be operated at a level commensurate with its surveillance needs while awaiting D&D. The implementation costs for FY 1995 through FY 1998 for the transition activities are estimated to be $1,070K, $2,115K, $2,939K, and $4,762K, respectively. Costs include an assumed company overhead of 20% and a 30% out year contingency.

  1. Baseline Fire Protection Facility Assessment for Building 9203...

    Broader source: Energy.gov (indexed) [DOE]

    Existing Business Occupancy. In the Business Occupancy sections of the building, the number of occupants is normally less than 10. During special events, the large room in the...

  2. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01T23:59:59.000Z

    Information and communication systems’ securityTrust: An Element of Information Security,” in Security andInternational Journal of Information Security, vol. 4, pp.

  3. Estimating visitor and visit numbers to

    E-Print Network [OSTI]

    ............................................ 24 4.5 Monitoring and Evaluating Quality of Life for CRS'07 .......................................25 4.6 Quality of experience visitor, visit and total numbers of visits to woodlands. This document builds on guidance on visitor

  4. Advanced Energy Retrofit Guide Retail Buildings

    SciTech Connect (OSTI)

    Liu, Guopeng; Liu, Bing; Zhang, Jian; Wang, Weimin; Athalye, Rahul A.; Moser, Dave; Crowe, Eliot; Bengtson, Nick; Effinger, Mark; Webster, Lia; Hatten, Mike

    2011-09-19T23:59:59.000Z

    The Advanced Energy Retrofit Guide for Retail Buildings is a component of the Department of Energy’s Advanced Energy Retrofit Guides for Existing Buildings series. The aim of the guides is to facilitate a rapid escalation in the number of energy efficiency projects in existing buildings and to enhance the quality and depth of those projects. By presenting general project planning guidance as well as financial payback metrics for the most common energy efficiency measures, these guides provide a practical roadmap to effectively planning and implementing performance improvements for existing buildings.

  5. Advanced Energy Retrofit Guide Office Buildings

    SciTech Connect (OSTI)

    Liu, Guopeng; Liu, Bing; Wang, Weimin; Zhang, Jian; Athalye, Rahul A.; Moser, Dave; Crowe, Eliot; Bengtson, Nick; Effinger, Mark; Webster, Lia; Hatten, Mike

    2011-09-27T23:59:59.000Z

    The Advanced Energy Retrofit Guide for Office Buildings is a component of the Department of Energy’s Advanced Energy Retrofit Guides for Existing Buildings series. The aim of the guides is to facilitate a rapid escalation in the number of energy efficiency projects in existing buildings and to enhance the quality and depth of those projects. By presenting general project planning guidance as well as financial payback metrics for the most common energy efficiency measures, these guides provide a practical roadmap to effectively planning and implementing performance improvements for existing buildings.

  6. Status of Educational Efforts in National Security Workforce

    SciTech Connect (OSTI)

    None

    2008-03-31T23:59:59.000Z

    This report documents the status of educational efforts for the preparation of a national security workforce as part of the National Security Preparedness Project, being performed by the Arrowhead Center of New Mexico State University under a DOE/NNSA grant. The need to adequately train and educate a national security workforce is at a critical juncture. Even though there are an increasing number of college graduates in the appropriate fields, many of these graduates choose to work in the private sector because of more desirable salary and benefit packages. This report includes an assessment of the current educational situation for the national security workforce.

  7. The potential and challenges of monitoring-supported energy efficiency improvement strategies in existing buildings 

    E-Print Network [OSTI]

    Schub, M.; Mahdavi, A.; Simonis, H.; Menzel, K.; Browne, D.

    2012-01-01T23:59:59.000Z

    The ongoing EU-supported CAMPUS 21 explores the energy efficiency potential of integrated security, control, and building management software. The main objective of the project is to compare the energy and indoor-environmental performance...

  8. The limits of state building : the politics of war and the ideology of peace

    E-Print Network [OSTI]

    Radin, Andrew M. (Andrew Marc)

    2012-01-01T23:59:59.000Z

    When can the international community build strong state institutions - such as security forces or electoral institutions - in post-conflict societies? An influential technical perspective argues that authority, resources, ...

  9. Building America

    SciTech Connect (OSTI)

    Brad Oberg

    2010-12-31T23:59:59.000Z

    Builders generally use a 'spec and purchase' business management system (BMS) when implementing energy efficiency. A BMS is the overall operational and organizational systems and strategies that a builder uses to set up and run its company. This type of BMS treats building performance as a simple technology swap (e.g. a tank water heater to a tankless water heater) and typically compartmentalizes energy efficiency within one or two groups in the organization (e.g. purchasing and construction). While certain tools, such as details, checklists, and scopes of work, can assist builders in managing the quality of the construction of higher performance homes, they do nothing to address the underlying operational strategies and issues related to change management that builders face when they make high performance homes a core part of their mission. To achieve the systems integration necessary for attaining 40% + levels of energy efficiency, while capturing the cost tradeoffs, builders must use a 'systems approach' BMS, rather than a 'spec and purchase' BMS. The following attributes are inherent in a systems approach BMS; they are also generally seen in quality management systems (QMS), such as the National Housing Quality Certification program: Cultural and corporate alignment, Clear intent for quality and performance, Increased collaboration across internal and external teams, Better communication practices and systems, Disciplined approach to quality control, Measurement and verification of performance, Continuous feedback and improvement, and Whole house integrated design and specification.

  10. APS Building Monitors

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Building Monitors For non-401 Building Monitors, select: LOMs Other APS Buildings 401 West WCtr Lab Wing ECtr East 5th Floor Yiying Ge na na na na 4th Floor Rick Fenner Karen...

  11. Building Performance Simulation

    E-Print Network [OSTI]

    Hong, Tianzhen

    2014-01-01T23:59:59.000Z

    a future with  very low energy buildings resulting in very consumption  of  low  energy  buildings,  with  site  EUI design and operation of low energy buildings through better 

  12. Thick Buildings [Standards

    E-Print Network [OSTI]

    Coffin, Christie Johnson

    1995-01-01T23:59:59.000Z

    on Occupant Behavior in Buildings, New Directions forSacramento, is a thin building that surrounds an atrium. (Performance of a Green Building," Urban UndQune 1992): 23-

  13. Building Energy Monitoring and Analysis

    E-Print Network [OSTI]

    Hong, Tianzhen

    2014-01-01T23:59:59.000Z

    United States and China, Energy and Buildings, 2013. Underin Singapore. Energy and Buildings, 37, 167-174. Eom, J. ,building operations. Energy and Buildings, 33, 783–791.

  14. BUILDING PROCTOR rev. April 2014

    E-Print Network [OSTI]

    BUILDING PROCTOR MANUAL rev. April 2014 #12;Building Proctor Manual rev. April 2014 2 TABLE.........................................................................................................................................5 Role of a Building Proctor ..............................................................................................................5 Authority of Building Proctor

  15. September 11, 2012 NIST Key Management Workshop 2012 Secure Key Storage

    E-Print Network [OSTI]

    September 11, 2012 NIST Key Management Workshop 2012 Secure Key Storage and True Random Number Storage via PUFs - Main Idea - Reliability - Randomness -- InstantiationsInstantiations 3. True Random, including side channel resistance ° Trusted security policy routines ° Secure and authentic key storage

  16. action unit number: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    products are used in or around buildings including homes or schools. In conducting this review of MDI compounds, EPA considered a number of potential actions, including...

  17. Enhance your Cyber Security Knowledge

    E-Print Network [OSTI]

    Enhance your Cyber Security Knowledge About NPS CS FUNDAMENTALS: Create a strong foundational by increasing the effectiveness of the armed forces of the United States and its allies. Cyber Security-4015 About CISR #12;Cyber Security Adversarial Techniques Cyber Security Defense Cyber Security Fundamentals

  18. Annual Security Report October 2013

    E-Print Network [OSTI]

    Goddard III, William A.

    1 Annual Security Report October 2013 Mission Statement The Campus Security and Parking Services Department ("Security") exists to provide a secure and welcoming research, educational, and work environment in which security concerns are balanced with freedom of movement in an open campus atmosphere while

  19. Dumb Ideas in Computer Security

    E-Print Network [OSTI]

    Dumb Ideas in Computer Security Dr Charles P Pfleeger Pfleeger Consulting Group 19 July 2011 chuck Security" (2005) http://www.ranum.com/security/computer_security/editorials/dumb/ Default permit Ideas in Computer Security 219 Jul 2011 #12;Struck a Nerve Results 1-10 of about 2,030,000 for dumb

  20. Security Division 2007 Annual Report

    E-Print Network [OSTI]

    Computer Security Division 2007 Annual Report #12;TAble of ConTenTS Welcome Division Organization The Computer Security Division Responds to the Federal Information Security Management Act of 2002 Security Information Technology 15 Security Testing and Metrics 17 Validation Programs and Laboratory Accreditation 17

  1. August 2003 IT SECURITY METRICS

    E-Print Network [OSTI]

    August 2003 IT SECURITY METRICS Elizabeth B. Lennon, Editor Information Technology Laboratory approach to measuring information security. Evaluating security at the sys tem level, IT security metrics and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

  2. Energy Security Initiatives Update

    Broader source: Energy.gov [DOE]

    Presentation—given at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meeting—lists Federal government energy security initiatives.

  3. TEC Information Security

    Broader source: Energy.gov (indexed) [DOE]

    External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

  4. Personnel Security Specialist

    Broader source: Energy.gov [DOE]

    The Office of the Associate Under Secretary for Environment, Health, Safety, and Security (AU) which provides corporate leadership and strategic approaches for protecting DOEs workers, the public,...

  5. NNSA orders security enhancements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    badge or valid driver's license) before proceeding, and will be asked to vouch for other vehicle occupants. LOS ALAMOS, N. M., Dec. 21, 2012-The National Nuclear Security...

  6. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08T23:59:59.000Z

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  7. Hazardous Material Security (Maryland)

    Broader source: Energy.gov [DOE]

    All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

  8. National Nuclear Security Administration

    Broader source: Energy.gov (indexed) [DOE]

    and Related Structures within TA-3 at Los Alamos National Laboratory, Los Alamos, New Mexico U. S. Department of Energy National Nuclear Security Administration Los Alamos Area...

  9. Buildings Interoperability Landscape ? DRAFT

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Heating, Refrigerating, and Air-Conditioning Engineers BACS building automation and control system BCHP building-cooling-heating-power BPM Business Process Modeling BTO...

  10. Building Scale DC Microgrids

    E-Print Network [OSTI]

    Marnay, Chris

    2013-01-01T23:59:59.000Z

    Folsom CA, Integration of Renewable Resources: OperationalOffice of Energy Efficiency and Renewable Energy, BuildingOffice of Energy Efficiency and Renewable Energy, Building

  11. Wynkoop Building Performance Measurement: Water

    SciTech Connect (OSTI)

    Fowler, Kimberly M.; Kora, Angela R.

    2012-08-26T23:59:59.000Z

    This report is a summary of the water analysis performance for the Denver, Colorado Wynkoop Building. The Wynkoop Building (Figure 1) was built in 2006 as the Environmental Protection Agency (EPA) Region 8 Headquarters intended to house over 900 occupants in the 301,292 gross square feet (248,849 rentable square feet). The building was built on a brownfield in the Lower Downtown Historic District as part of an urban redevelopment effort. The building was designed and constructed through a public-private partnership with the sustainable design elements developed jointly by General Services Administration (GSA) and EPA. That partnership is still active with all parties still engaged to optimize building operations and use the building as a Learning Laboratory. The building design achieved U.S. Green Building Council Leadership in Energy and Environmental Design for New Construction (LEED-NC) Gold Certification in 2008 (Figure 2) and a 2008 EPA Energy Star Rating of 96 with design highlights that include: (1) Water use was designed to use 40% less than a typical design baseline. The design included low flow fixtures, waterless urinals and dual flush toilets; (2) Native and adaptive vegetation were selected to minimize the need for irrigation water for landscaping; and (3) Energy use intensity was modeled at 66.1 kBtus/gross square foot, which is 39% better than ASHRAE 90.1 1999. The Wynkoop Building water use (10 gallons/square foot) was measured at lower than industry average (15 gallons/square foot) and GSA goals (13 gallons/square foot), however, it was higher than building management expected it would be. The type of occupants and number of occupants can have a significant impact on fixture water use. The occupancy per floor varied significantly over the study time period, which added uncertainty to the data analysis. Investigation of the fixture use on the 2nd, 5th, and 7th floors identified potential for water use reduction if the flush direction of the dual-flush toilet handles was reversed. The building management retrofitted the building's toilets with handles that operated on reduced flush when pushed down (0.8 gallons) and full flush when pulled up (1.1 gallons). The water pressure on the 5th floor (< 30 psi) is less than half the pressure on the 7th floor (>80 psi). The measured water savings post-retrofit was lower on the 5th floor than the 7th floor. The differences in water pressure may have had an impact on the quantity of water used per floor. The second floor water use was examined prior to and following the toilet fixture retrofit. This floor is where conference rooms for non-building occupants are available for use, thus occupancy is highly variable. The 3-day average volume per flush event was higher post-retrofit (0.79 gallons per event), in contrast to pre-retrofit (0.57 gallons per event). There were 40% more flush events post retrofit, which impacted the findings. Water use in the third floor fitness center was also measured for a limited number of days. Because of water line accessibility, only water use on the men's side of the fitness center was measured and from that the total fitness center water use was estimated. Using the limited data collected, the fitness center shower water use is approximately 2% of the whole building water use. Overall water use in the Wynkoop Building is below the industry baseline and GSA expectations. The dual flush fixture replacement appears to have resulted in additional water savings that are expected to show a savings in the total annual water use.

  12. Solar buildings. Overview: The Solar Buildings Program

    SciTech Connect (OSTI)

    Not Available

    1998-04-01T23:59:59.000Z

    Buildings account for more than one third of the energy used in the United States each year, consuming vast amounts of electricity, natural gas, and fuel oil. Given this level of consumption, the buildings sector is rife with opportunity for alternative energy technologies. The US Department of Energy`s Solar Buildings Program was established to take advantage of this opportunity. The Solar Buildings Program is engaged in research, development, and deployment on solar thermal technologies, which use solar energy to produce heat. The Program focuses on technologies that have the potential to produce economically competitive energy for the buildings sector.

  13. Intelligent Building Energy Information and Control Systems for Low-Energy

    E-Print Network [OSTI]

    for about 70 percent of electricity use. To address energy security issues and environmental concerns&R International, 2011). To address energy security and environmental concerns there is an urgent needLBNL-5894E Intelligent Building Energy Information and Control Systems for Low-Energy Operations

  14. Office of Departmental Personnel Security

    Broader source: Energy.gov [DOE]

    The Office of Departmental Personnel Security serves as the central leader and advocate vested with the authority to ensure consistent and effective implementation of personnel security programs Department-wide (including for the National Nuclear Security Administration (NNSA).

  15. UC SECURITY FRAMEWORK 2011 -2012

    E-Print Network [OSTI]

    Hickman, Mark

    1 UC SECURITY FRAMEWORK 2011 - 2012 #12;2 Contents Background..................................................................................................................................4 About UC Security & Campus Community Support .................................................................5 Security Service Authority and Relationship with NZ Police and Emergency Services ...........5

  16. The security of machine learning

    E-Print Network [OSTI]

    Barreno, Marco; Nelson, Blaine; Joseph, Anthony D.; Tygar, J. D.

    2010-01-01T23:59:59.000Z

    of the IEEE symposium on security and privacy (pp. 188–201).and communications security (CCS) (pp. 59–68). Globerson,detection. In USENIX security symposium. Klimt, B. , & Yang,

  17. January 2005 INTEGRATING IT SECURITY

    E-Print Network [OSTI]

    January 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS By Joan S. Hash, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Introduction To assist federal agencies with effec tively integrating security

  18. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08T23:59:59.000Z

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  19. Two worlds, one smart card An integrated solution for physical access and logical security

    E-Print Network [OSTI]

    Hoepman, Jaap-Henk

    issued, controlling access to over 1500 buildings, fitted with in total more than 6000 smart card readers to office buildings and plants, companies these days issue their employees a (smart) card that is bothTwo worlds, one smart card An integrated solution for physical access and logical security using

  20. Two worlds, one smart card # An integrated solution for physical access and logical security

    E-Print Network [OSTI]

    Hoepman, Jaap-Henk

    issued, controlling access to over 1500 buildings, fitted with in total more than 6000 smart card readers#ce buildings and plants, companies these days issue their employees a (smart) card that is both an identityTwo worlds, one smart card # An integrated solution for physical access and logical security using

  1. Networks in Buildings: Which Path Forward?

    SciTech Connect (OSTI)

    Nordman, Bruce

    2008-08-17T23:59:59.000Z

    To date, digital networks have principally been installed for connecting information technology devices, with more modest use in consumer electronics, security, and large building control systems. The next 20 years will see much greater deployment of networks in buildings of all types, and across all end uses. Most of these are likely to be introduced primarily for reasons other than energy efficiency, and add energy use for network interfaces and network products. Widespread networking could easily lead to increased energy use, and experience with IT and CE networks suggests this may be likely. Active engagement by energy efficiency professionals in the architecture and design of future networks could lead to their being a large and highly cost-effective tool for efficiency. However, network standards are complex and take many years to develop and negotiate so that lack of action on this in the near term may foreclose important opportunities for years or decades to come. Digital networks need to be common globally, providing another challenge to building systems and elements that are more commonly designed only for national or regional markets. Key future networks are lighting, climate control, and security/presence. This paper reviews some examples of past network designs and use and the lessons they hold for future building networks. It also highlights key needed areas for research, policy, and standards development.

  2. Commercial Building Tenant Energy Usage Aggregation and Privacy

    SciTech Connect (OSTI)

    Livingston, Olga V.; Pulsipher, Trenton C.; Anderson, David M.; Wang, Na

    2014-10-31T23:59:59.000Z

    A growing number of building owners are benchmarking their building energy use. This requires the building owner to acquire monthly whole-building energy usage information, which can be challenging for buildings in which individual tenants have their own utility meters and accounts with the utility. Some utilities and utility regulators have turned to aggregation of customer energy use data (CEUD) as a way to give building owners whole-building energy usage data while protecting customer privacy. Meter profile aggregation adds a layer of protection that decreases the risk of revealing CEUD as the number of meters aggregated increases. The report statistically characterizes the similarity between individual energy usage patterns and whole-building totals at various levels of meter aggregation.

  3. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27T23:59:59.000Z

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  4. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01T23:59:59.000Z

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  5. Social Networking? Secure Networking?

    E-Print Network [OSTI]

    Chapman, Michael S.

    Social Networking? Secure Networking? Teaching & Learning Technology Roundtable February 2010 #12 ­ The intent behind the current security measures in place at OHSU ­ The OHSU Social Networking Guidelines 2. To begin a campus wide dialogue exploring the changing world of online social networking and it

  6. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19T23:59:59.000Z

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  7. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29T23:59:59.000Z

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Cancels DOE P 470.1.

  8. December 2007 SECURING EXTERNAL

    E-Print Network [OSTI]

    devices such as desktop and laptop computers, personal digital assistants (PDAs), and cell phones. These teleworkers use devices such as desktop and laptop computers, personal digital assistants (PDAs), and cellDecember 2007 SECURING EXTERNAL COMPUTERS AND OTHER DEVICES USED BY TELEWORKERS SECURING EXTERNAL

  9. Global Material Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTuba City, Arizona,SiteNational Nuclear SecuritySecurity

  10. Army Energy Security and Independence

    Broader source: Energy.gov (indexed) [DOE]

    ARMY ENERGY SECURITY AND INDEPENDENCE Leadership Ownership Partnership 19 NOV 2008 Don Juhasz, PE, CEM CHIEF ARMY ENERGY POLICY Army Energy Security - "The Way Ahead" 2 ARMY ENERGY...

  11. Headquarters Facilities Master Security Plan

    Office of Environmental Management (EM)

    It implements the requirements of: Title 32, CFR, Part 2001, Classified National Security Information Executive Order 13526, Classified National Security Information...

  12. Sandia Energy - Water Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Infrastructure Security Home Climate & Earth Systems WaterEnergy Nexus Decision Models for Integrating EnergyWater Water Infrastructure Security Water Infrastructure...

  13. Smart-Grid Security Issues

    SciTech Connect (OSTI)

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29T23:59:59.000Z

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  14. International Nuclear Security

    SciTech Connect (OSTI)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14T23:59:59.000Z

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  15. POLICY NUMBER 2011-03 February 8, 2011

    E-Print Network [OSTI]

    Oliver, Douglas L.

    authorized, documented, and processed in accordance with the appropriate system access control procedures. 71/ 4 POLICY NUMBER 2011-03 February 8, 2011 POLICY: UCHC INFORMATION SECURITY - SYSTEMS ACCESS are the only reasons for accessing confidential electronic data. #12;UCHC Information Security ­ Systems Access

  16. NUMBER: IT 3.00 SECTION: Information Technology

    E-Print Network [OSTI]

    Almor, Amit

    NUMBER: IT 3.00 SECTION: Information Technology SUBJECT: Information Security DATE: September 2: William F. Hogue Issued by: Office of Information Technology I. Policy The University of South Carolina data and information technology assets. The University Information Security Office is therefore

  17. Building sustainable ecosystem-oriented architectures

    E-Print Network [OSTI]

    Bassil, Youssef

    2012-01-01T23:59:59.000Z

    Currently, organizations are transforming their business processes into e-services and service-oriented architectures to improve coordination across sales, marketing, and partner channels, to build flexible and scalable systems, and to reduce integration-related maintenance and development costs. However, this new paradigm is still fragile and lacks many features crucial for building sustainable and progressive computing infrastructures able to rapidly respond and adapt to the always-changing market and environmental business. This paper proposes a novel framework for building sustainable Ecosystem- Oriented Architectures (EOA) using e-service models. The backbone of this framework is an ecosystem layer comprising several computing units whose aim is to deliver universal interoperability, transparent communication, automated management, self-integration, self-adaptation, and security to all the interconnected services, components, and devices in the ecosystem. Overall, the proposed model seeks to deliver a co...

  18. Better Buildings Neighborhood Program

    Broader source: Energy.gov [DOE]

    U.S. Department of Energy Better Buildings Neighborhood Program: Business Models Guide, October 27, 2011.

  19. NIST Preliminary Reconnaissance, Building

    E-Print Network [OSTI]

    Magee, Joseph W.

    NIST Preliminary Reconnaissance, Building Performance and Emergency Communications, Joplin)): Support R&D to improve building codes and standards and practices for design and construction of buildings of and data collection on the impact of severe wind on buildings, structures, and infrastructure ­ Section 204

  20. RESEARCH BUILDING AT NORTHWESTERN

    E-Print Network [OSTI]

    Engman, David M.

    BIOMEDICAL RESEARCH BUILDING AT NORTHWESTERN MEDICINE #12;"Our new Biomedical Research Building-intensive medical schools. Perkins+Will has designed a building that will be superbly functional and have great a magnificent 12-story Biomedical Research Building to address this priority. The new 600,000 square foot

  1. FOREST CENTRE STORAGE BUILDING

    E-Print Network [OSTI]

    deYoung, Brad

    FOREST CENTRE STORAGE BUILDING 3 4 5 6 7 8 UniversityDr. 2 1 G r e n f e l l D r i v e MULTI PURPOSE COURT STUDENT RESIDENCES GREEN HOUSE STUDENT RESIDENCES STUDENT RESIDENCES RECPLEX STORAGE BUILDING STORAGE BUILDING LIBRARY & COMPUTING FINE ARTS FOREST CENTRE ARTS &SCIENCE BUILDING ARTS &SCIENCE

  2. Community Development Building Division

    E-Print Network [OSTI]

    California Energy Commission 1516 Ninth Street Sacramento, Ca 95814-5514 Re: Green Building Ordinance of Los Altos Energy Efficiency Ordinance, Green Building Regulations under the 2005 California Building by the Board on that date. The Green Building Regulation, Chapter 12.66 of the City Municipal code, will ensure

  3. Natural convection airflow and heat transport in buildings: experimental results

    SciTech Connect (OSTI)

    Balcomb, J.D.; Jones, G.F.

    1985-01-01T23:59:59.000Z

    Observations of natural convection airflow in passive solar buildings are described. Particular results are given for two buildings supplementing other data already published. A number of generalizations based on the monitoring of the 15 buildings are presented. It is concluded that energy can be reasonably well distributed throughout a building by natural convection provided suitable openings are present and that the direction of heat transport is either horizontally across or upward.

  4. Change Number

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisiting the TWPSuccessAlamos LaboratoryCertified Reference6-02-01Change Number

  5. Sault Tribe Building Efficiency Energy Audits

    SciTech Connect (OSTI)

    Holt, Jeffrey W.

    2013-09-26T23:59:59.000Z

    The Sault Ste. Marie Tribe of Chippewa Indians is working to reduce energy consumption and expense in Tribally-owned governmental buildings. The Sault Ste. Marie Tribe of Chippewa Indians will conduct energy audits of nine Tribally-owned governmental buildings in three counties in the Upper Peninsula of Michigan to provide a basis for evaluating and selecting the technical and economic viability of energy efficiency improvement options. The Sault Ste. Marie Tribe of Chippewa Indians will follow established Tribal procurement policies and procedures to secure the services of a qualified provider to conduct energy audits of nine designated buildings. The contracted provider will be required to provide a progress schedule to the Tribe prior to commencing the project and submit an updated schedule with their monthly billings. Findings and analysis reports will be required for buildings as completed, and a complete Energy Audit Summary Report will be required to be submitted with the provider?s final billing. Conducting energy audits of the nine governmental buildings will disclose building inefficiencies to prioritize and address, resulting in reduced energy consumption and expense. These savings will allow Tribal resources to be reallocated to direct services, which will benefit Tribal members and families.

  6. BRDG2 Freezer Monitoring Protocol Our Vector Account Number is 4890308

    E-Print Network [OSTI]

    Sibille, Etienne

    entrance corridor & Sibille Lab Remote Alarm Vector Security will call 1.)Lab Phone 2.)PI Office Phone 3 is cooling down to the appropriate temperature. If the temperature failed to reach -70 before the end the number for BRDG2 Security into your cell phone. 4. Work with the security guard to determine the warming/cooling

  7. Extracting Security Control Requirements University of Tulsa

    E-Print Network [OSTI]

    Gamble, R. F.

    , Requirements, Security Policy Modeling. 1. INTRODUCTION Networks and information systems have grown. Security has become a larger issue with the democratization of technology and information. Security accepted security controls for "Federal Information Systems and Organizations" [8]. NIST defines security

  8. Towards Energy Efficient Building Assets: A Review on Sub-Tropical Climate

    E-Print Network [OSTI]

    Chowdhury, A. A.; Rasul, M. G.; Khan, M. M. K.

    2006-01-01T23:59:59.000Z

    Fifteenth Symposium on Improving Building Systems in Hot and Humid Climate July 24-26, 2006 The Buena Vista Palace Hotel, Orlando, Florida TOWARDS ENERGY EFFICIENT BUILDING ASSETS: A REVIEW ON SUB-TROPICAL CLIMATE A.A. CHOWDHURY M.G. RASUL M... building’s stability. To approach the concept of energy efficient building assets in a sub-tropical climate, building assets must adopt a number of innovative strategies to take advantage of subtropical climate. The importance of energy efficiency...

  9. INSTITUTE FOR CYBER SECURITY Application-Centric Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

  10. March 24, 2008 Databases: Security 1 Database Security and Authorization

    E-Print Network [OSTI]

    Adam, Salah

    to control login process by the DBMS Inference control The countermeasures to statistical database security database #12;March 24, 2008 Databases: Security 3 Chapter Outline Introduction Access Control Methods Policy System-related Security levels and categories Security Threats Loss of integrity Loss

  11. Safety and Security What do Safety/Security work with?

    E-Print Network [OSTI]

    Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with; · Security revolving work environment · Handle locks, keys, alarms, surveillance · Responsible

  12. Urban Commerce and Security Study Urban Commerce and Security Study

    E-Print Network [OSTI]

    Urban Commerce and Security Study Urban Commerce and Security Study Contact Information Fred S. Roberts Research Sponsor: Department of Homeland Security Rutgers University/CCICADA Center Professor.S. Department of Homeland Security, under Agreement 2009-ST-061-CCI002-02. Any opinions, findings

  13. SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card

    E-Print Network [OSTI]

    Li, Mo

    SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card Applying for a Social Security Card is easy AND it is FREE! If you DO NOT follow these instructions, we CANNOT process your and evidence to any Social Security office. Follow instructions below. HOW TO COMPLETE THE APPLICATION Most

  14. Wireless Security: Secure and Public Networks Villanova University

    E-Print Network [OSTI]

    36 Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer wireless access points. Security protocols exist for wireless networks; however, all widely implemented at implementing a protocol which allows public access to a secure wireless network have been made. In this report

  15. A P-5 Nuclear Dialogue: Concept, Building Blocks, and Implementation

    E-Print Network [OSTI]

    #12;A P-5 Nuclear Dialogue: Concept, Building Blocks, and Implementation Paul I. Bernstein, biological, radiological, nuclear, and high explosives) by providing capabilities to reduce, eliminate affirmed "America's intention to seek the peace and security of a world without nuclear weapons" and stated

  16. House Simulation Protocols (Building America Benchmark) - Building...

    Energy Savers [EERE]

    House Simulation Protocols. See an example of this Top Innovation in action. Find more case studies of Building America projects across the country that utilize House Simulation...

  17. Building Green in Greensburg: Business Incubator Building

    Office of Energy Efficiency and Renewable Energy (EERE)

    This poster highlights energy efficiency, renewable energy, and sustainable features of the high-performing SunChips Business Incubator building in Greensburg, Kansas.

  18. Building Green in Greensburg: City Hall Building

    Office of Energy Efficiency and Renewable Energy (EERE)

    This poster highlights energy efficiency, renewable energy, and sustainable features of the high-performing City Hall building in Greensburg, Kansas.

  19. ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1

    E-Print Network [OSTI]

    Su, Xiao

    ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1 Information................................................................................................................................................................................3 Information Security Policy...............................................................................................................................................4 Information Security Policy Management

  20. Office Buildings: Assessing and Reducing Plug and Process Loads in Office Buildings (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2013-04-01T23:59:59.000Z

    Plug and process loads (PPLs) in commercial buildings account for almost 5% of U.S. primary energy consumption. Minimizing these loads is a primary challenge in the design and operation of an energy-efficient building. PPLs are not related to general lighting, heating, ventilation, cooling, and water heating, and typically do not provide comfort to the occupants. They use an increasingly large fraction of the building energy use pie because the number and variety of electrical devices have increased along with building system efficiency. Reducing PPLs is difficult because energy efficiency opportunities and the equipment needed to address PPL energy use in office spaces are poorly understood.

  1. Retail Buildings: Assessing and Reducing Plug and Process Loads in Retail Buildings (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2013-04-01T23:59:59.000Z

    Plug and process loads (PPLs) in commercial buildings account for almost 5% of U.S. primary energy consumption. Minimizing these loads is a primary challenge in the design and operation of an energy-efficient building. PPLs are not related to general lighting, heating, ventilation, cooling, and water heating, and typically do not provide comfort to the occupants. They use an increasingly large fraction of the building energy use pie because the number and variety of electrical devices have increased along with building system efficiency. Reducing PPLs is difficult because energy efficiency opportunities and the equipment needed to address PPL energy use in retail spaces are poorly understood.

  2. NUMBER: FCMN 1.03 SECTION: Campus Planning and Construction

    E-Print Network [OSTI]

    Almor, Amit

    NUMBER: FCMN 1.03 SECTION: Campus Planning and Construction SUBJECT: Leasing of Real Property DATE: Campus Planning & Construction ________________________________________________________________ I. II. Policy Statement The office of Campus Planning & Construction (CP&C) is responsible for securing

  3. POLICY NUMBER 2005-06 January 28, 2005

    E-Print Network [OSTI]

    Oliver, Douglas L.

    POLICY NUMBER 2005-06 January 28, 2005 POLICY: UCHC HIPAA SECURITY INFORMATION SYSTEMS BUSINESS and Disaster Recovery Policy #2005-06 (1/28/05) 2/2 4. A disaster recovery plan shall be established

  4. Image, Incorporated : a study of securities buildings in Seoul, Korea

    E-Print Network [OSTI]

    Chang, Ji-in

    1992-01-01T23:59:59.000Z

    This study deals with the images of corporate high-rises in Seoul, Korea, the main city of a rapidly growing industrial nation. The questions explored concern mainly the images of office high-rises. Five multi-story ...

  5. Labor Relations Building | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12electron 9 5 - -/e),,s -LabgrantsLab team

  6. Energy Security Planning for Sustainable Buildings | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the YouTube|6721 FederalTexas Energyof 2005 at Iowa WindUnion Address,of EnergyEnergy

  7. DOE-ORO buildings | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power Administration wouldDECOMPOSITION OF CALCIUMCOSTDOENuclear1 of 1Retina BradleyDOE-ORO

  8. DOE-ORO buildings | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power Administration wouldDECOMPOSITION OF CALCIUMCOSTDOENuclear1 of 1Retina BradleyDOE-OROView of

  9. SECURING RADIO FREQUENCY IDENTIFICATION (RFID)

    E-Print Network [OSTI]

    business process for an organization; as a result, the security risks for RFID systems and the controls for an organization; as a result, the security risks for RFID systems and the controls available to address themMay 2007 SECURING RADIO FREQUENCY IDENTIFICATION (RFID) SYSTEMS SECURING RADIO FREQUENCY

  10. UNCG Security Awareness Training & Instructions

    E-Print Network [OSTI]

    Saidak, Filip

    UNCG Security Awareness Training & Instructions 02.09.2010 Page 1 of 4 Educating UNCG faculty and staff with respect to security best practices is essential in securing the University's information University employee that works with restricted or financial data. UNCG engaged Fishnet Security, a nationally

  11. ANNUAL SECURITY & FIRE SAFETY REPORT

    E-Print Network [OSTI]

    Maxwell, Bruce D.

    ANNUAL SECURITY & FIRE SAFETY REPORT 2014 A guide to policies, procedures, practices, and programs implemented to keep students, faculty, and staff safe and facilities secure. www.montana.edu/reports/security.pdf #12;Inside this Report 2014 Annual Security and Fire Safety Report for Reporting Year 2013

  12. Joseph Vance Building, The

    High Performance Buildings Database

    Seattle, WA In 2006, the Rose Smart Growth Investment Fund acquired the historic Joseph Vance Building with the purpose of transforming it into "the leading green and historic class B" building in the marketplace. The terra cotta Vance Building was constructed in 1929 and has 14 floors - 13 floors of offices over ground-floor retail with a basement for mechanical equipment and storage. In 2009 the U.S. Green Building Council (USGBC) awarded the Vance Building LEED for Existing Buildings (EB) Gold certification.

  13. Operations Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-04-30T23:59:59.000Z

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  14. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-25T23:59:59.000Z

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  15. AMALGAMATED SECURITY COMMUNITIES

    E-Print Network [OSTI]

    Harvey, Andrew Stephen

    2011-08-31T23:59:59.000Z

    This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

  16. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-01-22T23:59:59.000Z

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  17. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Administration FY 2011 - FY 2015 Budget Outlook Managing the NNSA 4.0% Science, Technology & Engineering 14.5% Stockpile Support 17.9% Preventing the Spread of...

  18. Write your extension number on this card.

    E-Print Network [OSTI]

    and slide it down. Press here to remove the stand. 1 Use the key hole slots on the stand to mark Press here jack. illustrations. for a secure fit. T7100 Telephone User Card 1-800-4 NORTEL www of your display. 1. Press ·. 2. Press / to · to select a contrast level. The higher the number the higher

  19. Building America Top Innovations Hall of Fame Profile - Building...

    Energy Savers [EERE]

    Top Innovations Hall of Fame Profile - Building America's Top Innovations Propel the Home Building Industry toward Higher Performance Building America Top Innovations Hall of Fame...

  20. Building Science-Based Climate Maps - Building America Top Innovation...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Science-Based Climate Maps - Building America Top Innovation Building Science-Based Climate Maps - Building America Top Innovation Photo showing climate zone maps based on the IECC...

  1. Trends in Commercial Buildings--Buildings and Floorspace

    U.S. Energy Information Administration (EIA) Indexed Site

    Home > Trends in Commercial Buildings > Trends in Buildings Floorspace Data tables Commercial Buildings TrendDetail Commercial Floorspace TrendDetail Background: Adjustment to...

  2. Building operating systems services: An architecture for programmable buildings.

    E-Print Network [OSTI]

    Dawson-Haggerty, Stephen

    2014-01-01T23:59:59.000Z

    7.3.2 Building Performance Analysis . . . . . . 7.4 RelatedWork 2.1 Building Physical Design . . . . . . . . . .3.2.6 Building Applications . . . . . . . . . . .

  3. Data port security lock

    DOE Patents [OSTI]

    Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

    2008-06-24T23:59:59.000Z

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  4. Engineering secure software 

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01T23:59:59.000Z

    breaches in the operating environment. Security breaches resulting from misuse or tnisconfiguration of the program should not be blamed on the software. T'his is a debatable position. A security breach that results from an unintentional enor... units with public key algorithms, private keys, and certificates. Any attempt to access or modify the data in these devices will render them unusable. The device contains software tools. These devices use the computer they reside on as a general...

  5. Incidents of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-17T23:59:59.000Z

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  6. Social Security Number Reduction Project | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol HomeFacebookScholarship Fund3Biology| Nationalof Energy Snapshots

  7. Uncalibrated Building Energy Simulation Modeling Results 

    E-Print Network [OSTI]

    Ahmad, M.; Culp, C.H.

    2006-01-01T23:59:59.000Z

    VOLUME 12, NUMBER 4 HVAC&R RESEARCH OCTOBER 2006 1141 Uncalibrated Building Energy Simulation Modeling Results Mushtaq Ahmad Charles H. Culp, PhD, PE Associate Member ASHRAE Fellow ASHRAE Received June 23, 2005; accepted April 17, 2006... the uncalibrated simulations were completed. The dis- crepancies between the simulated and measured total yearly building energy use varied over ±30% with one outlier. The results show that discrepancies ranged over ±90% between the sim- ulations and the measured...

  8. > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 1 Abstract--The tight coupling between system and market

    E-Print Network [OSTI]

    Gross, George

    to facilitate real-time secure power system operations. We illustrate the application of the approach security. Index Terms-- power system security management, security criterion, day-ahead and real> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT)

  9. IY5512: Part 1 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    IY5512: Part 1 1 Information Security Group IY5512 Computer Security Part 1: Introduction to computer security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security) ... 2 Information Security Group Agenda · Overview · Security goals · Security approaches ­ prevention

  10. Building Toxic Metal Characterization and Decontamination Report: Area 6, Building 914

    SciTech Connect (OSTI)

    NSTec Industrial Hygiene

    2011-08-15T23:59:59.000Z

    The purpose of this report is to outline the toxic metal characterization and decontamination efforts in Area 6, Building 914. This includes the initial building inspection, the hotspot sampling, results/findings, building cleanup, and the verification sampling. Building 914 is a steel light frame building that was constructed in 1992. It is about 16,454 square feet, and five employees are assigned to this building. According to the building's floor plan blueprints, it could be inferred that this building was once a Wiremen/Lineman shop. In 2002-2004, the National Nuclear Security Administration Nevada Site Office embarked on a broad characterization of beryllium (Be) surface concentrations throughout the North Las Vegas Facility, the Nevada National Security Site (NNSS), and ancillary facilities like the Special Technologies Laboratory, Remote Sensing Laboratory, etc. Building 914 was part of this characterization. The results of the 2002 study illustrated that the metal housekeeping limits were within acceptable limits and from a Be standpoint, the building was determined to be fit for occupancy. On March 2, 2011, based on a request from Building 914 users, National Security Technologies, LLC (NSTec) Industrial Hygiene (IH) collected bulk samples from the southwest corner of Building 914 at heights above 6 feet where black dust had been noticed on this particular wall. IH conducted surface swipe sampling of the area and analyzed the samples for toxic metals, namely, beryllium (Be), cadmium (Cd), chromium (Cr), lead (Pb), and manganese (Mn). The sample results indicated values two to four times above the housekeeping threshold for Be, Cd, Cr, Pb, and Mn. Subsequently, the facility was closed and posted; the necessary personnel were notified; and controls were instituted for ingress and egress of the building. On March 17, 2011, IH performed an extensive sampling event involving the entire warehouse in accordance with NSTec Organization Procedure OP-P250.004, Sampling Procedures. Analysis of the results from this exercise illustrated that toxic metal contamination was ubiquitous throughout the warehouse section of this building but did not extend into the office, restroom, and break room areas. On March 22, 2011, a planning meeting was held with Environment, Safety, Health & Quality management; Operations & Infrastructure (O&I) mangement; Facility Management; Occupational Medicine; O&I Operations; and IH. After a brief discussion concerning the salient facts of the surface sample results, it was agreed that the facility and its contents required cleaning. The facility would then be re-sampled to verify cleanliness and suitability for re-occupancy. On April 18, 2011, warehouse cleanup activites began. On July 5, 2011, upon receipt of the results from the last cleaned section, the cleanup operations were concluded. The building was statistically determined to be clean; thus, it could be reoccupied and the warehouse operations could resume immediately.

  11. Building Energy Code

    Broader source: Energy.gov [DOE]

    ''Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

  12. Building, landscape and section

    E-Print Network [OSTI]

    Johnson, Daniel B. (Daniel Bryant)

    1992-01-01T23:59:59.000Z

    All buildings have in their section a relationship to the landscape on which they are sited. Therefore we as inhabitants of these buildings may or may not have a relationship with the landscape. It is the supposition of ...

  13. Model Building Energy Code

    Broader source: Energy.gov [DOE]

    ''Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

  14. APS Building Managers

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Building Managers BUILDING CONTACT 400,401,402,411,412,413,415,420,431-436,438 Steven Downey 450 Glenn Kailus 382 Joe Gagliano 378 Ed Theres 314 Ed Russell...

  15. Building Energy Code

    Broader source: Energy.gov [DOE]

    Note: Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

  16. Building Energy Code

    Broader source: Energy.gov [DOE]

    ''Note: Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For...

  17. Financing green buildings

    E-Print Network [OSTI]

    Pierce, Christopher John, S.M. Massachusetts Institute of Technology

    2013-01-01T23:59:59.000Z

    An emerging trend in real estate is the development of sustainable buildings, partially due to the huge environmental impact of the design, construction and operation of commercial buildings. This thesis provides a brief ...

  18. Building Energy Code

    Broader source: Energy.gov [DOE]

    In 2009 S.B. 1182 created the Oklahoma Uniform Building Code Commission. The 11-member Commission was given the power to conduct rulemaking processes to adopt new building codes. The codes adopted...

  19. Building Energy Code

    Broader source: Energy.gov [DOE]

    Prior to 1997, South Carolina's local governments adopted and enforced the building codes. In 1997, the law required statewide use of the most up-to-date building codes, which then required the...

  20. Building condition monitoring

    E-Print Network [OSTI]

    Samouhos, Stephen V. (Stephen Vincent), 1982-

    2010-01-01T23:59:59.000Z

    The building sector of the United States currently consumes over 40% of the United States primary energy supply. Estimates suggest that between 5 and 30% of any building's annual energy consumption is unknowingly wasted ...

  1. Change in historic buildings

    E-Print Network [OSTI]

    Yin, Chien-Ni

    1992-01-01T23:59:59.000Z

    Change in historic buildings is inevitable. If these changes are not well-managed, the cityscape will be threatened because a city is composed of buildings. A good city should combine both growth and preservation. Controlling ...

  2. PROGRESS IN ENERGY EFFICIENT BUILDINGS

    E-Print Network [OSTI]

    Wall, L.W.

    2009-01-01T23:59:59.000Z

    I Figure 21. Sample building energy use label expressed inanalyses of actual buildings energy consumption data confirm1983. PROGRESS IN ENERGY EFFICIENT BUILDINGS Leonard W. Wall

  3. The Economics of Green Building

    E-Print Network [OSTI]

    Eichholtz, Piet; Kok, Nils; Quigley, John M.

    2010-01-01T23:59:59.000Z

    Benjamin. "Do LEED-Certified Buildings Save Energy? Yes,But,." Energy and Buildings, 2009, 41, pp. 897-905. Royalrating, and publicizing buildings along these dimensions (

  4. Building Energy Monitoring and Analysis

    E-Print Network [OSTI]

    Hong, Tianzhen

    2014-01-01T23:59:59.000Z

    Center for Building Energy Efficiency, and the China Center on Building Energy Efficiency (CERC-BEE) November,1)  CERC  Building  Energy  Efficiency  (CERC?BEE) 

  5. The Economics of Green Building

    E-Print Network [OSTI]

    Eichholtz, Piet; Kok, Nils; Quigley, John M.

    2010-01-01T23:59:59.000Z

    Environment Quality in Green Buildings: A Review," Nationalof Popular Attention to Green Building Notes: Sources:2007 - 2009 panel of green buildings and nearby control

  6. ata security feature: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing...

  7. Building Operator Certification

    E-Print Network [OSTI]

    Lilley, D.

    2013-01-01T23:59:59.000Z

    Building Operator Certification Energy Efficiency through Operator Training CATEE December 18, 2013 – San Antonio, TX Dennis Lilley, CEM, PMP ESL-KT-13-12-49 CATEE 2013: Clean Air Through Energy Efficiency Conference, San Antonio, Texas Dec. 16...-18 Building Operator Certification Energy Efficiency through Operator Training What is Building Operator Certification? Industry-recognized credential in energy efficient building operation practices Created with 100 industry experts Launched in 1996 9...

  8. Building Songs 5

    E-Print Network [OSTI]

    Zla ba sgrol ma

    2009-10-28T23:59:59.000Z

    . Sman shad building song 5.WAV Length of track 00:02:14 Related tracks (include description/relationship if appropriate) Title of track Building Songs 5 Translation of title Description (to be used in archive entry) Skar ma chos mdzin... sings a building song. Such songs are traditionally sung antiphonally between two groups of men while they are ramming walls. Genre or type (i.e. epic, song, ritual) Building song Name of recorder (if different from collector) Zla ba sgrol ma...

  9. Building Songs 8

    E-Print Network [OSTI]

    Zla ba sgrol ma

    2009-10-28T23:59:59.000Z

    . Sman shad building song 8.WAV Length of track 00:01:28 Related tracks (include description/relationship if appropriate) Title of track Building Songs 8 Translation of title Description (to be used in archive entry) Skar ma chos mdzin... sings a building song. Such songs are traditionally sung antiphonally between two groups of men while they are ramming walls. Genre or type (i.e. epic, song, ritual) Building song Name of recorder (if different from collector) Zla ba sgrol ma...

  10. Building Songs 7

    E-Print Network [OSTI]

    Zla ba sgrol ma

    2009-10-28T23:59:59.000Z

    . Sman shad building song 7.WAV Length of track 00:09:57 Related tracks (include description/relationship if appropriate) Title of track Building Songs 7 Translation of title Description (to be used in archive entry) Skar ma chos mdzin... sings a building song. Such songs are traditionally sung antiphonally between two groups of men while they are ramming walls. Genre or type (i.e. epic, song, ritual) Building song Name of recorder (if different from collector) Zla ba sgrol ma...

  11. Building Performance Evaluation

    E-Print Network [OSTI]

    King, A.; Harris, J.; Mbentin, B.

    2012-01-01T23:59:59.000Z

    Building Performance Evaluation Anne King and Jo Harris, MBEKTN and BSRIA Agenda ? Background to funding and programme ? The Building Performance Evaluation Programme in the UK ? Requirements ? Results ? Impact ? Discussion ? Do you/ How do... you do Building Performance Evaluation? ? What gaps are there and what could research do to fill them? Background ? The Technology Strategy Board ? the funders ? Low Impact Building programme ? BSRIA and others ? evaluators ? Soft Landings...

  12. Kiowa County Commons Building

    Office of Energy Efficiency and Renewable Energy (EERE)

    This poster describes the energy efficiency features and sustainable materials used in the Kiowa County Commons Building in Greensburg, Kansas.

  13. Executive report Building knowledge

    E-Print Network [OSTI]

    Geffner, Hector

    Executive report Building knowledge To build citizens To build cities UPF CAMPUS ICŔRIA INTERNATIONAL PROJECT 2010 International Campus of Excellence Programme #12;2 UPF CAMPUS ICŔRIA INTERNATIONAL this presentation from the one submitted in the CEI 2009 programme where UPF was classified as a `promising

  14. Archive Reference Buildings by Building Type: Primary school

    Broader source: Energy.gov [DOE]

    Here you will find past versions of the reference buildings for new construction commercial buildings, organized by building type and location. A summary of building types and climate zones is...

  15. Building America Webinar: Building America: Research for Real...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Building America Webinar: Building America: Research for Real-World Results Building America Webinar: Building America: Research for Real-World Results December 17, 2014 3:00PM to...

  16. Archive Reference Buildings by Building Type: Stand-alone retail

    Broader source: Energy.gov [DOE]

    Here you will find past versions of the reference buildings for new construction commercial buildings, organized by building type and location. A summary of building types and climate zones is...

  17. Archive Reference Buildings by Building Type: Small office

    Broader source: Energy.gov [DOE]

    Here you will find past versions of the reference buildings for new construction commercial buildings, organized by building type and location. A summary of building types and climate zones is...

  18. Archive Reference Buildings by Building Type: Large office

    Office of Energy Efficiency and Renewable Energy (EERE)

    Here you will find past versions of the reference buildings for new construction commercial buildings, organized by building type and location. A summary of building types and climate zones is...

  19. Archive Reference Buildings by Building Type: Fast food

    Broader source: Energy.gov [DOE]

    Here you will find past versions of the reference buildings for new construction commercial buildings, organized by building type and location. A summary of building types and climate zones is...

  20. Archive Reference Buildings by Building Type: Strip mall

    Broader source: Energy.gov [DOE]

    Here you will find past versions of the reference buildings for new construction commercial buildings, organized by building type and location. A summary of building types and climate zones is...

  1. Archive Reference Buildings by Building Type: Secondary school

    Broader source: Energy.gov [DOE]

    Here you will find past versions of the reference buildings for new construction commercial buildings, organized by building type and location. A summary of building types and climate zones is...

  2. Quantum Strongly Secure Ramp Secret Sharing

    E-Print Network [OSTI]

    Paul Zhang; Ryutaroh Matsumoto

    2014-08-08T23:59:59.000Z

    Quantum secret sharing is a scheme for encoding a quantum state (the secret) into multiple shares and distributing them among several participants. If a sufficient number of shares are put together, then the secret can be fully reconstructed. If an insufficient number of shares are put together however, no information about the secret can be revealed. In quantum ramp secret sharing, partial information about the secret is allowed to leak to a set of participants, called an unqualified set, that cannot fully reconstruct the secret. By allowing this, the size of a share can be drastically reduced. This paper introduces a quantum analog of classical strong security in ramp secret sharing schemes. While the ramp secret sharing scheme still leaks partial information about the secret to unqualified sets of participants, the strong security condition ensures that qudits with critical information can no longer be leaked.

  3. Security enhanced with increased vehicle inspections

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security enhanced with increased vehicle inspections Security measures increase as of March: vehicle inspections won't delay traffic New increased security procedures meet LANL's...

  4. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    her students on security of process control systems. I amcyber-security tools for process control systems. In theon the security mechanisms of process control systems, few

  5. Global Environmental Change and Human Security

    E-Print Network [OSTI]

    Kunnas, Jan

    2011-01-01T23:59:59.000Z

    with human rights, human security or environmental change ifEnvironmental Change and Human Security By Matthew, RichardChange and Human Security. Cambridge, Massachusetts &

  6. Security and United States Immigration Policy

    E-Print Network [OSTI]

    Totten, Robbie James

    2012-01-01T23:59:59.000Z

    Change and European Security. London: Brassey's. Furer,1981]. American National Security, 6th ed. Baltimore, MD:J. Wheeler. 2008. The Security Dilemma: Fear, Cooperation

  7. Energy and Security in Northeast Asia

    E-Print Network [OSTI]

    May, Michael; Johnson, Celeste; Fei, Edward; Suzuki, Tatsujiro

    1996-01-01T23:59:59.000Z

    regional cooperation on energy and security issues in Asia.Energy and Security in Northeast Asia An IGCC studycan be drawn. The energy security situation and outlook are

  8. Sandia Energy - Cyber Security for Electric Infrastructure

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber Security for Electric Infrastructure Home Stationary Power Grid Modernization Cyber Security for Electric Infrastructure Cyber Security for Electric Infrastructureashoter2015...

  9. Preliminary Notice of Violation, National Security Technologies...

    Office of Environmental Management (EM)

    National Security Technologies, LLC - September 26, 2014 Preliminary Notice of Violation, National Security Technologies, LLC - September 26, 2014 September 26, 2014 Security...

  10. Personnel Security - DOE Directives, Delegations, and Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    72.2 Chg 1, Personnel Security by Mark Pekrul Functional areas: Personnel Security, Security, Human Capital The order establishes requirements that will enable DOE to operate a...

  11. Some Thoughts on Teaching Secure Programming

    E-Print Network [OSTI]

    Bishop, Matt

    2013-01-01T23:59:59.000Z

    Teaching Context in Information Security,” ACM Journal onWorld Conference on Information Security Education pp. 23–Colloquium on Information Systems Security Education (CISSE)

  12. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    Analysis of Information Security Games, Proceedings of theon the Economics of Information Security WEIS’, Hanover, NH,on the Economics of Information Security’. Anderson, R. and

  13. Applying New Network Security Technologies to SCADA Systems.

    SciTech Connect (OSTI)

    Hurd, Steven A.; Stamp, Jason E. [Sandia National Laboratories, Albuquerque, NM] [Sandia National Laboratories, Albuquerque, NM; Duggan, David P. [Sandia National Laboratories, Albuquerque, NM] [Sandia National Laboratories, Albuquerque, NM; Chavez, Adrian R. [Sandia National Laboratories, Albuquerque, NM] [Sandia National Laboratories, Albuquerque, NM

    2006-11-01T23:59:59.000Z

    Supervisory Control and Data Acquisition (SCADA) systems for automation are very important for critical infrastructure and manufacturing operations. They have been implemented to work in a number of physical environments using a variety of hardware, software, networking protocols, and communications technologies, often before security issues became of paramount concern. To offer solutions to security shortcomings in the short/medium term, this project was to identify technologies used to secure %22traditional%22 IT networks and systems, and then assess their efficacy with respect to SCADA systems. These proposed solutions must be relatively simple to implement, reliable, and acceptable to SCADA owners and operators. 4This page intentionally left blank.

  14. Home and Farm Security Machinery and Equipment Identification.

    E-Print Network [OSTI]

    Nelson, Gary S.

    1982-01-01T23:59:59.000Z

    73 Fibme and Farm Security -m Machinery and Equipment identification Home and Farm Security chinery and Equipment Identification *Gary S. Nelson is no longer just an urban problem. d burglaries in rural communities have to an alarming... insurance y equipment replacement, lost work urs and so forth. mers can discourage and minimize y theft from their farms is by providing a law enforcement officers to easily identify Mark all machinery and tools with a tification number (ID). Use...

  15. Passive solar buildings

    SciTech Connect (OSTI)

    Balcomb, J.D. [ed.] [Solar Energy Research Inst., Golden, CO (United States)

    1992-10-01T23:59:59.000Z

    Developments in passive solar buildings that took place from the early 1970`s through 1989 are described. Much of the work covered was federally sponsored during the period 1975 through 1986. About half the volume is devoted to quantitative methods for modeling, simulation, and design analysis of passive buildings; the other half summarizes the quantitative results of testing and monitoring of models and buildings. The following are covered: building solar gain modeling, simulation analysis, simplified methods, materials and components, analytical results for specific systems, test modules, building integration, performance monitoring and results, and design tools. (MHR)

  16. Passive solar buildings

    SciTech Connect (OSTI)

    Balcomb, J.D. (ed.) (Solar Energy Research Inst., Golden, CO (United States))

    1992-01-01T23:59:59.000Z

    Developments in passive solar buildings that took place from the early 1970's through 1989 are described. Much of the work covered was federally sponsored during the period 1975 through 1986. About half the volume is devoted to quantitative methods for modeling, simulation, and design analysis of passive buildings; the other half summarizes the quantitative results of testing and monitoring of models and buildings. The following are covered: building solar gain modeling, simulation analysis, simplified methods, materials and components, analytical results for specific systems, test modules, building integration, performance monitoring and results, and design tools. (MHR)

  17. INSERT YOUR BUILDING NAME HERE: BUILDING EMERGENCY PLAN

    E-Print Network [OSTI]

    INSERT YOUR BUILDING NAME HERE: BUILDING EMERGENCY PLAN Date Adopted: 6/4/13 Date Revised: 6/4/13 Prepared By: Tracey Simmerman #12;PURDUE UNIVERSITY BUILDING EMERGENCY PLAN VERSION 3 2 Table of Contents Suspension or Campus Closure SECTION 3: BUILDING INFORMATION 3.1 Building Deputy/Alternate Building Deputy

  18. Buildings and Areas 1001 Broadway Building D1 BDWY

    E-Print Network [OSTI]

    Carter, John

    Design (LEED) Green Building Rating System is a nationally accepted benchmark for the designBuildings and Areas 1001 Broadway Building D1 BDWY 1313 East Columbia Building B3 CLMB Administration Building D1 ADMN Admissions & C2 ADAL Alumni Building Archbishop Murphy A1 ATMA Apartments Arrupe

  19. Embedded Commissioning for Building Design

    E-Print Network [OSTI]

    Akin, O.; Turkaslan-Bulbul, M. T.; Gursel, I.; Garrett, J. H.; Akinci, B.; Wang, H.

    2004-01-01T23:59:59.000Z

    Building Commissioning has a broad scope that extends to all phases of building delivery. We view commissioning as a building delivery embedded process that persistently verifies and validates design intent throughout the building lifecycle process...

  20. Sandia National Laboratories proof-of-concept robotic security vehicle

    SciTech Connect (OSTI)

    Harrington, J.J.; Jones, D.P.; Klarer, P.R.; Morrow, J.D.; Workhoven, R.M.; Wunderlin, F.

    1989-01-01T23:59:59.000Z

    Several years ago Sandia National Laboratories developed a prototype interior robot that could navigate autonomously inside a large complex building to air and test interior intrusion detection systems. Recently the Department of Energy Office of Safeguards and Security has supported the development of a vehicle that will perform limited security functions autonomously in a structured exterior environment. The goal of the first phase of this project was to demonstrate the feasibility of an exterior robotic vehicle for security applications by using converted interior robot technology, if applicable. An existing teleoperational test bed vehicle with remote driving controls was modified and integrated with a newly developed command driving station and navigation system hardware and software to form the Robotic Security Vehicle (RSV) system. The RSV, also called the Sandia Mobile Autonomous Navigator (SANDMAN), has been successfully used to demonstrate that teleoperated security vehicles which can perform limited autonomous functions are viable and have the potential to decrease security manpower requirements and improve system capabilities. 2 refs., 3 figs.

  1. Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMFormsGasReleaseSpeechesHallNot Logged In You must createSecurity Global

  2. physical security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron4 Self-Scrubbing:,, ,Development of NovelHigh( ( ( ( (physical security |

  3. Radiological Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTuba City,Enriched UraniumPhysical Security Systems(PA)About| National

  4. Security Commodity Team | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol HomeFacebook TwitterSearch-Comments Sign InNuclear Security

  5. Security Notice | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch > TheNuclearHomeland ScienceInnovationScience andbarrierSecurity

  6. Tag: security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our InstagramStructureProposedPAGESafety Tag: Safety Displaying 1security Tag:

  7. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our Instagram Secretary Moniz is Taking OverEvaluating ' M M t345 UnlimitedSecure

  8. Secure Storage | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our Instagram Secretary Moniz is Taking OverEvaluating ' M M t345Secure Storage

  9. Also Known As (Room or Building)

    E-Print Network [OSTI]

    Mottram, Nigel

    Room No. Also Known As (Room or Building) Hearing Assistance Type 702 InfraRed 704 InfraRed 706 Smith Building Adam Smith Building Adam Smith Building Adam Smith Building Adam Smith Building Adam Smith Building Adam Smith Building Adam Smith Building Adam Smith Building Adam Smith Building Adam

  10. Building Energy Monitoring and Analysis

    E-Print Network [OSTI]

    Hong, Tianzhen

    2014-01-01T23:59:59.000Z

    platforms and  building automation systems (BAS), a building  automation  control,  fault  detection  and  diagnostics  (FDD),  and  continuous  system 

  11. Indoor Air Quality Forms 195 Building: _________________________________________________________ File Number: ________________________________

    E-Print Network [OSTI]

    operational? Cooling Coil Inspection access? Clean? Supply water temp. O F Water carryover? Any indication? Odors from outdoors? (describe) Carryover of exhaust heat? Cooling tower within 25 feet? Exhaust outletOKComponent Comments Mist Eliminators Clean, straight, no carryover? Supply Fan Chambers Clean? No trash or storage

  12. Hanford Facility Beryllium Fact Sheet Building Number/Name:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField8,Dist.NewofGeothermal848 UnlimitedIntegrated DisposalWaste06KE Rad Con

  13. Hanford Facility Beryllium Fact Sheet Building Number/Name:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField8,Dist.NewofGeothermal848 UnlimitedIntegrated DisposalWaste06KE Rad

  14. Hanford Facility Beryllium Fact Sheet Building Number/Name:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField8,Dist.NewofGeothermal848 UnlimitedIntegrated DisposalWaste06KE Rad2S

  15. Hanford Facility Beryllium Fact Sheet Building Number/Name:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField8,Dist.NewofGeothermal848 UnlimitedIntegrated DisposalWaste06KE Rad2S9-E

  16. Hanford Facility Beryllium Fact Sheet Building Number/Name:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField8,Dist.NewofGeothermal848 UnlimitedIntegrated DisposalWaste06KE

  17. Hanford Facility Beryllium Fact Sheet Building Number/Name:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField8,Dist.NewofGeothermal848 UnlimitedIntegrated DisposalWaste06KE1Z

  18. Hanford Facility Beryllium Fact Sheet Building Number/Name:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField8,Dist.NewofGeothermal848 UnlimitedIntegrated DisposalWaste06KE1Z45Z

  19. Hanford Facility Beryllium Fact Sheet Building Number/Name:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField8,Dist.NewofGeothermal848 UnlimitedIntegrated DisposalWaste06KE1Z45Z36Z

  20. Hanford Facility Beryllium Fact Sheet Building Number/Name:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField8,Dist.NewofGeothermal848 UnlimitedIntegrated DisposalWaste06KE1Z45Z36Z

  1. Hanford Facility Beryllium Fact Sheet Building Number/Name:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField8,Dist.NewofGeothermal848 UnlimitedIntegrated

  2. Hanford Facility Beryllium Fact Sheet Building Number/Name:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField8,Dist.NewofGeothermal848 UnlimitedIntegrated Responsible Contractor:

  3. Hanford Facility Beryllium Fact Sheet Building Number/Name:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField8,Dist.NewofGeothermal848 UnlimitedIntegrated Responsible Contractor:ZB

  4. Hanford Facility Beryllium Fact Sheet Building Number/Name:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField8,Dist.NewofGeothermal848 UnlimitedIntegrated Responsible

  5. Table B10. Employment Size Category, Number of Buildings, 1999

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are nowTotal" (Percent) Type: Sulfur Content API GravityDakota" "Fuel, quality", 2013,Iowa"Dakota" ,"FullWestQuantity of2". Summary Table:0.

  6. Table B8. Year Constructed, Number of Buildings, 1999

    U.S. Energy Information Administration (EIA) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are nowTotal" (Percent) Type: Sulfur Content API GravityDakota" "Fuel, quality", 2013,Iowa"Dakota" ,"FullWestQuantity of2".9.

  7. Engineering secure software

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01T23:59:59.000Z

    the vulnerabilities based on their coverage and cost. The above modeling approach is also known as thc onion peel model due to its nature of dividing the problem space into zones of similar security. These zones represent the peels of the onion. Each zone is also... into peels based on the security considerations of the entities of the system. The model describes minimum interaction among components across peels and maximum within peels. The onion diagram includes the physical entities of the systems and not just...

  8. GAANN -Computer Systems Security GAANN Computer Systems Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important? ­ Computing devices have a large impact on our daily life ­ Guaranteeing that the devices perform as desired

  9. Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability

    E-Print Network [OSTI]

    Ragsdale, G.

    -25, 2010 Implementing TCG Standards Within Systems ? Trusted Platform Module (TPM) ? Provides root of trust ? Secure storage ? Signing & hashing functions ? Tamper detection ? Accelerates cryptography ? TPM software stack ? Implements TCG stack... Update Session Security (symmetric key) Code and Data Integrity (memory hash) ?Secure secret storage ?TPM chip root trust secret ?Owner root trust secret ?Memory hash signature ?Standard encryption algorithm ?Standard hashing algorithm ?Tamper detection...

  10. SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011

    E-Print Network [OSTI]

    SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011 Choose brands and models of mobile devices that have the options referenced below. Use all available security options that your or sensitive university information in un-approved off-campus services, such as public cloud based services

  11. Security Patterns: Comparing Modeling Approaches Armstrong NHLABATSI

    E-Print Network [OSTI]

    Jurjens, Jan

    Security Patterns: Comparing Modeling Approaches Armstrong NHLABATSI ** , Arosha BANDARA the challenges of developing secure software systems remains an active research area in software engineering. Current research efforts have resulted in the documentation of recurring security problems as security

  12. INFORMATION SECURITY University Policy No: IM7800

    E-Print Network [OSTI]

    Herwig, Falk

    Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

  13. Departmental Personnel Security- Clearance Automation

    Broader source: Energy.gov [DOE]

    The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

  14. Database Security: A Historical Perspective

    E-Print Network [OSTI]

    Lesov, Paul

    2010-01-01T23:59:59.000Z

    The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

  15. Computer Security Incident Handling Guide

    E-Print Network [OSTI]

    States Computer Emergency Readiness Team National Cyber Security Division Department of Homeland Security of Standards and Technology Gaithersburg, MD Karen Scarfone Scarfone Cybersecurity C O M P U T E R S E C U R I

  16. System security Dr Len Hamey

    E-Print Network [OSTI]

    Hamey, Len

    , firewalls, detecting intrusions) Security process cycle policy implementation administration audit risk access with firewall Use generic service banners Use intrusion detection system that can detect;2 Security Services Confidentiality service. Authentication service. Integrity service. Access Control

  17. Enhancing Transportation Energy Security through Advanced Combustion...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Transportation Energy Security through Advanced Combustion and Fuels Technologies Enhancing Transportation Energy Security through Advanced Combustion and Fuels Technologies 2005...

  18. Line Management Perspective: National Nuclear Security Administration...

    Broader source: Energy.gov (indexed) [DOE]

    National Nuclear Security Administration (NNSA) Line Management Perspective: National Nuclear Security Administration (NNSA) Addthis Description Slide Presentation by Jim...

  19. Office of Security Assessments | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    information, personnel security, and foreign visits and assignments. Assesses the information security practices at facilities managing special access programs and...

  20. Secretary Richardson Accepts Recommendations for Improving Security...

    National Nuclear Security Administration (NNSA)

    Secretary Richardson Accepts Recommendations for Improving Security at Nuclear Weapons Laboratories | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS...

  1. Security Science & Technology | Nuclear Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Science & Technology Border Security Comprehensive Vulnerability and Threat Analysis Consequence Management, Safeguards, and Non-Proliferation Tools Export...

  2. East Asian Security in 2025

    E-Print Network [OSTI]

    Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

    2008-01-01T23:59:59.000Z

    East Asian Security in 2025 Who We Are • Reagan Heavin – Energy • Adam Hudson – State Capacity • Brandon Krueger – Military • Sean O’Neil – Demographics • Griffin Rozell – Balance of Power • Matt Suma – Economy East Asian Security in 2025 China...: Competition, Cooperation, Plateau? Reagan Heavin Adam Hudson Brandon Krueger Sean O’Neil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda • Conclusions • Projections • Drivers • Four Outcomes • Questions East Asian Security in 2025...

  3. Safeguards and Security Program References

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

  4. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12T23:59:59.000Z

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

  5. Safeguard Security and Awareness Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-10-02T23:59:59.000Z

    Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

  6. Re-Assessing Green Building Performance: A Post Occupancy Evaluation of 22 GSA Buildings

    SciTech Connect (OSTI)

    Fowler, Kimberly M.; Rauch, Emily M.; Henderson, Jordan W.; Kora, Angela R.

    2010-06-01T23:59:59.000Z

    2nd report on the performance of GSA's sustainably designed buildings. The purpose of this study was to provide an overview of measured whole building performance as it compares to GSA and industry baselines. The PNNL research team found the data analysis illuminated strengths and weaknesses of individual buildings as well as the portfolio of buildings. This section includes summary data, observations that cross multiple performance metrics, discussion of lessons learned from this research, and opportunities for future research. The summary of annual data for each of the performance metrics is provided in Table 25. The data represent 1 year of measurements and are not associated with any specific design features or strategies. Where available, multiple years of data were examined and there were minimal significant differences between the years. Individually focused post occupancy evaluation (POEs) would allow for more detailed analysis of the buildings. Examining building performance over multiple years could potentially offer a useful diagnostic tool for identifying building operations that are in need of operational changes. Investigating what the connection is between the building performance and the design intent would offer potential design guidance and possible insight into building operation strategies. The 'aggregate operating cost' metric used in this study represents the costs that were available for developing a comparative industry baseline for office buildings. The costs include water utilities, energy utilities, general maintenance, grounds maintenance, waste and recycling, and janitorial costs. Three of the buildings that cost more than the baseline in Figure 45 have higher maintenance costs than the baseline, and one has higher energy costs. Given the volume of data collected and analyzed for this study, the inevitable request is for a simple answer with respect to sustainably designed building performance. As previously stated, compiling the individual building values into single metrics is not statistically valid given the small number of buildings, but it has been done to provide a cursory view of this portfolio of sustainably designed buildings. For all metrics except recycling cost per rentable square foot and CBE survey response rate, the averaged building performance was better than the baseline for the GSA buildings in this study.

  7. BUILDING EMERGENCY ACTION PLAN [Medical Sciences Building, Building # 192] / [506 S. Mathews, Urbana

    E-Print Network [OSTI]

    Gilbert, Matthew

    BUILDING EMERGENCY ACTION PLAN [Medical Sciences Building, Building # 192] / [506 S. Mathews requires the BUILDING EMERGENCY MANAGEMENT TEAM: Building Command Post1 1. M2 classroom, Carle Forum This Building Emergency Action Plan (BEAP) is to be used in conjunction with the Emergency Response Guide (ERG

  8. Achieving 50% Energy Savings in Office Buildings, Advanced Energy Design Guides: Office Buildings (Brochure)

    SciTech Connect (OSTI)

    Not Available

    2014-09-01T23:59:59.000Z

    This fact sheet summarizes recommendations for designing new office buildings that result in 50% less energy use than conventional designs meeting minimum code requirements. The recommendations are drawn from the Advanced Energy Design Guide for Small to Medium Office Buildings, an ASHRAE publication that provides comprehensive recommendations for designing low-energy-use office buildings with gross floor areas up to 100,000 ft2 (see sidebar). Designed as a stand-alone document, this fact sheet provides key principles and a set of prescriptive design recommendations appropriate for smaller office buildings with insufficient budgets to fully implement best practices for integrated design and optimized performance. The recommendations have undergone a thorough analysis and review process through ASHRAE, and have been deemed the best combination of measures to achieve 50% savings in the greatest number of office buildings.

  9. Simulated Interdiction: Proliferation Security Initiative

    E-Print Network [OSTI]

    2009-01-01T23:59:59.000Z

    ………………………………... Technical Capabilities to Support PSI ………………………………… Foreign Policy and External Relations ………………………............... Republic of Bevostan ………………………………………………………….. Geography ……………………………………………………………... iii 1 3 4 5 6 7 8 8 8 8 8 9 9 10... Security, Science and Policy Institute (NSSPI) Texas A&M University May 6, 2009 Simulated Interdiction: The Proliferation Security Initiative (PSI) Acknowledgements The National Nuclear Security Administration (NNSA) of the U.S. Department...

  10. Security and Verification Provable cryptography

    E-Print Network [OSTI]

    Gregoire, Benjamin - Institut National de Recherche en Informatique et en Automatique, Centre de recherche Sophia Antipolis

    Security and Verification Provable cryptography Benjamin Grégoire1 Tamara Rezk1 1INRIA Sophia Antipolis - Méditerranée, France Cours de Master 2 Univerisité de Nice Sophia-Antipolis Security and Verification 1/ 33 #12;Cryptanalysis-driven Security Propose a cryptographic scheme Wait for someone to come

  11. MINIMUM SECURITY REQUIREMENTS FOR FEDERAL

    E-Print Network [OSTI]

    March 2006 MINIMUM SECURITY REQUIREMENTS FOR FEDERAL INFORMATION AND INFORMATION SYSTEMS: FEDERAL INFORMATION PROCESSING STANDARD (FIPS) 200 APPROVED BY THE SECRETARY OF COMMERCE MINIMUM SECURITY REQUIREMENTS BY THE SECRETARY OF COMMERCE Shirley Radack, EditorShirley Radack, Editor Computer Security Division

  12. RECOMMENDED SECURITY CONTROLS FOR FEDERAL

    E-Print Network [OSTI]

    May 2005 RECOMMENDED SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS: GUIDANCE FOR SELECTING COST-EFFECTIVE CONTROLS USING A RISK-BASED PROCESS Shirley Radack, Editor, Computer Security Division, Information Technology Laboratory National Institute of Standards and Technology Security controls are the management

  13. Positioning Security from electronic warfare

    E-Print Network [OSTI]

    Kuhn, Markus

    Positioning Security from electronic warfare to cheating RFID and road-tax systems Markus Kuhn;Military positioning-security concerns Electronic warfare is primarily about denying or falsifying location of the importance of global positioning security has led to the military discipline of "navigation warfare". 5 #12

  14. Information Technology Security Assessment Framework

    E-Print Network [OSTI]

    Federal Information Technology Security Assessment Framework November 28, 2000 Prepared (NIST) Computer Security Division #12;Overview Information and the systems that process it are among and maintain a program to adequately secure its information and system assets. Agency programs must: 1) assure

  15. Foundations for Designing Secure Architectures

    E-Print Network [OSTI]

    Jurjens, Jan

    Architectures This talk: foundations for designing software architectures for secure systems, based their architectures. Will apply specialized tool-support to automatically evaluate the designs for potential security weaknesses. (Based on tutorial at WICSA 2004.) #12;Jan Jürjens, TU Munich: Foundations for Designing Secure

  16. GEORG-AUGUST-UNIVERSITT Computer Security

    E-Print Network [OSTI]

    Grabowski, Jens

    GEORG-AUGUST-UNIVERSITÄT GÖTTINGEN Computer Security Overview and Introduction Computer Security Security @ Göttingen » Research group for comuter security » Prof. Dr. Konrad Rieck » 4 PhD students (+ 2 security » Research on analysis, detection and prevention of threats » Development of intelligent security

  17. SECURITY TECHNIQUES Chris J Mitchell1

    E-Print Network [OSTI]

    Mitchell, Chris

    SECURITY TECHNIQUES Chris J Mitchell1 Introduction In this paper we consider the range of security security has been exerted. However, the techniques described are of general applicability by a security technique; in doing so we will distinguish between security features and security techniques (or

  18. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12T23:59:59.000Z

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  19. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16T23:59:59.000Z

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  20. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28T23:59:59.000Z

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  1. The decommodified security ratio

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    are currently experiencing: changing patterns of work, the phenom- enon she calls the "breakdown in the wage furthered by the work of the International Labour Office. In particular, the programme of researchThe decommodified security ratio: A tool for assessing European social protection systems Georges

  2. Transmission Line Security Monitor

    ScienceCinema (OSTI)

    None

    2013-05-28T23:59:59.000Z

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  3. Conceptualizing Energy Security

    E-Print Network [OSTI]

    Winzer, Christian

    Energy security is one of the main targets of energy policy. However, the term has not been clearly defined, which makes it hard to measure and difficult to balance against other policy objectives. We review the multitude of definitions of energy...

  4. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21T23:59:59.000Z

    To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

  5. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

  6. December 2003 SECURITY CONSIDERATIONS

    E-Print Network [OSTI]

    Perkins, Richard A.

    security early in the information system development life cycle (SDLC), you may be able to avoid higher, with tailoring, to any SDLC model or acquisition method the organization is using. The appendices to the guide.nist.gov/publications/nistpubs/ index.html. The System Development Life Cycle (SDLC) The system development life cycle starts

  7. National Security System Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-03-08T23:59:59.000Z

    The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

  8. Metaphors for cyber security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01T23:59:59.000Z

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  9. Transmission Line Security Monitor

    SciTech Connect (OSTI)

    None

    2011-01-01T23:59:59.000Z

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  10. A network security monitor

    SciTech Connect (OSTI)

    Heberlein, L.T.; Dias, G.V.; Levitt, K.N.; Mukherjee, B.; Wood, J.; Wolber, D. (California Univ., Davis, CA (USA). Dept. of Electrical Engineering and Computer Science)

    1989-11-01T23:59:59.000Z

    The study of security in computer networks is a rapidly growing area of interest because of the proliferation of networks and the paucity of security measures in most current networks. Since most networks consist of a collection of inter-connected local area networks (LANs), this paper concentrates on the security-related issues in a single broadcast LAN such as Ethernet. Specifically, we formalize various possible network attacks and outline methods of detecting them. Our basic strategy is to develop profiles of usage of network resources and then compare current usage patterns with the historical profile to determine possible security violations. Thus, our work is similar to the host-based intrusion-detection systems such as SRI's IDES. Different from such systems, however, is our use of a hierarchical model to refine the focus of the intrusion-detection mechanism. We also report on the development of our experimental LAN monitor currently under implementation. Several network attacks have been simulated and results on how the monitor has been able to detect these attacks are also analyzed. Initial results demonstrate that many network attacks are detectable with our monitor, although it can surely be defeated. Current work is focusing on the integration of network monitoring with host-based techniques. 20 refs., 2 figs.

  11. Building Energy Code

    Broader source: Energy.gov [DOE]

    Authority for adopting the state energy codes was previously vested in the Energy Security Office of the Department of Commerce (originally the Department of Public Services). In 1999-2000, the...

  12. The Lovejoy Building

    High Performance Buildings Database

    Portland, OR Originally built in 1910 as the stables for the Marshall-Wells Hardware Company, the Lovejoy Building is the home of Opsis Architects. The owner/architects purchased and renovated the historic building to house their growing business and to provide ground-floor office lease space and second-floor offices for their firm. Opsis wanted to use the building to experience and demonstrate the technologies and practices it promotes with clients.

  13. City of Grand Rapids Building Solar Roof Demonstration

    SciTech Connect (OSTI)

    DeClercq, Mark; Martinez, Imelda

    2012-08-31T23:59:59.000Z

    Grand Rapids, Michigan is striving to reduce it environmental footprint. The municipal government organization has established environmental sustainability policies with the goal of securing 100% of its energy from renewable sources by 2020. This report describes the process by which the City of Grand Rapids evaluated, selected and installed solar panels on the Water/Environmental Services Building. The solar panels are the first to be placed on a municipal building. Its new power monitoring system provides output data to assess energy efficiency and utilization. It is expected to generate enough clean solar energy to power 25 percent of the building. The benefit to the public includes the economic savings from reduced operational costs for the building; an improved environmentally sustainable area in which to live and work; and increased knowledge about the use of solar energy. It will serve as a model for future energy saving applications.

  14. Building Songs 10

    E-Print Network [OSTI]

    Zla ba sgrol ma

    2009-11-06T23:59:59.000Z

    . Sman shad building song 10.WAV Length of track 00:06:03 Related tracks (include description/relationship if appropriate) Title of track Building Songs 10 Translation of title Description (to be used in archive entry) Male villagers... sing a building song. Genre or type (i.e. epic, song, ritual) Building song Name of recorder (if different from collector) Zla ba sgrol ma Date of recording November 6th 2009. Place of recording Gad dmar khug market Mda' ma Township, Sde dge...

  15. What is Building America?

    SciTech Connect (OSTI)

    None

    2013-06-20T23:59:59.000Z

    DOE's Building America program is helping to bridge the gap between homes with high energy costs and homes that are healthy, durable, and energy efficient.

  16. Building Songs 11

    E-Print Network [OSTI]

    Zla ba sgrol ma

    2009-11-06T23:59:59.000Z

    . Sman shad building song 11.WAV Length of track 00:21:12 Related tracks (include description/relationship if appropriate) Title of track Building Songs 11 Translation of title Description (to be used in archive entry) Male villagers... sing a building song. Genre or type (i.e. epic, song, ritual) Building song Name of recorder (if different from collector) Zla ba sgrol ma Date of recording November 6th 2009. Place of recording Gad dmar khug market Mda' ma Township, Sde dge...

  17. ORISE: Capacity Building

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Capacity Building Because public health agencies must maintain the resources to respond to public health challenges, critical situations and emergencies, the Oak Ridge Institute...

  18. What is Building America?

    ScienceCinema (OSTI)

    None

    2013-07-22T23:59:59.000Z

    DOE's Building America program is helping to bridge the gap between homes with high energy costs and homes that are healthy, durable, and energy efficient.

  19. Building Science- Ventilation

    Broader source: Energy.gov [DOE]

    This presentation was given at the Summer 2012 DOE Building America meeting on July 25, 2012, and addressed the question Ť"What are the best ventilation techniques"

  20. High Performance Sustainable Buildings

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to achieve Leadership in Energy and Environmental Design gold certification from the U.S. Green Building Council. The Center for Integrated Nanotechnologies brings together...