Powered by Deep Web Technologies
Note: This page contains sample records for the topic "building number secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Building security requirements with CLASP  

Science Conference Proceedings (OSTI)

Traditionally, security requirements have been derived in an ad hoc manner. Recently, commercial software development organizations have been looking for ways to produce effective security requirements.In this paper, we show how to build security ... Keywords: application security, security process, security requirements

John Viega

2005-07-01T23:59:59.000Z

2

Maximum Building Energy Efficiency Research Laboratory secures...  

NLE Websites -- All DOE Office Websites (Extended Search)

Design Network - Maximum Building Energy Efficiency Research Laboratory secures LEED Gold July 01, 2013 The recently completed 14.3m Maximum Building Energy Efficiency...

3

ADP Security Plan, Math Building, Room 1139  

SciTech Connect

This document provides the draft copy of an updated (ADP) Security Plan for an IBM Personal Computer to be used in the Math Building at PNL for classified data base management. Using the equipment specified in this document and implementing the administrative and physical procedures as outlined will provide the secure environment necessary for this work to proceed.

Melton, R.

1985-08-27T23:59:59.000Z

4

Table B6. Building Size, Number of Buildings, 1999  

U.S. Energy Information Administration (EIA) Indexed Site

B6. Building Size, Number of Buildings, 1999" B6. Building Size, Number of Buildings, 1999" ,"Number of Buildings (thousand)" ,"All Buildings ","Building Size" ,,"1,001 to 5,000 Square Feet","5,001 to 10,000 Square Feet","10,001 to 25,000 Square Feet","25,001 to 50,000 Square Feet","50,001 to 100,000 Square Feet","100,001 to 200,000 Square Feet","200,001 to 500,000 Square Feet","Over 500,000 Square Feet" "All Buildings ................",4657,2348,1110,708,257,145,59,23,7 "Principal Building Activity" "Education ....................",327,119,61,52,49,30,10,5,"Q" "Food Sales ...................",174,138,"Q","Q","Q","Q","Q","N","N"

5

Table B14. Number of Establishments in Building, Number of Buildings, 1999  

U.S. Energy Information Administration (EIA) Indexed Site

4. Number of Establishments in Building, Number of Buildings, 1999" 4. Number of Establishments in Building, Number of Buildings, 1999" ,"Number of Buildings (thousand)" ,"All Buildings","Number of Establishments in Building" ,,"One","Two to Five","Six to Ten","Eleven to Twenty","More than Twenty","Currently Unoccupied" "All Buildings ................",4657,3528,688,114,48,27,251 "Building Floorspace" "(Square Feet)" "1,001 to 5,000 ...............",2348,1897,272,"Q","Q","Q",164 "5,001 to 10,000 ..............",1110,802,222,17,"Q","Q","Q" "10,001 to 25,000 .............",708,506,121,51,12,"Q",17 "25,001 to 50,000 .............",257,184,33,15,15,"Q","Q"

6

Social Security Number Reduction Project | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

regarding acceptable uses of the Social Security Number (SSN). PA09BASELINEINVENTORY.xls More Documents & Publications DOE Guidance on the Use of the SSN Occupational...

7

Number of U.S. Commercial Buildings  

U.S. Energy Information Administration (EIA)

Glossary Home > Households, Buildings & Industry > Energy Efficiency > Commercial Buildings Energy Intensities > Table 2

8

Energy Security Planning for Sustainable Buildings | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Program Areas » Sustainable Buildings & Campuses » Energy Program Areas » Sustainable Buildings & Campuses » Energy Security Planning for Sustainable Buildings Energy Security Planning for Sustainable Buildings October 4, 2013 - 4:56pm Addthis For energy security, Federal facility managers have a responsibility to consider a broad array of potential threats and incident scenarios. An underlying process or methodology is essential to comprehensively and intelligently address all elements of energy security analysis. Given recent blackouts and concerns about vulnerable infrastructure, many public and private organizations are taking steps to ensure reliable power and continuity of operations in the event of future outages. Some government facilities have the capacity to survive short-term power outages, but are now evaluating whether their back-up power capabilities

9

ADP security plan, 320 Building, Room 110  

SciTech Connect

The enclosed document is a draft ADP Security Plan. This plan follows outline provided by DOE Order 5636.2. The outline is in the following format: (1) name of computing system security offices and ADP systems; (2) purpose and operational characteristics; (3) configuration and descriptions of ADP equipment; (4) percentage and level of classified work; (5) description of communication networks; (6) statement of threat; (7) security procedures; (8) contingency plans; and (9) NACSI 5004 evaluation.

Brauer, F.P.

1985-08-27T23:59:59.000Z

10

Securing America's Future with Energy Efficient Buildings | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Securing America's Future with Energy Efficient Buildings Securing America's Future with Energy Efficient Buildings Securing America's Future with Energy Efficient Buildings What We Do We lead a vast network of research and industry partners to continually develop innovative, cost-effective energy saving solutions-better products, better new homes, better ways to improve older homes, and better buildings in which we work, shop, and lead our everyday lives. Why It Matters Energy efficiency is a low cost way to save money, support job growth, reduce pollution, and improve the competitiveness of our businesses. Our homes, offices, schools, hospitals, restaurants, and stores consume a lot of energy-and money. We spend more than $400 billion each year to power our homes and commercial buildings, consuming more than 70% of all

11

Table B15. Number of Establishments in Building, Floorspace, 1999  

U.S. Energy Information Administration (EIA) Indexed Site

5. Number of Establishments in Building, Floorspace, 1999" 5. Number of Establishments in Building, Floorspace, 1999" ,"Total Floorspace (million square feet)" ,"All Buildings","Number of Establishments in Building" ,,"One","Two to Five","Six to Ten","Eleven to Twenty","More than Twenty","Currently Unoccupied" "All Buildings ................",67338,43343,10582,3574,3260,4811,1769 "Building Floorspace" "(Square Feet)" "1,001 to 5,000 ...............",6774,5358,857,"Q","Q","Q",512 "5,001 to 10,000 ..............",8238,5952,1630,137,"Q","Q","Q" "10,001 to 25,000 .............",11153,7812,1982,784,"Q","Q",296

12

Table B27. Cooking Energy Sources, Number of Buildings and Floorspace...  

U.S. Energy Information Administration (EIA) Indexed Site

7. Cooking Energy Sources, Number of Buildings and Floorspace, 1999" ,"Number of Buildings (thousand)",,,,,"Total Floorspace (million square feet)" ,"All Buildings","All Buildings...

13

Table B37. Water Heating Equipment, Number of Buildings and Floorspace...  

U.S. Energy Information Administration (EIA) Indexed Site

7. Water Heating Equipment, Number of Buildings and Floorspace, 1999" ,"Number of Buildings (thousand)",,,,,"Total Floorspace (million square feet)" ,"All Buildings","All Buildings...

14

Environment/Health/Safety/Security (EHSS): Building Access  

NLE Websites -- All DOE Office Websites (Extended Search)

Building Access Building Access Access Control - On-site access is controlled by either keys or by LBNL's automated access control system. LBNL's automated access control system is used for exterior perimeter doors to most buildings, as well as some individual labs, offices, and equipment. The access system is linked to the LBNL Human Resources PeopleSoft database and is updated with the employees' or affiliates' current appointment status at the Laboratory. . If your LBNL appointment end date has expired, then your access will be suspended. Security Access Managers (SAM) Administrators - LBNL's automated access control system is a decentralized access permission control structure managed by each Division or major program via Security Access Managers (SAM) Administrators and In-putters. Go here for the current

15

U-Launch Winner Secures $2.4M Investment for Building Energy...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-Launch Winner Secures 2.4M Investment for Building Energy Performance Software U-Launch Winner Secures 2.4M Investment for Building Energy Performance Software December 14,...

16

Table B10. Employment Size Category, Number of Buildings, 1999  

U.S. Energy Information Administration (EIA) Indexed Site

0. Employment Size Category, Number of Buildings, 1999" 0. Employment Size Category, Number of Buildings, 1999" ,"Number of Buildings (thousand)" ,"All Buildings","Number of Workers" ,,"Fewer than 5 Workers","5 to 9 Workers","10 to 19 Workers","20 to 49 Workers","50 to 99 Workers","100 to 249 Workers","250 or More Workers" "All Buildings ................",4657,2376,807,683,487,174,90,39 "Building Floorspace" "(Square Feet)" "1,001 to 5,000 ...............",2348,1567,482,226,66,"Q","Q","N" "5,001 to 10,000 ..............",1110,511,180,249,144,"Q","Q","N" "10,001 to 25,000 .............",708,250,105,146,157,46,"Q","Q"

17

Table B8. Year Constructed, Number of Buildings, 1999  

U.S. Energy Information Administration (EIA) Indexed Site

B8. Year Constructed, Number of Buildings, 1999" B8. Year Constructed, Number of Buildings, 1999" ,"Number of Buildings (thousand)" ,"All Buildings","Year Constructed" ,,"1919 or Before","1920 to 1945","1946 to 1959","1960 to 1969","1970 to 1979","1980 to 1989","1990 to 1999" "All Buildings ................",4657,419,499,763,665,774,846,690 "Building Floorspace" "(Square Feet)" "1,001 to 5,000 ...............",2348,227,270,359,321,367,413,390 "5,001 to 10,000 ..............",1110,107,102,240,166,193,156,145 "10,001 to 25,000 .............",708,63,90,97,84,130,179,65 "25,001 to 50,000 .............",257,13,20,39,53,44,43,44 "50,001 to 100,000 ............",145,7,9,19,24,26,33,27

18

Table B6. Building Size, Number of Buildings, 1999  

U.S. Energy Information Administration (EIA) Indexed Site

4,657 4,657 2,348 1,110 708 257 145 59 23 7 Principal Building Activity Education .................................................... 327 119 61 52 49 30 10 5 Q Food Sales .................................................. 174 138 Q Q Q Q Q N N Food Service ............................................... 349 251 71 23 Q Q Q N N Health Care ................................................. 127 64 Q 10 8 4 2 2 1 Inpatient ..................................................... 11 N N Q Q Q 2 2 1 Outpatient .................................................. 116 64 Q Q 7 Q Q Q Q Lodging ........................................................ 153 Q 38 27 32 11 4 3 Q Mercantile .................................................... 667 316 146 141 28 20 13 2 1 Retail (Other Than Mall) ............................ 534 308 103 100 11 6 5 Q Q Enclosed and Strip Malls ...........................

19

A Cryptographically Secure Random Number G enerator for ... - CECM  

E-Print Network (OSTI)

512, 768 and 1024 bits with guaranteed long period. We also .... term security, 768 or 102 4 bit primes. In section 3 ..... The cost of a Fermat pseudo-prime test,.

20

Table B16. Multibuilding Facilities, Number of Buildings and Floorspace, 1999  

U.S. Energy Information Administration (EIA) Indexed Site

6. Multibuilding Facilities, Number of Buildings and Floorspace, 1999" 6. Multibuilding Facilities, Number of Buildings and Floorspace, 1999" ,"Number of Buildings (thousand)",,,"Total Floorspace (million square feet)" ,"All Buildings","Buildings on Multibuilding Facilities",,"All Buildings","Buildings on Multibuilding Facilities" ,,"All Buildings","With Central Physical Plant",,"All Buildings","With Central Physical Plant" "All Buildings ................",4657,1362,142,67338,26049,7101 "Building Floorspace" "(Square Feet)" "1,001 to 5,000 ...............",2348,604,"Q",6774,1706,"Q" "5,001 to 10,000 ..............",1110,297,"Q",8238,2211,"Q"

Note: This page contains sample records for the topic "building number secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

U-Launch Winner Secures $2.4M Investment for Building Energy Performance  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-Launch Winner Secures $2.4M Investment for Building Energy U-Launch Winner Secures $2.4M Investment for Building Energy Performance Software U-Launch Winner Secures $2.4M Investment for Building Energy Performance Software December 14, 2011 - 3:00pm Addthis This screenshot from cleantech start-up company FirstFuel's building energy efficiency performance software shows users a building's response to all forms of weather, operational schedules, key energy metrics, daily consumption patterns, seasonal analysis, peak loading, and shell integrity. | Photo courtesy of FirstFuel. This screenshot from cleantech start-up company FirstFuel's building energy efficiency performance software shows users a building's response to all forms of weather, operational schedules, key energy metrics, daily consumption patterns, seasonal analysis, peak loading, and shell integrity.

22

On building a lightweight security architecture for sensor networks  

Science Conference Proceedings (OSTI)

Sensor networks are characterized by their large-scale and unattended deployment that invites numerous critical attacks, thereby necessitating high-level security support for their intended applications and services. However, making sensor networks secure ...

Taejoon Park; Kang G. Shin

2006-08-01T23:59:59.000Z

23

Table B36. Refrigeration Equipment, Number of Buildings and Floorspace, 1999  

U.S. Energy Information Administration (EIA) Indexed Site

6. Refrigeration Equipment, Number of Buildings and Floorspace, 1999" 6. Refrigeration Equipment, Number of Buildings and Floorspace, 1999" ,"Number of Buildings (thousand)",,,,,"Total Floorspace (million square feet)" ,"All Buildings","All Buildings with Refrigeration Equipment","Type of Equipment (more than one may apply)",,,"All Buildings","All Buildings with Refrigeration Equipment","Type of Equipment (more than one may apply)" ,,,"Walk-In","Open Cases or Cabinets","Closed Cases or Cabinets",,,"Walk-In","Open Cases or Cabinets","Closed Cases or Cabinets" "All Buildings ................",4657,950,658,255,719,67338,25652,19713,8808,19938 "Building Floorspace"

24

A Cryptographically Secure Random Number G enerator for ... - CECM  

E-Print Network (OSTI)

*The work was supported by the MI T ACS NCE o f C a n ada . 1. Page 2. 1 Introduction. Definition 1.1 A pseudo random number generator, PRNG for short, is a.

25

Building America Developments, September 2000, Information Bulletin Number 1 (Revised)  

SciTech Connect

Building America Developments on-line newsletter highlights the Erie-Ellington Homes publicly-funded housing project in Boston, Massachusetts. A Building America and industry partnership that produced energy-efficient manufactured homes built with foam core panels is featured. Also, Habitat for Humanity dedicates two energy-efficient test houses in East Tennessee, and affordable, healthy homes are offered in metro Atlanta. Upcoming events in the Building America Program are also listed.

Hendron, R.; Anderson, J.; Epstein, K.

2001-12-01T23:59:59.000Z

26

U.S. No Longer Building Any Nuclear Weapons | National Nuclear Security  

National Nuclear Security Administration (NNSA)

No Longer Building Any Nuclear Weapons | National Nuclear Security No Longer Building Any Nuclear Weapons | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Our History > NNSA Timeline > U.S. No Longer Building Any Nuclear Weapons U.S. No Longer Building Any Nuclear Weapons May 10, 1992 Washington, DC U.S. No Longer Building Any Nuclear Weapons

27

Security  

Science Conference Proceedings (OSTI)

... Security. Organizations need standards, guidelines, and ... to support health IT implementations. HIPAA Security Rule Toolkit. ...

2011-12-05T23:59:59.000Z

28

Leveraging Mobility: Building Wealth, Security and Opportunity for Family Well-Being  

E-Print Network (OSTI)

Challenges in Leveraging Mobility In 1998 Michelle and Bob Johnson were part of a new African American middleLeveraging Mobility: Building Wealth, Security and Opportunity for Family Well-Being Hannah Thomas, Janet Boguslaw, Alexis Mann, and Thomas Shapiro November 2013 Leveraging Mobility Series #12;The Real

Snider, Barry B.

29

Table B29. Percent of Floorspace Cooled, Number of Buildings and Floorspace, 199  

U.S. Energy Information Administration (EIA) Indexed Site

9. Percent of Floorspace Cooled, Number of Buildings and Floorspace, 1999" 9. Percent of Floorspace Cooled, Number of Buildings and Floorspace, 1999" ,"Number of Buildings (thousand)",,,,,"Total Floorspace (million square feet)" ,"All Buildings","Not Cooled","1 to 50 Percent Cooled","51 to 99 Percent Cooled","100 Percent Cooled","All Buildings","Not Cooled","1 to 50 Percent Cooled","51 to 99 Percent Cooled","100 Percent Cooled" "All Buildings ................",4657,1097,1012,751,1796,67338,8864,16846,16966,24662 "Building Floorspace" "(Square Feet)" "1,001 to 5,000 ...............",2348,668,352,294,1034,6774,1895,1084,838,2957 "5,001 to 10,000 ..............",1110,282,292,188,348,8238,2026,2233,1435,2544

30

Table B30. Percent of Floorspace Lit When Open, Number of Buildings and Floorspa  

U.S. Energy Information Administration (EIA) Indexed Site

0. Percent of Floorspace Lit When Open, Number of Buildings and Floorspace, 1999" 0. Percent of Floorspace Lit When Open, Number of Buildings and Floorspace, 1999" ,"Number of Buildings (thousand)",,,,,"Total Floorspace (million square feet)" ,"All Buildings","Not Lita","1 to 50 Percent Lit","51 to 99 Percent Lit","100 Percent Lit","All Buildings","Not Lita","1 to 50 Percent Lit","51 to 99 Percent Lit","100 Percent Lit" "All Buildings ................",4657,498,835,1228,2096,67338,3253,9187,20665,34233 "Building Floorspace" "(Square Feet)" "1,001 to 5,000 ...............",2348,323,351,517,1156,6774,915,1061,1499,3299 "5,001 to 10,000 ..............",1110,114,279,351,367,8238,818,2014,2614,2793

31

Table B3. Census Region, Number of Buildings and Floorspace, 1999  

U.S. Energy Information Administration (EIA) Indexed Site

. Census Region, Number of Buildings and Floorspace, 1999" . Census Region, Number of Buildings and Floorspace, 1999" ,"Number of Buildings (thousand)",,,,,"Total Floorspace (million square feet)" ,"All Buildings","North- east","Midwest ","South","West","All Buildings","North- east","Midwest","South","West" "All Buildings ................",4657,686,1188,1762,1021,67338,12360,16761,23485,14731 "Building Floorspace" "(Square Feet)" "1,001 to 5,000 ...............",2348,305,620,916,506,6774,901,1835,2536,1503 "5,001 to 10,000 ..............",1110,169,273,413,255,8238,1302,2045,3058,1834 "10,001 to 25,000 .............",708,130,188,260,130,11153,1954,2881,4194,2124

32

Table B28. Percent of Floorspace Heated, Number of Buildings and Floorspace, 199  

U.S. Energy Information Administration (EIA) Indexed Site

8. Percent of Floorspace Heated, Number of Buildings and Floorspace, 1999" 8. Percent of Floorspace Heated, Number of Buildings and Floorspace, 1999" ,"Number of Buildings (thousand)",,,,,"Total Floorspace (million square feet)" ,"All Buildings","Not Heated","1 to 50 Percent Heated","51 to 99 Percent Heated","100 Percent Heated","All Buildings","Not Heated","1 to 50 Percent Heated","51 to 99 Percent Heated","100 Percent Heated" "All Buildings ................",4657,641,576,627,2813,67338,5736,7593,10745,43264 "Building Floorspace" "(Square Feet)" "1,001 to 5,000 ...............",2348,366,230,272,1479,6774,1091,707,750,4227 "5,001 to 10,000 ..............",1110,164,194,149,603,8238,1148,1504,1177,4409

33

Lighting recommendations for the Social Security Administration Frank Hagel Federal Building in Richmond CA  

SciTech Connect

Specific recommendations are made to improve the lighting quality and energy efficiency of the lighting system at the Social Security Administration Frank Hagel Building in Richmond, CA. The main recommendation is to replace the recessed fluorescent lighting system in the general office area with indirect lighting. Indirect lighting will improve lighting quality, will provide an energy efficient solution and will be about the same cost as the direct lighting system originally proposed.

Rubinstein, Francis M.

1999-10-25T23:59:59.000Z

34

Property:Number of Build Out Units Deployed | Open Energy Information  

Open Energy Info (EERE)

Build Out Units Deployed Build Out Units Deployed Jump to: navigation, search Property Name Number of Build Out Units Deployed Property Type String Pages using the property "Number of Build Out Units Deployed" Showing 25 pages using this property. (previous 25) (next 25) M MHK Projects/40MW Lewis project + 50 + MHK Projects/AWS II + 20 + MHK Projects/Algiers Light Project + 500 + MHK Projects/Anconia Point Project + 500 + MHK Projects/Ashley Point Project + 3700 + MHK Projects/Avondale Bend Project + 450 + MHK Projects/Bar Field Bend + 2350 + MHK Projects/Barfield Point + 2851 + MHK Projects/Bayou Latenache + 1260 + MHK Projects/BioSTREAM Pilot Plant + 1 + MHK Projects/Bondurant Chute + 3802 + MHK Projects/Breeze Point + 4942 + MHK Projects/Brilliant Point Project + 1400 +

35

Homeland Security vs. the Madisonian Impulse: State Building and Anti-Statism after September 11  

E-Print Network (OSTI)

Homeland Security vs. the Madisonian Impulse: State Buildingstate pursue homeland security. Jay Stowsky is Adjunctcritics of US homeland security policy have consistently

Stowsky, Jay; Kroenig, Matthew

2005-01-01T23:59:59.000Z

36

Customer Name: (First name, middle initial, last name) Social Security Number or Federal ID Number TAMU Customer Number (if assigned) Customer Information: Persons authorized to make purchases on this account  

E-Print Network (OSTI)

Customer Name: (First name, middle initial, last name) Social Security Number or Federal ID Number TAMU Customer Number (if assigned) Customer Information: Persons authorized to make purchases: Email Address: Phone: Fax: Phone: Fax: Name: Title: Customer Representative Signature: Date: This form

Meagher, Mary

37

Program, and Deepti Choubey, NTI Senior Director for Nuclear and Bio-Security. Building a Framework for Assurance,  

E-Print Network (OSTI)

public benchmarking project of nuclear materials security conditions on a country-bycountry basis. The NTI Index, prepared with the Economist Intelligence Unit (EIU), was created to spark an international discussion about priorities required to strengthen security and, most important, to encourage governments to provide assurances and to take actions to reduce risks. The project draws on NTIs nuclear expertise, the EIUs experience in constructing indices, and the reach of the EIUs global network of 900 analysts and contributors. NTI working with an international panel of nuclear security experts and a number of technical advisorsfocused on the framework and priorities that define effective nuclear materials security conditions. The EIU was responsible for developing the Excel-based model and gathering the data. The NTI Index assesses the contribution of 32 states with one kilogram or more of weapons-usable nuclear materials toward improved global nuclear materials security conditions, using five categories: (a) Quantities and Sites, (b) Security and Control

unknown authors

2012-01-01T23:59:59.000Z

38

An efficient secure code approach based on indexed table quasi group encryption with Hadamard and Number Theoretic Transformation for software protection  

Science Conference Proceedings (OSTI)

Software security has become one of the active areas of research due to various cyber threats and attacks that can be very dangerous. A majority of these software threats directly affects the security aspects such as confidentiality, integrity and accessibility. ... Keywords: Number Theoretic Transforms and Hadamard transforms, cryptography, encryption, indexed table, quasigroup, software piracy

N. Sasirekha; M. Hemalatha

2012-10-01T23:59:59.000Z

39

Table B19. Energy End Uses, Number of Buildings and Floorspace...  

U.S. Energy Information Administration (EIA) Indexed Site

Buildings","Energy Used For (more than one may apply)" ,,"Space Heating","Cooling","Water Heating","Cooking","Manufact-uring",,"Space Heating","Cooling","Water...

40

Table B24. Cooling Energy Sources, Number of Buildings and Floorspace...  

U.S. Energy Information Administration (EIA) Indexed Site

Sources (more than one may apply)" ,,,"Electricity","Natural Gas","District Chilled Water",,,"Electricity","Natural Gas","District Chilled Water" "All Buildings...

Note: This page contains sample records for the topic "building number secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Final Status Survey Report for Corrective Action Unit 117 - Pluto Disassembly Facility, Building 2201, Nevada National Security Site, Nevada  

SciTech Connect

This document contains the process knowledge, radiological data and subsequent statistical methodology and analysis to support approval for the radiological release of Corrective Action Unit (CAU) 117 Pluto Disassembly Facility, Building 2201 located in Area 26 of the Nevada National Security Site (NNSS). Preparations for release of the building began in 2009 and followed the methodology described in the Multi-Agency Radiation Survey and Site Investigation Manual (MARSSIM). MARSSIM is the DOE approved process for release of Real Property (buildings and landmasses) to a set of established criteria or authorized limits. The pre-approved authorized limits for surface contamination values and corresponding assumptions were established by DOE O 5400.5. The release criteria coincide with the acceptance criteria of the U10C landfill permit. The U10C landfill is the proposed location to dispose of the radiologically non-impacted, or clean, building rubble following demolition. However, other disposition options that include the building and/or waste remaining at the NNSS may be considered providing that the same release limits apply. The Final Status Survey was designed following MARSSIM guidance by reviewing historical documentation and radiological survey data. Following this review a formal radiological characterization survey was performed in two phases. The characterization revealed multiple areas of residual radioactivity above the release criteria. These locations were remediated (decontaminated) and then the surface activity was verified to be less than the release criteria. Once remediation efforts had been successfully completed, a Final Status Survey Plan (10-015, Final Status Survey Plan for Corrective Action Unit 117 Pluto Disassembly Facility, Building 2201) was developed and implemented to complete the final step in the MARSSIM process, the Final Status Survey. The Final Status Survey Plan consisted of categorizing each individual room into one of three categories: Class 1, Class 2 or Class 3 (a fourth category is a Non-Impacted Class which in the case of Building 2201 only pertained to exterior surfaces of the building.) The majority of the rooms were determined to fall in the less restrictive Class 3 category, however, Rooms 102, 104, 106, and 107 were identified as containing Class 1 and 2 areas. Building 2201 was divided into survey units and surveyed following the requirements of the Final Status Survey Plan for each particular class. As each survey unit was completed and documented, the survey results were evaluated. Each sample (static measurement) with units of counts per minute (cpm) was corrected for the appropriate background and converted to a value with units of dpm/100 cm2. With a surface contamination value in the appropriate units, it was compared to the surface contamination limits, or in this case the derived concentration guideline level (DCGLw). The appropriate statistical test (sign test) was then performed. If the survey unit was statistically determined to be below the DCGLw, then the survey unit passed and the null hypothesis (that the survey unit is above limits) was rejected. If the survey unit was equal to or below the critical value in the sign test, the null hypothesis was not rejected. This process was performed for all survey units within Building 2201. A total of thirty-three Class 1, four Class 2, and one Class 3 survey units were developed, surveyed, and evaluated. All survey units successfully passed the statistical test. Building 2201 meets the release criteria commensurate with the Waste Acceptance Criteria (for radiological purposes) of the U10C landfill permit residing within NNSS boundaries. Based on the thorough statistical sampling and scanning of the buildings interior, Building 2201 may be considered radiologically clean, or free of contamination.

Jeremy Gwin and Douglas Frenette

2010-09-30T23:59:59.000Z

42

Number  

Office of Legacy Management (LM)

' ' , /v-i 2 -i 3 -A, This dow'at consists ~f--~-_,_~~~p.~,::, Number -------of.-&--copies, 1 Series.,-a-,-. ! 1 THE UNIVERSITY OF ROCHESTER 1; r-.' L INTRAMURALCORRESPONDENCE i"ks' 3 2.. September 25, 1947 Memo.tor Dr. A. H, Dovdy . From: Dr. H. E, Stokinger Be: Trip Report - Mayvood Chemical Works A trip vas made Nednesday, August 24th vith Messrs. Robert W ilson and George Sprague to the Mayvood Chemical F!orks, Mayvood, New Jersey one of 2 plants in the U.S.A. engaged in the production of thorium compounds. The purpose of the trip vas to: l 1. Learn the type of chemical processes employed in the thorium industry (thorium nitrate). 2. Survey conditions of eeosure of personnel associated vith these chemical processes. 3. Obtain samples of atmospheric contaminants in the plant, as

43

Campus Security Report 1 Campus seCurity  

E-Print Network (OSTI)

Campus Security Report 1 Campus seCurity and Fire saFety report UC Santa Cruz 2010 #12;Campus Security Report 2 UC Santa Cruz Geography ........................................................ 8 Security and Access to Campus Buildings and Grounds ........................................ 8

Wilmers, Chris

44

MasteringWeb Services Security MasteringWeb Services Security  

E-Print Network (OSTI)

Preview of MasteringWeb Services Security Preview of MasteringWeb Services Security Konstantin introduction Highlights of the book Web Services security problem XML Security WS-Security Security mechanisms for ASP.NET Web Services Planning and building secure Web Service systems ­ Architectural and policy

45

CAMPUS SECURITY CARD REQUISITION  

E-Print Network (OSTI)

CAMPUS SECURITY CARD REQUISITION DEPARTMENT LAST NAME GIVEN NAME(S) SFU ID NUMBER CARD NUMBER CAMPUS SECURITY OFFICE USE ONLY SERVICE CHARGE: ___________________________ DEPOSIT be reported or returned to Campus Security TC 050 (291-5448). CARDHOLDER SIGNATURE DATE: #12;

46

Buildings  

Energy.gov (U.S. Department of Energy (DOE))

The U.S. Department of Energy (DOE) advances building energy performance through the development and promotion of efficient, affordable, and high impact technologies, systems, and practices. The...

47

COLLECTION AND USE OF SOCIAL SECURITY NUMBERS Privacy Policy and Procedure Manual Version: 8-1-12  

E-Print Network (OSTI)

; radiation exposure monitoring 10 CFR 20.1801- 20.1802; PL 109-58, Sec. 652; FAC 64E-5.320 - 5.321; F.S. 404 Imperative Radiation Control & Radiation Services Federal & State security & regulatory requirements Sec. 6109, I.R.C.; UF-1.300 Authorized Study Abroad Services (UF International Center) Florida Prepaid

Slatton, Clint

48

Building and Fire Publications  

Science Conference Proceedings (OSTI)

... Cost-Effective Responses to Terrorist Risks in Constructed Facilities. ... building economics; disaster mitigation; economic analysis; homeland security ...

49

Building Security Nerds  

Science Conference Proceedings (OSTI)

... "1096 Knowledge of malware analysis tools (eg ... Clearly we need more job-relevant specificity ... principles" & "168 - Skill in conducting software ...

2013-09-17T23:59:59.000Z

50

security blunders (INMM 2010)  

NLE Websites -- All DOE Office Websites (Extended Search)

OF SECURITY BLUNDERS Roger G. Johnston and Jon S. Warner Vulnerability Assessment Team Nuclear Engineering Division Argonne National Laboratory 9700 S. Cass Ave, Building 206,...

51

Security (Un-)Usability 17 Security Usability Fundamentals  

E-Print Network (OSTI)

Security (Un-)Usability 17 Security Usability Fundamentals An important consideration when you're building an application is the usability of the security features that you'll be employing. Security experts frequently lament that security has been bolted onto applications as an afterthought, however

Cortes, Corinna

52

Corrective action investigation plan for Corrective Action Unit Number 423: Building 03-60 Underground Discharge Point, Tonopah Test Range, Nevada  

Science Conference Proceedings (OSTI)

This Corrective Action Investigation Plan (CAIP) contains the environmental sample collection objectives and the criteria for conducting site investigation activities at Corrective Action Unit (CAU) Number 423, the Building 03-60 Underground Discharge Point (UDP), which is located in Area 3 at the Tonopah Test Range (TTR). The TTR, part of the Nellis Air Force Range, is approximately 225 kilometers (140 miles) northwest of Las Vegas, Nevada. CAU Number 423 is comprised of only one Corrective Action Site (CAS) which includes the Building 03-60 UDP and an associated discharge line extending from Building 03-60 to a point approximately 73 meters (240 feet) northwest. The UDP was used between approximately 1965 and 1990 to dispose of waste fluids from the Building 03-60 automotive maintenance shop. It is likely that soils surrounding the UDP have been impacted by oil, grease, cleaning supplies and solvents as well as waste motor oil and other automotive fluids released from the UDP.

NONE

1997-10-27T23:59:59.000Z

53

Lemnos Interoperable Security Program  

Science Conference Proceedings (OSTI)

The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or ?? tunnels?, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

2012-01-31T23:59:59.000Z

54

Nuclear and Radiological Material Security | National Nuclear...  

National Nuclear Security Administration (NNSA)

to intensive site security efforts, NNSA is also working to build international standards and criteria for nuclear and radiological security. This includes NNSA's work to...

55

Safeguarding Health Information: Building Assurance through ...  

Science Conference Proceedings (OSTI)

This event page is for the 2013 Safeguarding Health Information: Building Assurance through HIPAA Security conference. ...

2013-05-28T23:59:59.000Z

56

Mobile Building Energy Audit and Modeling Tools: Cooperative Research and Development Final Report, CRADA Number CRD-11-00441  

SciTech Connect

Broadly accessible, low cost, accurate, and easy-to-use energy auditing tools remain out of reach for managers of the aging U.S. building population (over 80% of U.S. commercial buildings are more than 10 years old*). concept3D and NREL's commercial buildings group will work to translate and extend NREL's existing spreadsheet-based energy auditing tool for a browser-friendly and mobile-computing platform. NREL will also work with concept3D to further develop a prototype geometry capture and materials inference tool operable on a smart phone/pad platform. These tools will be developed to interoperate with NREL's Building Component Library and OpenStudio energy modeling platforms, and will be marketed by concept3D to commercial developers, academic institutions and governmental agencies. concept3D is NREL's lead developer and subcontractor of the Building Component Library.

Brackney, L.

2013-04-01T23:59:59.000Z

57

Mobile Building Energy Audit and Modeling Tools: Cooperative Research and Development Final Report, CRADA Number CRD-11-00441  

SciTech Connect

Broadly accessible, low cost, accurate, and easy-to-use energy auditing tools remain out of reach for managers of the aging U.S. building population (over 80% of U.S. commercial buildings are more than 10 years old*). concept3D and NREL's commercial buildings group will work to translate and extend NREL's existing spreadsheet-based energy auditing tool for a browser-friendly and mobile-computing platform. NREL will also work with concept3D to further develop a prototype geometry capture and materials inference tool operable on a smart phone/pad platform. These tools will be developed to interoperate with NREL's Building Component Library and OpenStudio energy modeling platforms, and will be marketed by concept3D to commercial developers, academic institutions and governmental agencies. concept3D is NREL's lead developer and subcontractor of the Building Component Library.

Brackney, L.

2013-04-01T23:59:59.000Z

58

Quantum Random Number Generator  

Science Conference Proceedings (OSTI)

... trusted beacon of random numbers. You could conduct secure auctions, or certify randomized audits of data. One of the most ...

2013-08-30T23:59:59.000Z

59

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

i. i. Message from the Administrator President Obama has reshaped our national security priorities making enterprise infrastructure modernization with integrated Information Technology (IT) capabilities a key strategic initiative. Our IT infrastructure must ensure that our workforce can access appropriate information in a secure, reliable, and cost-effective manner. Effective information sharing throughout the government enhances the national security of the United States (US). For the National Nuclear Security Administration (NNSA), effective information sharing helps strengthen our nuclear security mission; builds collaborative networks within NNSA as well as with the Department of Energy (DOE), Department of Defense (DoD), and other national security

60

Homeland Security | U.S. DOE Office of Science (SC)  

NLE Websites -- All DOE Office Websites (Extended Search)

Homeland Security Homeland Security High Energy Physics (HEP) HEP Home About Research Facilities Science Highlights Benefits of HEP Medicine Homeland Security Industry Computing Sciences Workforce Development A Growing List Accelerators for Americas Future External link Funding Opportunities Advisory Committees News & Resources Contact Information High Energy Physics U.S. Department of Energy SC-25/Germantown Building 1000 Independence Ave., SW Washington, DC 20585 P: (301) 903-3624 F: (301) 903-2597 E: sc.hep@science.doe.gov More Information » Benefits of HEP Homeland Security Print Text Size: A A A RSS Feeds FeedbackShare Page Homeland security: monitoring nuclear nonproliferation In nuclear reactors, the amount of plutonium builds up as the uranium fuel is used, and the number and characteristics of antineutrinos emitted by

Note: This page contains sample records for the topic "building number secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Office of Security Assistance  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Director's Perspective Welcome to the Office of Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal Year 2007, HSS performed extensive assistance activities at the request of DOE/NNSA program offices and field sites. The activities ranged from special and routine site survey assistance, physical and technical security inspections in support of the Office of Intelligence, Vulnerability Assessment and Design Basis Threat (DBT) implementation assistance, third-party, adversary support, and DBT implementation and planning validation activities associated with the Site Assistance Visits and Technology Assistance Visits. The security assistance provided to our customers included technical expertise tailored to augment site capabilities in critical fields.

62

Facility Security Officer Contractor Toolcart  

NLE Websites -- All DOE Office Websites (Extended Search)

oversees and controls all Sandia National Laboratory (SNL) site visits to maintain security of operations and authorized access to SNL, its buildings and facilities in...

63

Security Perimeter  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Perimeter Security Perimeter Protecting the Laboratory against threats and vulnerabilities. Contact Security Perimeter Coordinators Email The security perimeter helps to...

64

Energy Department Announces Creation of New Health, Safety and Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Creation of New Health, Safety and Creation of New Health, Safety and Security Office Energy Department Announces Creation of New Health, Safety and Security Office August 30, 2006 - 8:53am Addthis WASHINGTON, DC - The Department of Energy (DOE) today announced the creation of a new office to strengthen and improve the health, safety, and security of the DOE workers, facilities and the public. The new office, called the Office of Health, Safety and Security (HSS), will help formulate and implement health, safety and security policy for the Department, provide assistance to DOE sites, conduct oversight through rigorous field inspections, and carry out enforcement activities previously carried out by the Offices of Environment, Safety and Health (EH) and Security and Safety Performance Assurance (SSA). This move builds on a number of actions the

65

Security Assistance | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Assistance Security Assistance Security Assistance Welcome to Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal

66

Comparison of Building Energy Modeling Programs: Building Loads  

NLE Websites -- All DOE Office Websites (Extended Search)

Comparison of Building Energy Modeling Programs: Building Loads Title Comparison of Building Energy Modeling Programs: Building Loads Publication Type Report LBNL Report Number...

67

Commercial Buildings Characteristics 1992  

U.S. Energy Information Administration (EIA) Indexed Site

Buildings Characteristics 1992 Buildings Characteristics Overview Full Report Tables National and Census region estimates of the number of commercial buildings in the U.S. and...

68

Number | Open Energy Information  

Open Energy Info (EERE)

Number Number Jump to: navigation, search Properties of type "Number" Showing 200 properties using this type. (previous 200) (next 200) A Property:AvgAnnlGrossOpCpcty Property:AvgTempGeoFluidIntoPlant Property:AvgWellDepth B Property:Building/FloorAreaChurchesChapels Property:Building/FloorAreaGroceryShops Property:Building/FloorAreaHealthServices24hr Property:Building/FloorAreaHealthServicesDaytime Property:Building/FloorAreaHeatedGarages Property:Building/FloorAreaHotels Property:Building/FloorAreaMiscellaneous Property:Building/FloorAreaOffices Property:Building/FloorAreaOtherRetail Property:Building/FloorAreaResidential Property:Building/FloorAreaRestaurants Property:Building/FloorAreaSchoolsChildDayCare Property:Building/FloorAreaShops Property:Building/FloorAreaSportCenters

69

Homeland Security Programs | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Homeland Security Programs Homeland Security Programs SHARE Homeland Security Programs The Homeland Security Programs support the Department of Homeland Security (DHS), other federal and state agencies, and commercial partners. Through the integration of a number of key competencies, ORNL is able to provide critical operational, technical, and scientific support to these sponsors. A key focus of this area is to translate the critical research into operational capability for the security, protection, response, and recovery of the nation against natural and man-made events. Research Areas detecting, preventing, and reversing the proliferation of weapons of mass destruction deploying integrated systems for incident awareness, detection, and response providing technology for detecting explosives at the

70

Buildings*","Buildings  

U.S. Energy Information Administration (EIA) Indexed Site

8. Primary Space-Heating Energy Sources, Number of Buildings for Non-Mall Buildings, 2003" 8. Primary Space-Heating Energy Sources, Number of Buildings for Non-Mall Buildings, 2003" ,"Number of Buildings (thousand)" ,"All Buildings*","Buildings with Space Heating","Primary Space-Heating Energy Source Used a" ,,,"Electricity","Natural Gas","Fuel Oil","District Heat" "All Buildings* ...............",4645,3982,1258,1999,282,63 "Building Floorspace" "(Square Feet)" "1,001 to 5,000 ...............",2552,2100,699,955,171,"Q" "5,001 to 10,000 ..............",889,782,233,409,58,"Q" "10,001 to 25,000 .............",738,659,211,372,32,"Q" "25,001 to 50,000 .............",241,225,63,140,8,9

71

Buildings*","Buildings  

U.S. Energy Information Administration (EIA) Indexed Site

6. Space Heating Energy Sources, Number of Buildings for Non-Mall Buildings, 2003" 6. Space Heating Energy Sources, Number of Buildings for Non-Mall Buildings, 2003" ,"Number of Buildings (thousand)" ,"All Buildings*","Buildings with Space Heating","Space-Heating Energy Sources Used (more than one may apply)" ,,,"Elec- tricity","Natural Gas","Fuel Oil","District Heat","Propane","Other a" "All Buildings* ...............",4645,3982,1766,2165,360,65,372,113 "Building Floorspace" "(Square Feet)" "1,001 to 5,000 ...............",2552,2100,888,1013,196,"Q",243,72 "5,001 to 10,000 ..............",889,782,349,450,86,"Q",72,"Q" "10,001 to 25,000 .............",738,659,311,409,46,18,38,"Q"

72

Buildings*","Buildings  

U.S. Energy Information Administration (EIA) Indexed Site

1. Water-Heating Energy Sources, Number of Buildings for Non-Mall Buildings, 2003" 1. Water-Heating Energy Sources, Number of Buildings for Non-Mall Buildings, 2003" ,"Number of Buildings (thousand)" ,"All Buildings*","Buildings with Water Heating","Water-Heating Energy Sources Used (more than one may apply)" ,,,"Elec- tricity","Natural Gas","Fuel Oil","District Heat","Propane" "All Buildings* ...............",4645,3472,1910,1445,94,27,128 "Building Floorspace" "(Square Feet)" "1,001 to 5,000 ...............",2552,1715,1020,617,41,"N",66 "5,001 to 10,000 ..............",889,725,386,307,"Q","Q",27 "10,001 to 25,000 .............",738,607,301,285,16,"Q",27

73

Lemnos interoperable security project.  

Science Conference Proceedings (OSTI)

With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

Halbgewachs, Ronald D.

2010-03-01T23:59:59.000Z

74

Service Buildings  

U.S. Energy Information Administration (EIA) Indexed Site

Service Service Characteristics by Activity... Service Service buildings are those in which some type of service is provided, other than food service or retail sales of goods. Basic Characteristics [ See also: Equipment | Activity Subcategories | Energy Use ] Service Buildings... Most service buildings were small, with almost ninety percent between 1,001 and 10,000 square feet. Tables: Buildings and Size Data by Basic Characteristics Establishment, Employment, and Age Data by Characteristics Number of Service Buildings by Predominant Building Size Category Figure showing number of service buildings by size. If you need assistance viewing this page, please contact 202-586-8800. Equipment Table: Buildings, Size, and Age Data by Equipment Types Predominant Heating Equipment Types in Service Buildings

75

Information-Theoretically Secure Communication Under Channel Uncertainty  

E-Print Network (OSTI)

Secure communication under channel uncertainty is an important and challenging problem in physical-layer security and cryptography. In this dissertation, we take a fundamental information-theoretic view at three concrete settings and use them to shed insight into efficient secure communication techniques for different scenarios under channel uncertainty. First, a multi-input multi-output (MIMO) Gaussian broadcast channel with two receivers and two messages: a common message intended for both receivers (i.e., channel uncertainty for decoding the common message at the receivers) and a confidential message intended for one of the receivers but needing to be kept asymptotically perfectly secret from the other is considered. A matrix characterization of the secrecy capacity region is established via a channel-enhancement argument and an extremal entropy inequality previously established for characterizing the capacity region of a degraded compound MIMO Gaussian broadcast channel. Second, a multilevel security wiretap channel where there is one possible realization for the legitimate receiver channel but multiple possible realizations for the eavesdropper channel (i.e., channel uncertainty at the eavesdropper) is considered. A coding scheme is designed such that the number of secure bits delivered to the legitimate receiver depends on the actual realization of the eavesdropper channel. More specifically, when the eavesdropper channel realization is weak, all bits delivered to the legitimate receiver need to be secure. In addition, when the eavesdropper channel realization is strong, a prescribed part of the bits needs to remain secure. We call such codes security embedding codes, referring to the fact that high-security bits are now embedded into the low-security ones. We show that the key to achieving efficient security embedding is to jointly encode the low-security and high-security bits. In particular, the low-security bits can be used as (part of) the transmitter randomness to protect the high-security ones. Finally, motivated by the recent interest in building secure, robust and efficient distributed information storage systems, the problem of secure symmetrical multilevel diversity coding (S-SMDC) is considered. This is a setting where there are channel uncertainties at both the legitimate receiver and the eavesdropper. The problem of encoding individual sources is first studied. A precise characterization of the entire admissible rate region is established via a connection to the problem of secure coding over a three-layer wiretap network and utilizing some basic polyhedral structure of the admissible rate region. Building on this result, it is then shown that the simple coding strategy of separately encoding individual sources at the encoders can achieve the minimum sum rate for the general S-SMDC problem.

Ly, Hung Dinh

2012-05-01T23:59:59.000Z

76

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Global Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent;...

77

Security challenges in embedded systems  

Science Conference Proceedings (OSTI)

Embedded systems security is a significant requirement in emerging environments, considering the increasing deployment of embedded systems in several application domains. The large number of deployed embedded systems, their limited resources and their ... Keywords: Communication system security, computer security, embedded systems, security

Dimitrios N. Serpanos; Artemios G. Voyiatzis

2013-03-01T23:59:59.000Z

78

Towards web security using PLASMA  

Science Conference Proceedings (OSTI)

The World Wide Web is one of the most significant multi-media applications ever developed-and therefore securing the web is one of the most pressing problems. There exist a number of approaches for securing the World Wide Web which, however, usually ... Keywords: high level security, multimedia, secure communications platform, world wide web

Annette Krannig

1998-01-01T23:59:59.000Z

79

NIF's Operations Support Building awarded LEED certification...  

NLE Websites -- All DOE Office Websites (Extended Search)

NIF's Operations Support Building awarded LEED certification | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the...

80

Building Trust & Confidence in Voting Systems  

Science Conference Proceedings (OSTI)

Building Trust & Confidence in Voting Systems, Dec 10-11, 2003. Dec 10, 2003. ... Openness & Security David Dill Stanford University. ...

2012-11-07T23:59:59.000Z

Note: This page contains sample records for the topic "building number secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Building International Emergency Management Systems | National...  

NLE Websites -- All DOE Office Websites (Extended Search)

Building International Emergency Management Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

82

Learning mobile security with android security labware  

Science Conference Proceedings (OSTI)

As smart mobile devices grow increasingly in popularity, so do the incentives for attackers. Recent surveys on mobile security describe the rapidly increasing number and sophistication of mobile attacks. Newer sources of risks are being introduced or ... Keywords: android, labware, mobile security

Minzhe Guo; Prabir Bhattacharya; Ming Yang; Kai Qian; Li Yang

2013-03-01T23:59:59.000Z

83

Countermeasures for Mobile Agent Security  

Science Conference Proceedings (OSTI)

... A number of models exist for describing agent ... into an effective security model is clearly ... There are a number of agent-based application domains for ...

2007-09-19T23:59:59.000Z

84

Security Plans  

Science Conference Proceedings (OSTI)

... Appendix A Glossary - A glossary of security terms used within the security planning document. ... F, Glossary. None applicable.

2013-09-30T23:59:59.000Z

85

Trends in Commercial Buildings--Buildings and Floorspace  

U.S. Energy Information Administration (EIA) Indexed Site

activity. Number of Commercial Buildings In 1979, the Nonresidential Buildings Energy Consumption Survey estimated that there were 3.8 million commercial buildings in the...

86

Federal Buildings Supplemental Survey 1993  

Gasoline and Diesel Fuel Update (EIA)

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 3.25. Water-Heating Equipment in FBSS Buildings in Federal Region 3, Number of Buildings and...

87

National Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Program Areas Program Areas Initiatives Facilities Events and Conferences Supporting Organizations A scientific approach to global security Initiatives | Programs Home | Science & Discovery | National Security National Security | National Security SHARE ORNL plays an important role in national and global security by virtue of its expertise in advanced materials, nuclear science, supercomputing and other scientific specialties. Discovery and innovation in these areas are essential for protecting US citizens and advancing national and global security priorities. ORNL supports these missions by using its signature strengths to meet complex national security challenges in a number of areas. Nuclear Nonproliferation - The laboratory's expertise and experience covers the spectrum of nuclear nonproliferation work, from basic R&D to

88

Headquarters Personnel Security Operations | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Headquarters Personnel Security Operations Headquarters Personnel Security Operations Headquarters Personnel Security Operations Mission and Functions Mission Provide a comprehensive Personnel Security Program for the DOE Headquarters complex. Ensure that DOE classified information, materials, buildings and information systems are safeguarded from compromise by only granting security clearances and building access to trustworthy individuals. This is accomplished through conscientious, just, and thoughtful application of Federal rules and statutes with the goal of ensuring that only individuals whose character, associations, and loyalty do not endanger the common defense are granted access to DOE classified information, materials, buildings and information systems. Functions The primary function of the Office of Headquarters Personnel

89

Record of Technical Change {number_sign}1 for ''Corrective Action Investigation Plan for Corrective Action Unit 406: Area 3 Building 03-74 and Building 03-58 Underground Discharge Points and Corrective Action Unit 429: Area 3 Building 03-55 and Area 9 Building 09-52 Underground Discharge Points, Tonopah Test Range, Nevada'' Revision 0  

Science Conference Proceedings (OSTI)

This Record of Technical Change provides updates to the technical information included in ''Corrective Action Investigation Plan for Corrective Action Unit 406: Area 3 Building 03-74 and Building 03-58 Underground Discharge Points and Corrective Action Unit 429: Area 3 Building 03-55 and Area 9 Building 09-52 Underground Discharge Points, Tonopah Test Range, Nevada'' Revision 0

US DOE Nevada Operations Office

1999-06-30T23:59:59.000Z

90

Security metrics for source code structures  

Science Conference Proceedings (OSTI)

Software security metrics are measurements to assess security related imperfections (or perfections) introduced during software development. A number of security metrics have been proposed. However, all the perspectives of a software system have not ... Keywords: code quality and security., metrics, security metrics

Istehad Chowdhury; Brian Chan; Mohammad Zulkernine

2008-05-01T23:59:59.000Z

91

Secure Contexts (Extended Abstract)  

E-Print Network (OSTI)

Information flow security in a multilevel system aims at guaranteeing that no high level information is revealed to low levels. A usual requirement to ensure information flow security for a process is that no generic attacker can induce a high-to-low information flow. This requirement is too demanding when we have some knowledge about the contexts where the process is going to run. To deal with these situations we introduce the notion of secure contexts for a process. The notion is parametric with respect to both the observational equivalence and the operation used to characterize the low level behavior. In the paper we mainly analyze the cases of bisimulation and trace equivalence. We describe how to build secure contexts in these cases and we show that two well-known security properties, BNDC and NDC, are just special instances of our general notion.

Annalisa Bossi; Damiano Macedonio; Carla Piazza; Sabina Rossi

2003-01-01T23:59:59.000Z

92

Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber...

93

Active security  

Science Conference Proceedings (OSTI)

In this paper we introduce active security, a new methodology which introduces programmatic control within a novel feedback loop into the defense infrastructure. Active security implements a unified programming environment which provides interfaces ... Keywords: central management, digital forensics, network security

Ryan Hand, Michael Ton, Eric Keller

2013-11-01T23:59:59.000Z

94

OHA Security Cases Archive File  

Energy.gov (U.S. Department of Energy (DOE))

This is a archive file of our Security decisions, Please download this file to your local computer and use the build in adobe search feature. Individual cases are listed in the bookmark section of...

95

A Game Theoretical Approach to Communication Security  

E-Print Network (OSTI)

Security solutions . . . . . . . . . . . . . . . .Practical security solutions . . . . . . . . . . . . .Communication security

Gueye, Assane

2011-01-01T23:59:59.000Z

96

CBECS Buildings Characteristics --Revised Tables  

Gasoline and Diesel Fuel Update (EIA)

Table 37. Refrigeration Equipment, Number of Buildings and Floorspace, 1995 Table 38. Water-Heating Equipment, Number of Buildings and Floorspace, 1995 Table 39. Lighting...

97

CBECS Buildings Characteristics --Revised Tables  

Gasoline and Diesel Fuel Update (EIA)

Table 25. Cooling Energy Sources, Number of Buildings and Floorspace, 1995 Table 26. Water-Heating Energy Sources, Number of Buildings, 1995 Table 27. Water-Heating Energy...

98

RCRA Permit for a Hazardous Waste Management Facility Permit Number NEV HW0101 Annual Summary/Waste Minimization Report Calendar Year 2012, Nevada National Security Site, Nevada  

SciTech Connect

This report summarizes the U.S. Environmental Protection Agency (EPA) identification number of each generator from which the Permittee received a waste stream, a description and quantity of each waste stream in tons and cubic feet received at the facility, the method of treatment, storage, and/or disposal for each waste stream, a description of the waste minimization efforts undertaken, a description of the changes in volume and toxicity of waste actually received, any unusual occurrences, and the results of tank integrity assessments. This Annual Summary/Waste Minimization Report is prepared in accordance with Section 2.13.3 of Permit Number NEV HW0101, issued 10/17/10.

,

2013-02-21T23:59:59.000Z

99

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration Finding of No Significant Impact for the Construction and Operation of a New Office Building and Related Structures within TA-3 at Los Alamos National Laboratory, Los Alamos, New Mexico U. S. Department of Energy National Nuclear Security Administration Los Alamos Area Office 528 35th Street Los Alamos, N M 8 7 5 4 4 DEPARTMENT OF ENERGY. NATIONAL NUCLEAR SECUIRTY ADMINISTRATION FINDING OF NO SIGNIFICANT INIPACT Construction and Operation of a New Office Building and Related Structures withinTA-3 at Los Alarnos National Laboratory, Los Alamos. New Mexico FINAL ENVIRONMENTAL ASSESSMENT: The Environmental Assessment (EA) for Construction and Operation of a New Office Building and Related Structures within TA-3 at L os Alamos National Laboratory, Los Alamos, New Mexico (DOE/EA- 7 375)

100

Secure Facilities & Capabilities | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Facilities SHARE Secure Facilities and Capabilities...

Note: This page contains sample records for the topic "building number secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Technosocial Predictive Analytics for Security Informatics  

SciTech Connect

Challenges to the security, health, and sustainable growth of our society keep escalating asymmetrically due to the growing pace of globalization and global change. The increasing velocity of information sharing, social networking, economic forces, and environmental change has resulted in a rapid increase in the number and frequency of game-changing moments that a community can face. Social movements that once took a decade to build now take a year; shifts in public opinion that once took a year to take root now take a couple of months. More and more frequently, these critical moments occur too suddenly for the affected communities to succeed in countering the consequent adversities or seizing the emerging opportunities. Now more than ever, we need anticipatory reasoning technologies to forecast and manage change in order to secure and improve our way of life and the environment we inhabit.

Sanfilippo, Antonio P.; Gilbert, Nigel; Greaves, Mark

2012-08-22T23:59:59.000Z

102

Security of internet-connected computer networks  

Science Conference Proceedings (OSTI)

The security of computer networks connected to the internet is an important, vital and hotly contested real-world issue. Once the computer networks get connected to the internet, the number of attacks, their strength and intensity grow exponentially. ... Keywords: attack detection, attacks, computer networks, digital signature, incidents, internet, network security, security breaches, security policy

I. Tutanescu; E. Sofron; M. Ali

2010-02-01T23:59:59.000Z

103

CBECS Buildings Characteristics --Revised Tables  

U.S. Energy Information Administration (EIA) Indexed Site

Buildings Use Tables Buildings Use Tables (24 pages, 129 kb) CONTENTS PAGES Table 12. Employment Size Category, Number of Buildings, 1995 Table 13. Employment Size Category, Floorspace, 1995 Table 14. Weekly Operating Hours, Number of Buildings, 1995 Table 15. Weekly Operating Hours, Floorspace, 1995 Table 16. Occupancy of Nongovernment-Owned and Government-Owned Buildings, Number of Buildings, 1995 Table 17. Occupancy of Nongovernment-Owned and Government-Owned Buildings, Floorspace, 1995 These data are from the 1995 Commercial Buildings Energy Consumption Survey (CBECS), a national probability sample survey of commercial buildings sponsored by the Energy Information Administration, that provides information on the use of energy in commercial buildings in the

104

Security Cases  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

security-cases Office of Hearings and Appeals 1000 security-cases Office of Hearings and Appeals 1000 Independence Ave., SW Washington, DC, 20585 202-287-1566 en PSH-13-0103 - In the Matter of Personnel Security http://energy.gov/oha/downloads/psh-13-0103-matter-personnel-security security" class="title-link">PSH-13-0103 - In the Matter of Personnel Security

105

Security Policy  

Science Conference Proceedings (OSTI)

... M/S ACES Pvt. Ltd. Pakistan Page Security Policy ... 2013 M/S ACES Pvt. Ltd. Pakistan 5/27/2013 Page 2. [SECURITY POLICY] May 27, 2013 ...

2013-05-29T23:59:59.000Z

106

Cooperative monitoring of regional security agreements  

SciTech Connect

This paper argues that cooperative monitoring plays a critical role in the implementation of regional security agreements and confidence building measures. A framework for developing cooperative monitoring options is proposed and several possibilities for relating bilateral and regional monitoring systems to international monitoring systems are discussed. Three bilateral or regional agreements are analyzed briefly to illustrate different possibilities. These examples illustrate that the relationship of regional or bilateral arms control or security agreements to international agreements depends on a number of factors: the overlap of provisions between regional and international agreements; the degree of interest in a regional agreement among the international community; efficiency in implementing the agreement; and numerous political considerations. Given the importance of regional security to the international community, regions should be encouraged to develop their own infrastructure for implementing regional arms control and other security agreements. A regional infrastructure need not preclude participation in an international regime. On the contrary, establishing regional institutions for arms control and nonproliferation could result in more proactive participation of regional parties in developing solutions for regional and international problems, thereby strengthening existing and future international regimes. Possible first steps for strengthening regional infrastructures are identified and potential technical requirements are discussed.

Pregenzer, A.L.; Vannoni, M.; Biringer, K.L. [Sandia National Labs., Albuquerque, NM (United States). Nonproliferation and Arms Control Analysis Dept.

1996-11-01T23:59:59.000Z

107

Beyond Buildings  

NLE Websites -- All DOE Office Websites (Extended Search)

without compromising future generations SUSTAINABLE INL Buildings Beyond Buildings Sustainability Beyond Buildings INL is taking sustainability efforts "beyond buildings" by...

108

CWRU awarded grant to build battery for smart grid, renewables New design for iron flow battery would enhance energy and economic security  

E-Print Network (OSTI)

CWRU awarded grant to build battery for smart grid, renewables New design for iron flow battery of the rustbelt battery could be integrated into a smart grid--charging up when use is low, then adding of the power grid and accelerate the addition of solar and wind power supplies. The project was one of 66

Rollins, Andrew M.

109

Driving Secure Software Development Experience in a Diverse Product Environment  

Science Conference Proceedings (OSTI)

Siemens' central security team drives secure software development across a diverse product portfolio. From factory automation to wind turbines, Siemens builds security in by activities including standardizing roles and responsibilities, threat and risk ... Keywords: Siemens, secure software development, risk analysis, threat analysis, software engineering

Barbara Fichtinger; Frances Paulisch; Peter Panholzer

2012-03-01T23:59:59.000Z

110

Security Asset Elicitation for Collaborative Models Maria Vasilevskaya1  

E-Print Network (OSTI)

Security Asset Elicitation for Collaborative Models Maria Vasilevskaya1 maria, Norway ABSTRACT Building secure systems is a difficult job for most engineers since it requires in-depth understanding of security aspects. This task, however, can be assisted by capturing security knowledge

111

Case Number:  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Name of Petitioner: Name of Petitioner: Date of Filing: Case Number: Department of Energy Washington, DC 20585 JUL 2 2 2009 DEPARTMENT OF ENERGY OFFICE OF HEARINGS AND APPEALS Appeal Dean P. Dennis March 2, 2009 TBA-0072 Dean D. Dennis filed a complaint of retaliation under the Department of Energy (DOE) Contractor Employee Protection Program, 10 C.F.R. Part 708. Mr. Dennis alleged that he engaged in protected activity and that his employer, National Security Technologies, LLC (NSTec ), subsequently terminated him. An Office of Hearings and Appeals (OHA) Hearing Officer denied relief in Dean P. Dennis, Case No. TBH-0072, 1 and Mr. Dennis filed the instant appeal. As discussed below, the appeal is denied. I. Background The DOE established its Contractor Employee Protection Program to "safeguard public

112

Certificateless Encryption Schemes Strongly Secure in the Standard ...  

Science Conference Proceedings (OSTI)

encryption (CLE) schemes that are provably secure against strong adver- ... of a number of alternative security models for CLE that are substantially weaker.

113

Building the Next Generation of Cyber Defenders  

Science Conference Proceedings (OSTI)

Page 1. Building the Next Generation of Cyber Defenders ... 19th Century 20th Century The Cyber Security Problem Space ? Historic Background ...

2013-03-28T23:59:59.000Z

114

Improving web site security with data flow management  

E-Print Network (OSTI)

This dissertation describes two systems, RESIN and BFLow, whose goal is to help Web developers build more secure Web sites. RESIN and BFLOW use data flow management to help reduce the security risks of using buggy or ...

Yip, Alexander Siumann, 1979-

2009-01-01T23:59:59.000Z

115

Networks in Buildings: Which Path Forward?  

NLE Websites -- All DOE Office Websites (Extended Search)

Networks in Buildings: Which Path Forward? Networks in Buildings: Which Path Forward? Title Networks in Buildings: Which Path Forward? Publication Type Conference Paper LBNL Report Number LBNL-2511E Year of Publication 2008 Authors Nordman, Bruce Conference Name 2008 ACEEE Summer Study on Energy Efficiency in Buildings Conference Location Pacific Grove, CA Keywords communication and standards, technologies Abstract To date, digital networks have principally been installed for connecting information technology devices, with more modest use in consumer electronics, security, and large building control systems. The next 20 years will see much greater deployment of networks in buildings of all types, and across all end uses. Most of these are likely to be introduced primarily for reasons other than energy efficiency, and add energy use for network interfaces and network products. Widespread networking could easily lead to increased energy use, and experience with IT and CE networks suggests this may be likely. Active engagement by energy efficiency professionals in the architecture and design of future networks could lead to their being a large and highly cost-effective tool for efficiency. However, network standards are complex and take many years to develop and negotiate so that lack of action on this in the near term may foreclose important opportunities for years or decades to come. Digital networks need to be common globally, providing another challenge to building systems and elements that are more commonly designed only for national or regional markets. Key future networks are lighting, climate control, and security/presence. This paper reviews some examples of past network designs and use and the lessons they hold for future building networks. It also highlights key needed areas for research, policy, and standards development.

116

Cyber Security | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Home | Science & Discovery | National Security | Initiatives | Cyber Security SHARE Cyber Security Through Science A Science-Based Approach image ORNL uses a science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant, 'game-changing' transformation requires a science-based approach that combines fundamental understanding with experimentation, theory, and modeling. The most successful scientific programs use peer review to maximize intellectual capital and prioritize research needs. The Department of Energy has applied this approach through programs such as the Scientific Discovery through Advanced Computing (SciDAC) and ASCI,

117

Architectural support for enhancing security in clusters  

E-Print Network (OSTI)

Cluster computing has emerged as a common approach for providing more comput- ing and data resources in industry as well as in academia. However, since cluster computer developers have paid more attention to performance and cost eciency than to security, numerous security loopholes in cluster servers come to the forefront. Clusters usually rely on rewalls for their security, but the rewalls cannot prevent all security attacks; therefore, cluster systems should be designed to be robust to security attacks intrinsically. In this research, we propose architectural supports for enhancing security of clus- ter systems with marginal performance overhead. This research proceeds in a bottom- up fashion starting from enforcing each cluster component's security to building an integrated secure cluster. First, we propose secure cluster interconnects providing con- dentiality, authentication, and availability. Second, a security accelerating network interface card architecture is proposed to enable low performance overhead encryption and authentication. Third, to enhance security in an individual cluster node, we pro- pose a secure design for shared-memory multiprocessors (SMP) architecture, which is deployed in many clusters. The secure SMP architecture will provide condential communication between processors. This will remove the vulnerability of eavesdrop- ping attacks in a cluster node. Finally, to put all proposed schemes together, we propose a security/performance trade-o model which can precisely predict performance of an integrated secure cluster.

Lee, Man Hee

2008-08-01T23:59:59.000Z

118

SecureBox: National Security Through Secure Cargo Team Members  

SecureBox: National Security Through Secure Cargo Team Members: Front Row (left to right): Howard Lowdermilk, Greg Dallum, Faranak Nekoogar, Vickie ...

119

Safety, Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Safety, Security Safety, Security Safety, Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our work Our commitments We conduct our work safely and responsibly to achieve our mission. We ensure a safe and healthful environment for workers, contractors, visitors, and other on-site personnel. We protect the health, safety, and welfare of the general public. We do not compromise safety for personal, programmatic, or

120

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8206,...

Note: This page contains sample records for the topic "building number secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

transparency, and security that are preconditions to the ultimate fulfillment of the Non-Proliferation Treaty's goals and ambitions. Open Source Center The Open Source Center...

122

Security Automation Conference & Workshop  

Science Conference Proceedings (OSTI)

... Security Automation Conference & Workshop. ... Richard Hale, DISA - Information Security & Security Automation in DoD (coming soon); ...

123

HIPAA Security Rule  

Science Conference Proceedings (OSTI)

Related ActivitiesHIPAA Security RuleHealth Information Exchange (HIE) Security Architecture. Related ... HIPAA Security Rule. NIST ...

2011-11-21T23:59:59.000Z

124

Security Enforcement Reporting Criteria  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Classified Information Security Noncompliance Reporting Criteria January 2012 MANDATORY SECURITY INCIDENT REPORTING Classified information security noncompliances are categorized...

125

Buildings*","Nongovernment-Owned Buildings",,,,"Government-Owned Buildings"  

U.S. Energy Information Administration (EIA) Indexed Site

Occupancy of Nongovernment-Owned and Government-Owned Buildings, Number of Buildings for Non-Mall Buildings, 2003" Occupancy of Nongovernment-Owned and Government-Owned Buildings, Number of Buildings for Non-Mall Buildings, 2003" ,"Number of Buildings (thousand)" ,"All Buildings*","Nongovernment-Owned Buildings",,,,"Government-Owned Buildings" ,,"Nongov- ernment- Owned Buildings","Owner Occupied","Nonowner Occupied","Unocc- upied","Govern- ment- Owned Buildings","Federal","State","Local" "All Buildings* ...............",4645,4011,1841,2029,141,635,46,164,425 "Building Floorspace" "(Square Feet)" "1,001 to 5,000 ...............",2552,2272,980,1205,87,280,"Q",77,183 "5,001 to 10,000 ..............",889,783,384,375,"Q",106,"Q","Q",87

126

NIST Selects Winner of Secure Hash Algorithm (SHA-3) ...  

Science Conference Proceedings (OSTI)

... Any change in the original message, however small, must cause a change in the ... in a building-wide security system and home appliances that can ...

2012-10-10T23:59:59.000Z

127

Food Service Buildings  

U.S. Energy Information Administration (EIA) Indexed Site

Service Service Characteristics by Activity... Food Service Food service buildings are those used for preparation and sale of food and beverages for consumption. Basic Characteristics [ See also: Equipment | Activity Subcategories | Energy Use ] Food Service Buildings... An overwhelming majority (72 percent) of food service buildings were small buildings (1,001 to 5,000 square feet). Tables: Buildings and Size Data by Basic Characteristics Establishment, Employment, and Age Data by Characteristics Number of Food Service Buildings by Predominant Building Size Categories Figure showing number of food service buildings by size. If you need assistance viewing this page, please contact 202-586-8800. Equipment Table: Buildings, Size, and Age Data by Equipment Types Predominant Heating Equipment Types in Food Service Buildings

128

Lab announces security changes  

NLE Websites -- All DOE Office Websites (Extended Search)

Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security...

129

Safety and Security Directives Reform  

NLE Websites -- All DOE Office Websites (Extended Search)

Reforming a "Mountain" of Policy Reforming a "Mountain" of Policy Beginning with his confirmation hearings in January 2009, Energy Secretary Steven Chu challenged the Department of Energy to take a fresh look at how we conduct business. This challenge provided the opportunity for DOE to put in place the most effective and efficient strategies to accomplish the Department's missions safely and securely. In response to the Secretary's challenge and building on the results of Deputy Secretary Poneman's Safety and Security Reform studies, the Office of Health, Safety and Security (HSS) broadened its directives review activities during 2009. By November 2009 HSS had initiated a disciplined review of all health, safety, and security directives, which included a systematic review of the Department's safety and security regulatory model.

130

Personnel Security Program | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Personnel Security Program Home > About Us > Our Programs > Nuclear Security > Personnel Security...

131

Office of Headquarters Security Operations: Headquarters Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Operations Home Sub Offices HQ Security Officers (HSO) Program Office of Information Security Office of Headquarters Personnel Office of...

132

GridStat Cyber Security and Regional Deployment Project Report  

Science Conference Proceedings (OSTI)

GridStat is a developing communication technology to provide real-time data delivery services to the electric power grid. It is being developed in a collaborative effort between the Electrical Power Engineering and Distributed Computing Science Departments at Washington State University. Improving the cyber security of GridStat was the principle focus of this project. A regional network was established to test GridStats cyber security mechanisms in a realistic environment. The network consists of nodes at Pacific Northwest National Laboratory, Idaho National Laboratory, and Washington State University. Idaho National Laboratory (INL) was tasked with performing the security assessment, the results of which detailed a number or easily resolvable and previously unknown issues, as well as a number of difficult and previously known issues. Going forward we recommend additional development prior to commercialization of GridStat. The development plan is structured into three domains: Core Development, Cyber Security and Pilot Projects. Each domain contains a number of phased subtasks that build upon each other to increase the robustness and maturity of GridStat.

Clements, Samuel L.

2009-02-18T23:59:59.000Z

133

Office Buildings - Energy Consumption  

U.S. Energy Information Administration (EIA) Indexed Site

Energy Consumption Energy Consumption Office buildings consumed more than 17 percent of the total energy used by the commercial buildings sector (Table 4). At least half of total energy, electricity, and natural gas consumed by office buildings was consumed by administrative or professional office buildings (Figure 2). Table 4. Energy Consumed by Office Buildings for Major Fuels, 2003 All Buildings Total Energy Consumption (trillion Btu) Number of Buildings (thousand) Total Floorspace (million sq. ft.) Sum of Major Fuels Electricity Natural Gas Fuel Oil District Heat All Buildings 4,859 71,658 6,523 3,559 2,100 228 636 All Non-Mall Buildings 4,645 64,783 5,820 3,037 1,928 222 634 All Office Buildings 824 12,208 1,134 719 269 18 128 Type of Office Building

134

Energy Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Security Energy Security Energy Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. April 12, 2012 A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. Proponents of such bioreactors (compared to open ponds) say the growth environment can be more easily controlled; they prevent evaporation; and light penetrates through all sides of the container, which increases cell density. However, bioreactors suffer high materials and energy costs as well as mixing and gas-exchange

135

Buildings*","Buildings on Multibuilding Facilities",,"All  

U.S. Energy Information Administration (EIA) Indexed Site

1. Multibuilding Facilities, Number of Buildings and Floorspace for Non-Mall Buildings, 2003" 1. Multibuilding Facilities, Number of Buildings and Floorspace for Non-Mall Buildings, 2003" ,"Number of Buildings (thousand)",,,"Total Floorspace (million square feet)" ,"All Buildings*","Buildings on Multibuilding Facilities",,"All Buildings*","Buildings on Multibuilding Facilities" ,,"All Buildings","With Central Physical Plant",,"All Buildings","With Central Physical Plant" "All Buildings* ...............",4645,1477,116,64783,24735,6604 "Building Floorspace" "(Square Feet)" "1,001 to 5,000 ...............",2552,771,"Q",6789,2009,"Q" "5,001 to 10,000 ..............",889,259,"Q",6585,1912,"Q"

136

1999 CBECS Principal Building Activities  

U.S. Energy Information Administration (EIA) Indexed Site

Data Reports > 2003 Building Characteristics Overview Data Reports > 2003 Building Characteristics Overview A Look at Building Activities in the 1999 Commercial Buildings Energy Consumption Survey The Commercial Buildings Energy Consumption Survey, or CBECS, covers a wide variety of building types—office buildings, shopping malls, hospitals, churches, and fire stations, to name just a few. Some of these buildings might not traditionally be considered "commercial," but the CBECS includes all buildings that are not residential, agricultural, or industrial. For an overview of definitions and examples of the CBECS building types, see Description of Building Types. Compare Activities by... Number of Buildings Building size Employees Building Age Energy Conservation Number of Computers Electricity Generation Capability

137

Religious Worship Buildings  

U.S. Energy Information Administration (EIA) Indexed Site

Religious Worship Religious Worship Characteristics by Activity... Religious Worship Religious worship buildings are those in which people gather for religious activities. Basic Characteristics [ See also: Equipment | Activity Subcategories | Energy Use ] Religious Worship Buildings... 93 percent of religious worship buildings were less than 25,000 square feet. The oldest religious worship buildings were found in the Northeast, where the median age was over two and half times older than those in South, where religious worship buildings were the newest. Tables: Buildings and Size Data by Basic Characteristics Establishment, Employment, and Age Data by Characteristics Top Number of Religious Worship Buildings by Predominant Building Size Categories Figure showing number of worship buildings by size. If you need assistance viewing this page, please call 202-586-8800.

138

ENERGY SECURITY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

national strategy for national strategy for ENERGY SECURITY recommendations to the nation on reducing u.s. oil dependence september 2008 a project of a project of a national strategy for energy security Recommendations to the Nation on Reducing U.S. Oil Dependence september 2008 Table of Contents 2 Energy Security Leadership Council 3 Statement of Purpose 4 Letter to the President, the Congress, and the American People 7 Outline of Main Body of Report 13 Introduction 21 Policy Recommendations: Summary 33 Part I · Diversify Energy Supplies for the Transportation Sector

139

Protocol, Security Assistance - January 2007 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protocol, Security Assistance - January 2007 Protocol, Security Assistance - January 2007 Protocol, Security Assistance - January 2007 January 2007 Provide timely technical assistance and system support to Field and HQ Elements to enhance site safeguards and security. The Assistance Program is comprised of technologists and subject matter experts from all the S&S disciplines and technical areas including Program Planning Management and Support, Advanced Security Technologies, Protective Force, Physical Security, Information Protection, Safeguards and Security Construction Projects, Vulnerability Assessments, and Nuclear Materials Control and Accountability. Our commitment is to continue to build an assistance program dedicated to serving the interests of the Department and our customers' S&S programs. Our emphasis remains

140

Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Security Security Security program under Office of Health, Safety and Security developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented. Headquarters Facilities Master Security Plan The purpose of the Headquarters Facility Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures

Note: This page contains sample records for the topic "building number secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

CHANGE OF NAME TIAA Annuity Number CREF Annuity Number TIAA Policy Number  

E-Print Network (OSTI)

CHANGE OF NAME TIAA Annuity Number CREF Annuity Number TIAA Policy Number Social Security Number and only use black or dark blue ink. Return this form to: TIAA-CREF P.O. Box 1264 Charlotte, NC 28201 NOTE City State Zip Code For TIAA-CREF USE ONLY Accepted -- Teachers Insurance and Annuity Association

Snider, Barry B.

142

Building Scale DC Microgrids  

NLE Websites -- All DOE Office Websites (Extended Search)

Scale DC Microgrids Title Building Scale DC Microgrids Publication Type Conference Proceedings LBNL Report Number LBNL-5729E Year of Publication 2012 Authors Marnay, Chris, Steven...

143

Security Rulemaking  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM 2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM Knoxville, TN - May 16, 2012 2 NRC Actions Since September 11, 2001 * Interim solution - enhance existing regulations through Security Orders * Objectives of the Orders are enhanced control of material to - Prevent unauthorized access - Prevent malevolent use of material - Mitigate consequences * Orders were issued to NRC licensees that transport: - Spent Nuclear Fuel - IAEA Code of Conduct Category 1 and 2 quantities of radioactive material Security Rulemakings 3 NRC Ongoing Activities * Orders are an interim measure * Long-term approach is to enhance transport security through public rulemaking * Rulemaking process in progress for - SNF Transportation Security - Physical Protection of Category 1 and 2 material (both fixed

144

CHEMICAL SAFETY Emergency Numbers  

E-Print Network (OSTI)

- 1 - CHEMICAL SAFETY MANUAL 2010 #12;- 2 - Emergency Numbers UNBC Prince George Campus Security Prince George Campus Chemstores 6472 Chemical Safety 6472 Radiation Safety 5530 Biological Safety 5530 use, storage, handling, waste and emergency management of chemicals on the University of Northern

Bolch, Tobias

145

Nevada National Security Site Operational Awareness Oversight...  

NLE Websites -- All DOE Office Websites (Extended Search)

HSS Independent Activity Report - Rev. 0 Report Number: HIAR NNSS-2012-12-03 Site: Nevada National Security Site Subject: Office of Enforcement and Oversight's Office of Safety...

146

Transportation Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

147

Building Technologies Office: Residential Buildings  

NLE Websites -- All DOE Office Websites (Extended Search)

Residential Buildings Residential Buildings to someone by E-mail Share Building Technologies Office: Residential Buildings on Facebook Tweet about Building Technologies Office: Residential Buildings on Twitter Bookmark Building Technologies Office: Residential Buildings on Google Bookmark Building Technologies Office: Residential Buildings on Delicious Rank Building Technologies Office: Residential Buildings on Digg Find More places to share Building Technologies Office: Residential Buildings on AddThis.com... About Take Action to Save Energy Partner With DOE Activities Technology Research, Standards, & Codes Popular Residential Links Success Stories Previous Next Warming Up to Pump Heat. Lighten Energy Loads with System Design. Cut Refrigerator Energy Use to Save Money. Tools EnergyPlus Whole Building Simulation Program

148

Buildings*","Building Size"  

U.S. Energy Information Administration (EIA) Indexed Site

B6. Building Size, Number of Buildings for Non-Mall Buildings, 2003" B6. Building Size, Number of Buildings for Non-Mall Buildings, 2003" ,"Number of Buildings (thousand)" ,"All Buildings*","Building Size" ,,"1,001 to 5,000 Square Feet","5,001 to 10,000 Square Feet","10,000 to 25,000 Square Feet","25,001 to 50,000 Square Feet","50,001 to 100,000 Square Feet","100,001 to 200,000 Square Feet","200,001 to 500,000 Square Feet","Over 500,000 Square Feet" "All Buildings* ...............",4645,2552,889,738,241,129,65,25,7 "Principal Building Activity" "Education ....................",386,162,56,60,48,39,16,5,"Q" "Food Sales ...................",226,164,44,"Q","Q","Q","Q","N","N"

149

Buildings","Building Size"  

U.S. Energy Information Administration (EIA) Indexed Site

A5. Building Size, Number of Buildings for All Buildings (Including Malls), 2003" A5. Building Size, Number of Buildings for All Buildings (Including Malls), 2003" ,"Number of Buildings (thousand)" ,"All Buildings","Building Size" ,,"1,001 to 5,000 Square Feet","5,001 to 10,000 Square Feet","10,000 to 25,000 Square Feet","25,001 to 50,000 Square Feet","50,001 to 100,000 Square Feet","100,001 to 200,000 Square Feet","200,001 to 500,000 Square Feet","Over 500,000 Square Feet" "All Buildings ................",4859,2586,948,810,261,147,74,26,8 "Principal Building Activity" "Education ....................",386,162,56,60,48,39,16,5,"Q" "Food Sales ...................",226,164,44,"Q","Q","Q","Q","N","N"

150

Buildings*","Principal Building Activity"  

U.S. Energy Information Administration (EIA) Indexed Site

1. Selected Principal Building Activity: Part 1, Number of Buildings for Non-Mall Buildings, 2003" 1. Selected Principal Building Activity: Part 1, Number of Buildings for Non-Mall Buildings, 2003" ,"Number of Buildings (thousand)" ,"All Buildings*","Principal Building Activity" ,,"Education","Food Sales","Food Service","Health Care",,"Lodging","Retail (Other Than Mall)" ,,,,,"Inpatient","Outpatient" "All Buildings* ...............",4645,386,226,297,8,121,142,443 "Building Floorspace" "(Square Feet)" "1,001 to 5,000 ...............",2552,162,164,202,"N",56,38,241 "5,001 to 10,000 ..............",889,56,44,65,"N",38,21,97 "10,001 to 25,000 .............",738,60,"Q",23,"Q",19,38,83

151

LOS ALAMOS NATIONAL SECURITY, LLC BIOLOGICAL MATERIAL TRANSFER ...  

Folding Reporter Not 4 Profit BMTA LANL Agreement Number: LOS ALAMOS NATIONAL SECURITY, LLC . BIOLOGICAL MATERIAL TRANSFER AGREEMENT . THIS BIOLOGICAL ...

152

LOS ALAMOS NATIONAL SECURITY, LLC BIOLOGICAL MATERIAL TRANSFER ...  

Folding Reporter Foreign Not 4 Profit BMTA LANL Agreement Number: LOS ALAMOS NATIONAL SECURITY, LLC . BIOLOGICAL MATERIAL TRANSFER AGREEMENT

153

Cooperative monitoring of regional security agreements  

SciTech Connect

This paper argues that cooperative monitoring plays a critical role in the implementation of regional security agreements and confidence building measures. A framework for developing cooperative monitoring options is proposed and several possibilities for relating bilateral and regional monitoring systems to international monitoring systems are discussed. Three bilateral or regional agreements are analyzed briefly to illustrate different possibilities: (1) the demilitarization of the Sinai region between Israel and Egypt in the 1970s; (2) the 1991 quadripartite agreement for monitoring nuclear facilities among Brazil, Argentina, The Argentine-Brazilian Agency for Accounting and Control of Nuclear Materials and the International Atomic Energy Agency; and (3) a bilateral Open Skies agreement between Hungary and Romania in 1991. These examples illustrate that the relationship of regional or bilateral arms control or security agreements to international agreements depends on a number of factors: the overlap of provisions between regional and international agreements; the degree of interest in a regional agreement among the international community; efficiency in implementing the agreement; and numerous political considerations.Given the importance of regional security to the international community, regions should be encouraged to develop their own infrastructure for implementing regional arms control and other security agreements. A regional infrastructure need not preclude participation in an international regime. On the contrary, establishing regional institutions for arms control and nonproliferation could result in more proactive participation of regional parties in developing solutions for regional and international problems, thereby strengthening existing and future international regimes. Possible first steps for strengthening regional infrastructures are identified and potential technical requirements are discussed.

Pregenzer, A.L.; Vannoni, M.; Biringer, K.L.

1995-08-01T23:59:59.000Z

154

Office of Headquarters Personnel Security Operations: Mission and Functions  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Executive Protection Office of Executive Protection Home Sub Offices › HQ Security Officers (HSO) Program › Office of Security Operations › Office of Information Security › Office of Headquarters Personnel › Office of Physical Protection › Office of Security Operations Mission & Functions › Security Operations › HQ Security Operations › HQ Personnel Security Op. › Special Operations HSO Program - 2010 Spotlights - 2009 Spotlights - Spotlights Archives (2008-2007) HSO Contacts Contact Us Headquarters Facilities Master Security Plan Security Reference Book HSS Logo Office of Headquarters Personnel Security Operations Reports to the Office of Security Operations Mission and Functions Mission Provide a comprehensive Personnel Security Program for the DOE Headquarters complex. Ensure that DOE classified information, materials, buildings and information systems are safeguarded from compromise by only granting security clearances and building access to trustworthy individuals. This is accomplished through conscientious, just, and thoughtful application of Federal rules and statutes with the goal of ensuring that only individuals whose character, associations, and loyalty do not endanger the common defense are granted access to DOE classified information, materials, buildings and information systems.

155

National Security Technology Center | Y-12 National Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Security and Training National Security ... National Security Technology Center What kinds of security technologies are we talking about? See our capabilities...

156

Tag: security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

security security Tag: security Displaying 1 - 5 of 5... Category: Security Security Y-12 places the highest priority on maintaining and improving its security posture. More... Category: News Johnson shares perspective on security Rod Johnson, B&W Y-12 deputy general manager of Security, recently discussed the security atmosphere since his arrival last August and what he sees as Y-12's security future. More... Category: News Y-12 to Install New Fence to Reduce Trespassing The National Nuclear Security Administration today announced plans to extend the boundary fence at the Y-12 National Security Complex along Scarboro Road. The new fence is expected to be in place by April 4. More... Category: News New institute promotes nuclear security Y-12 is partnering with the University of Tennessee and others to provide

157

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8/2/06, Product #16, stated: "Develop an annotated bibliography of publicly-available documents related to security of radioactive material transportation." * Earlier this year, a preliminary draft annotated bibliography on this topic was developed by T-REX , UNM, to initially address this STG Work Plan Task. Preliminary Draft - For Review Only 3 Considerations in Determining Release of Information * Some "Publicly-available" documents could potentially contain inappropriate information according to standards set by DOE information security policy and DOE Guides. - Such documents would not be freely

158

Message Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Message Message Security Services Overview ECS Audio/Video Conferencing Fasterdata IPv6 Network Network Performance Tools (perfSONAR) ESnet OID Registry PGP Key Service Virtual Circuits (OSCARS) OSCARS Case Study Documentation User Manual FAQ Design Specifications Functional Specifications Notifications Publications Authorization Policy Default Attributes Message Security Clients For Developers Interfaces Links Hardware Requirements DOE Grids Service Transition Contact Us Technical Assistance: 1 800-33-ESnet (Inside the US) 1 800-333-7638 (Inside the US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net Message Security Overview The OSCARS Web pages and Web Services are run within a Tomcat container which uses SSL connections to encrypt all messages. The OSCARS Web Service

159

Allied Security Scholarship ALLIED SECURITY SCHOLARSHIP 2013  

E-Print Network (OSTI)

Allied Security Scholarship ALLIED SECURITY SCHOLARSHIP 2013 BACKGROUND The Allied Security Scholarship was established by Allied Security to assist students to undertake full-time study at the University of Waikato. REGULATIONS 1. The Scholarship shall be known as the Allied Security Scholarship. 2

Waikato, University of

160

Physical Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Summary Report - Independent Oversight Inspection of Safeguards and Security and Cyber Security at the Y-12 Site Office and the Y-12 National Security Complex (U), January...

Note: This page contains sample records for the topic "building number secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Security for grids  

E-Print Network (OSTI)

S. Kent, R. Atkinson. Security Architecture for the InternetTsudik, S. Tuecke. A Security Architecture for ComputationalComputer and Communications Security Conference, pp. 83-92,

Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

2005-01-01T23:59:59.000Z

162

Taxation and Social Security  

E-Print Network (OSTI)

Re: Taxation and Social Security Attached is draft chapter11 TAXATION AND SOCIAL SECURITY A substantial fraction ofaspects of social security schemes in a setting in which

Kaplow, Louis

2006-01-01T23:59:59.000Z

163

Security and Elections  

E-Print Network (OSTI)

World Conf. Information Security Education, 2007, pp. 1724;Security andElections IEEE Security & Privacy, 10(5):6467, Sept. -

Bishop, Matt; Peisert, Sean

2012-01-01T23:59:59.000Z

164

New Services for Building Maintenance Enabled by Building Automation  

NLE Websites -- All DOE Office Websites (Extended Search)

New Services for Building Maintenance Enabled by Building Automation New Services for Building Maintenance Enabled by Building Automation Systems Speaker(s): Heikki Ihasalo Date: May 17, 2007 - 12:00pm Location: 90-3122 Seminar Host/Point of Contact: Peng Xu Today's building automation systems enable building systems integration and access to information from a variety of sources, e.g. fire alarm systems, access control, security systems, lighting and control systems. With the help of Internet technology and XML (Extensible Markup Language) building automation systems can also connect to other enterprise\ applications such as facility management software, maintenance management systems, ERP or financial systems. New applications are also emerging to manage energy consumption in buildings, for example demand response and fault detection

165

Building Technologies Office: Commercial Building Energy Asset...  

NLE Websites -- All DOE Office Websites (Extended Search)

TECHNOLOGIES RESIDENTIAL BUILDINGS COMMERCIAL BUILDINGS APPLIANCE & EQUIPMENT STANDARDS BUILDING ENERGY CODES EERE Building Technologies Office Commercial Buildings...

166

Usable Security in Smart Homes  

E-Print Network (OSTI)

AbstractA number of technologies are emerging that enable the creation of Smart Homes, which are households containing numerous networked devices all interacting with each other over the home network. As these Smart Homes become increasingly prevalent and users become more reliant on mobile devices to handle sensitive information, research related to the development of a usable security framework for Smart Homes is increasing in importance. In this paper, we first give some of the motivating use cases for such a security framework. We then describe some of the design challenges presented by the creation of usable Smart Home security frameworks. With an emphasis on usability, we proceed to highlight the hardships users face when interacting with currently available security frameworks and substantiate the need for a significant improvement in this field. Finally, we summarize and conclude. Key words: Smart Home, home networking, security, usability.

Saad Shakhshir; Dimitris Kalofonos

2005-01-01T23:59:59.000Z

167

Java Security  

Science Conference Proceedings (OSTI)

From the Publisher:With a market share of almost 70%, Java can be rightly called the programming language of the Web. Java security allows transmission of sensitive information, stores sensitive data, ensures that code is from a trusted source, and ensures ...

Madhushree Ganguli

2002-11-01T23:59:59.000Z

168

Trends in Commercial Buildings--Buildings and Floorspace  

U.S. Energy Information Administration (EIA) Indexed Site

Home > Trends in Commercial Buildings > Home > Trends in Commercial Buildings > Trends in Buildings Floorspace Data tables Commercial Buildings Trend—Detail Commercial Floorspace Trend—Detail Background: Adjustment to data Trends in Buildings and Floorspace Each year buildings are added to and removed from the commercial buildings sector. Buildings are added by new construction or conversion of existing buildings from noncommercial to commercial activity. Buildings are removed by demolition or conversion from commercial to noncommercial activity. Number of Commercial Buildings In 1979, the Nonresidential Buildings Energy Consumption Survey estimated that there were 3.8 million commercial buildings in the United States; by 1992, the number increased 27 percent to 4.8 million (an average annual increase of 1.8%) (Figure 1). In 1995, the estimated number declined to 4.6 million buildings, but it is unlikely that there was an actual decline in the number of buildings. To understand the apparent decline, two factors should be considered—the change in the way that the target population of commercial buildings was defined in 1995 and the uncertainty of estimates from sample surveys:

169

Better Buildings Progress Report 2012  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Report 2012 Report 2012 BETTER BUILDINGS PROGRESS REPORT 2012 Better Buildings Progress Report 2012 Executive Summary 1 Better Buildings - Goals and Strategies 2 Better Buildings Initiative Timeline 4 Developing Innovative, Replicable Solutions with Market Leaders 6 Making Energy Efficiency Investment Easier 13 Developing a Skilled Clean Energy Workforce 19 Federal Leadership by Example 21 Appendix A. Better Buildings Challenge Participant List 23 Appendix B. Better Buildings Challenge Showcase Projects 24 Appendix C. Better Buildings Challenge Solutions 25 BETTER BUILDINGS PROGRESS REPORT 2012 1 Energy efficiency is widely recognized as a cost-effective-but underutilized-strategy for reducing energy costs while increasing energy security, improving our environment, and contributing to the American job

170

CONVERGING REDUNDANT SENSOR NETWORK INFORMATION FOR IMPROVED BUILDING CONTROL  

SciTech Connect

Knowing how many people occupy a building, and where they are located, is a key component of building energy management and security. Commercial, industrial and residential buildings often incorporate systems used to determine occupancy, however, current sensor technology and control algorithms limit the effectiveness of both energy management and security systems. This topical report describes results from the first phase of a project to design, implement, validate, and prototype new technologies to monitor occupancy, control indoor environment services, and promote security in buildings. Phase I of the project focused on instrumentation and data collection. In this project phase a new occupancy detection system was developed, commissioned and installed in a sample of private offices and open-plan office workstations. Data acquisition systems were developed and deployed to collect data on space occupancy profiles. Analysis tools based on Bayesian probability theory were applied to the occupancy data generated by the sensor network. The inference of primary importance is a probability distribution over the number of occupants and their locations in a building, given past and present sensor measurements. Inferences were computed for occupancy and its temporal persistence in individual offices as well as the persistence of sensor status. The raw sensor data were also used to calibrate the sensor belief network, including the occupancy transition matrix used in the Markov model, sensor sensitivity, and sensor failure models. This study shows that the belief network framework can be applied to the analysis of data streams from sensor networks, offering significant benefits to building operation compared to current practice.

Dale K. Tiller; Gregor P. Henze

2004-11-01T23:59:59.000Z

171

Commercial Buildings Characteristics, 1992  

Science Conference Proceedings (OSTI)

Commercial Buildings Characteristics 1992 presents statistics about the number, type, and size of commercial buildings in the United States as well as their energy-related characteristics. These data are collected in the Commercial Buildings Energy Consumption Survey (CBECS), a national survey of buildings in the commercial sector. The 1992 CBECS is the fifth in a series conducted since 1979 by the Energy Information Administration. Approximately 6,600 commercial buildings were surveyed, representing the characteristics and energy consumption of 4.8 million commercial buildings and 67.9 billion square feet of commercial floorspace nationwide. Overall, the amount of commercial floorspace in the United States increased an average of 2.4 percent annually between 1989 and 1992, while the number of commercial buildings increased an average of 2.0 percent annually.

Not Available

1994-04-29T23:59:59.000Z

172

CBECS Buildings Characteristics --Revised Tables  

U.S. Energy Information Administration (EIA) Indexed Site

Conservation Tables Conservation Tables (16 pages, 86 kb) CONTENTS PAGES Table 41. Energy Conservation Features, Number of Buildings and Floorspace, 1995 Table 42. Building Shell Conservation Features, Number of Buildings, 1995 Table 43. Building Shell Conservation Features, Floorspace, 1995 Table 44. Reduction in Equipment Use During Off Hours, Number of Buildings and Floorspace, 1995 These data are from the 1995 Commercial Buildings Energy Consumption Survey (CBECS), a national probability sample survey of commercial buildings sponsored by the Energy Information Administration, that provides information on the use of energy in commercial buildings in the United States. The 1995 CBECS was the sixth survey in a series begun in 1979. The data were collected from a sample of 6,639 buildings representing 4.6 million commercial buildings

173

CBECS Buildings Characteristics --Revised Tables  

U.S. Energy Information Administration (EIA) Indexed Site

Geographic Location Tables Geographic Location Tables (24 pages, 136kb) CONTENTS PAGES Table 3. Census Region, Number of Buildings and Floorspace, 1995 Table 4. Census Region and Division, Number of Buildings, 1995 Table 5. Census Region and Division, Floorspace, 1995 Table 6. Climate Zone, Number of Buildings and Floorspace, 1995 Table 7. Metropolitan Status, Number of Buildings and Floorspace, 1995 These data are from the 1995 Commercial Buildings Energy Consumption Survey (CBECS), a national probability sample survey of commercial buildings sponsored by the Energy Information Administration, that provides information on the use of energy in commercial buildings in the United States. The 1995 CBECS was the sixth survey in a series begun in 1979. The data were collected from a sample of 6,639 buildings representing 4.6 million commercial buildings

174

Formalizing information security knowledge  

Science Conference Proceedings (OSTI)

Unified and formal knowledge models of the information security domain are fundamental requirements for supporting and enhancing existing risk management approaches. This paper describes a security ontology which provides an ontological structure for ... Keywords: information security, risk management, security ontology

Stefan Fenz; Andreas Ekelhart

2009-03-01T23:59:59.000Z

175

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

176

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Management & Safeguards System Security Forms Federal Information Processing Standards Publications (FIPS PUBS) FIPS-Associated Documents FIPS 140-2 Security Requirements...

177

Physical Security Systems | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

178

Information Security: Coordination of Federal Cyber Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research...

179

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Security Forms Home > About Us > Our Programs > Nuclear Security > Nuclear Materials...

180

Towards a Process for Web Services Security  

E-Print Network (OSTI)

Web Services (WS) security has undergone an enormous development, as carried out by the major organizations and consortiums of the industry over the last few years. This has brought about the appearance of a huge number of WS security standards. Such a fact has made organizations remain reticent about adopting technologies based on this paradigm, due to the learning curve which is inevitable in the integration of security into their practical deployments. In this paper we present PWSSec (Process for Web Services Security), which enables the integration of a set of specific security stages into the traditional phases of WS-based systems development. PWSSec defines three stages, WSSecReq (Web Services Security Requirements), WSSecArch (Web Services Security Architecture) and WSSecTech (Web Services Security Technologies). These facilitate, respectively, the definition of WS-specific security requirements, the development of a WS-based security architecture and the identification of the WS security standards that the security architecture must articulate in order to implement the security services.

Carlos Gutirrez; Eduardo Fernndez-medina; Mario Piattini

2005-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "building number secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Compare Activities by Number of Computers  

U.S. Energy Information Administration (EIA) Indexed Site

Number of Computers Number of Computers Compare Activities by ... Number of Computers Office buildings contained the most computers per square foot, followed by education and outpatient health care buildings. Education buildings were the only type with more than one computer per employee. Religious worship and food sales buildings had the fewest computers per square foot. Percent of All Computers by Building Type Figure showing percent of all computers by building type. If you need assistance viewing this page, please call 202-586-8800. Computer Data by Building Type Number of Buildings (thousand) Total Floorspace (million square feet) Number of Employees (thousand) Total Computers (thousand) Computers per Million Square Feet Computers per Thousand Employees All Buildings 4,657

182

Cyber Security Evaluations Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Home Sub Offices Security Evaluations Cyber Security Evaluations Emergency Management Oversight Environment, Safety and Health Evaluations Mission &...

183

Global Security 2009  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security *Intelligence *Hyper Innovation Global Security Weapons & Complex Integration NIF Office of Strategic Outcomes Operations & Business Lawrence Livermore National...

184

National Security Initiatives | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Bioinformatics Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Initiatives SHARE National...

185

Safety and Security  

Science Conference Proceedings (OSTI)

*. Bookmark and Share. Safety and Security. ... National and International Standards for X-ray Security Screening Applications. ...

2013-07-29T23:59:59.000Z

186

Cryptographic and Security Testing  

Science Conference Proceedings (OSTI)

Directory of Accredited Laboratories. Cryptographic and Security Testing. ... TX. atsec information security corporation, Austin, TX [200658- 0] VA. ...

2013-12-27T23:59:59.000Z

187

Computer Security Division Homepage  

Science Conference Proceedings (OSTI)

Computer Security Division. ... The 2012 Computer Security Division Annual Report (Special Publication 800-165) is now available. ...

2013-09-12T23:59:59.000Z

188

Mobile Security and Forensics  

Science Conference Proceedings (OSTI)

Mobile Security and Forensics. Summary: The goal of the project is to improve the security of mobile devices and software. ...

2013-01-15T23:59:59.000Z

189

Privacy Act Requests | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

be your full name, any other names you might have used, your birth date, your social security number, and home address. Please provide a phone number where you can be reached...

190

Commercial Buildings  

NLE Websites -- All DOE Office Websites (Extended Search)

Links Commercial Building Ventilation and Indoor Environmental Quality Batteries and Fuel Cells Buildings Energy Efficiency Electricity Grid Energy Analysis Energy...

191

HAN System Security Requirements  

Science Conference Proceedings (OSTI)

This report, "Home Area Network (HAN) Security Requirements," identifies and discusses the key cyber security requirements for different interfaces of HAN-based systems. These cyber security requirements for HAN interfaces are derived from the Department of Homeland Security (DHS) "Catalog of Control Systems Security," which provides an excellent checklist of general security requirements.

2009-12-22T23:59:59.000Z

192

Sustainable Buildings and Campuses | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and Campuses and Campuses Sustainable Buildings and Campuses October 4, 2013 - 4:18pm Addthis Sustainable Buildings and Campuses The Federal Energy Management Program (FEMP) provides strategies, best practices, and resources to help Federal agencies implement sustainable design practices within Federal buildings and facilities. Learn about: Sustainable building design basics Federal requirements Sustainability for existing buildings Sustainable design for new construction and major renovations Life cycle cost analysis for sustainability Energy security planning Case studies Interagency Sustainability Working Group. Also see Sustainable Building Contacts. Addthis Related Articles Energy Department Training Breaks New Ground Sustainable Building Contacts Commissioning Training Available

193

High-Tech Buildings - Market Transformation Project  

NLE Websites -- All DOE Office Websites (Extended Search)

Tech Buildings - Market Transformation Project Title High-Tech Buildings - Market Transformation Project Publication Type Report LBNL Report Number LBNL-49112 Year of Publication...

194

FOILFEST :community enabled security.  

SciTech Connect

The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

2005-09-01T23:59:59.000Z

195

Asian Energy Security  

Science Conference Proceedings (OSTI)

OAK-B135 In the Asian Energy Security (AES) Project, Nautilus Institute works together with a network of collaborating groups from the countries of Northeast Asia to evaluate the energy security implications of different national and regional energy ''paths''. The goal of the Asia Energy Security project is to illuminate energy paths--and the energy policy choices that might help to bring them about--that result in a higher degree of energy security for the region and for the world as a whole, that is, to identify energy paths that are ''robust'' in meeting many different energy security and development objectives, while also offering flexibility in the face of uncertainty. In work to date, Nautilus has carefully assembled a network of colleagues from the countries of the region, trained them together as a group in the use of a common, flexible, and transparent energy and environmental analysis planning software tool (LEAP, the Long-range Energy Alternatives Planning system), and worked with them to prepare base-year energy sector models for each country. To date, complete data sets and models for ''Business as Usual'' (BAU) energy paths have been compiled for China, Japan, the Republic of Korea, and the Democratic Peoples' Republic of Korea. A partial data set and BAU path has been compiled for the Russian Far East, and a data set is being started in Mongolia, where a team of researchers has just joined the AES project. In several countries, ''Alternative'' energy paths have been developed as well, or partially elaborated. National energy sector developments, progress on national LEAP modeling, additional LEAP training, and planning for the next phase of the AES project were the topics of a recent (early November) workshop held in Vancouver, British Columbia. With funding from the Department of Energy, Nautilus is poised to build upon the successes of the project to date with a coordinated international effort to research the energy security ramifications of regional coordination on energy issues in Northeast Asia. The paragraphs below summarize Nautilus' plans for the AES project in the coming months.

Peter Hayes, PhD

2003-12-01T23:59:59.000Z

196

Cyber Security Audit and Attack Detection Toolkit: Bandolier and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Audit and Attack Detection Toolkit: Bandolier and Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems. By building configuration audit and attack detection capabilities into tools already used by the energy sector, Bandolier and Portaledge offer energy asset owners low-cost and easily integrable control systems security solutions. Energy system operators can optimize the security of their control system configuration using Bandolier Security Audit Files, which assess the current configuration against an optimal security configuration.

197

Security seal  

DOE Patents (OSTI)

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, Garth W. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

198

Buildings*","Principal Building Activity"  

U.S. Energy Information Administration (EIA) Indexed Site

3. Selected Principal Activity: Part 2, Number of Buildings for Non-Mall Buildings, 2003" 3. Selected Principal Activity: Part 2, Number of Buildings for Non-Mall Buildings, 2003" ,"Number of Buildings (thousand)" ,"All Buildings*","Principal Building Activity" ,,"Office","Public Assembly","Public Order and Safety","Religious Worship","Service","Warehouse and Storage" "All Buildings* ...............",4645,824,277,71,370,622,597 "Building Floorspace" "(Square Feet)" "1,001 to 5,000 ...............",2552,503,119,37,152,434,294 "5,001 to 10,000 ..............",889,127,67,"Q",104,100,110 "10,001 to 25,000 .............",738,116,69,"Q",83,66,130 "25,001 to 50,000 .............",241,43,9,"Q",27,17,27

199

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

200

Security rules versus Security properties Mathieu Jaume  

E-Print Network (OSTI)

Security rules versus Security properties Mathieu Jaume SPI ­ LIP6 ­ University Pierre & Marie components of security policies can be expressed, and we identify their role in the de- scription of a policy, of a system and of a secure system. In this setting, we formally describe two approaches to define policies

Paris-Sud XI, Université de

Note: This page contains sample records for the topic "building number secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

202

Security Procedures Caltech Campus Security Dispatch  

E-Print Network (OSTI)

Security Procedures Caltech Campus Security Dispatch: 5000 (from any Caltech phone) or (626) 395-5000 (from any phone) When emergencies arise, contact Caltech Campus Security MEDICAL If someone experiences a medical emergency: · Remain calm · Notify Campus Security Dispatch · Do NOT move victim EARTHQUAKE When

Goddard III, William A.

203

Obfuscation (IND-CPA Security Circular Security)  

E-Print Network (OSTI)

Obfuscation (IND-CPA Security Circular Security) (Draft Version, 24 October 2013) Antonio@cs.au.dk 2 Aarhus University, Denmark, orlandi@cs.au.dk Abstract Circular security is an important notion for public-key encryption schemes and is needed by several cryptographic protocols. In circular security

International Association for Cryptologic Research (IACR)

204

National Nuclear Security Administration IUA  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

IUA IUA '1.L'\I~~ Pantex Site Office IIV1'~~4j P. O. Box 30030 Amarillo, TX 79120 National Nuclear Security Administration NEPA Compliance Officer Rationale Pantex Site Office Proj. No.: EXP-IO-OlS-C NEPA ID No.: PXP-IO-OOOI Uninterruptable Power Supply (UPS)/Generator Replacement Application of DOE NEPA Procedure: Categorical Exclusions B 1.3 and B 1.23, Applicable to Facility Operations (10 CFR Part 1021 , Subpart D, Appendix B), apply to the proposed activity described below. Rationale: The U.S . Department of Energy (DOE), National Nuclear Security Administration (NNSA), proposes to demolish Building 12-20, which is 225 square feet (sf) in size, along with a small concrete pad of approximately 32 sf. The building currently houses an inoperable

205

Nonproliferation & International Security | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

206

Nonproliferation & International Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

207

Building Technologies Office: Building America: Bringing Building  

NLE Websites -- All DOE Office Websites (Extended Search)

America: Bringing Building Innovations to Market America: Bringing Building Innovations to Market Building America logo The U.S. Department of Energy's (DOE) Building America program has been a source of innovations in residential building energy performance, durability, quality, affordability, and comfort for more than 15 years. This world-class research program partners with industry (including many of the top U.S. home builders) to bring cutting-edge innovations and resources to market. For example, the Solution Center provides expert building science information for building professionals looking to gain a competitive advantage by delivering high performance homes. At Building America meetings, researchers and industry partners can gather to generate new ideas for improving energy efficiency of homes. And, Building America research teams and DOE national laboratories offer the building industry specialized expertise and new insights from the latest research projects.

208

Homeland Security Issues for Facilities  

E-Print Network (OSTI)

The events of September 11, 2001, along with the Oklahoma City bombing and Washington, DC area sniper attacks have forever changed America's sense of security. Federal, state, and local governments, businesses, and individual homeowners have become more aware of safety, security, and protecting property and people should similar incidents occur in the future. The initial steps in facility protection are identifying potential threats and evaluating the condition of existing building infrastructure and systems. After assessments are complete, the results should be compared with guidelines and recommendations produced by government agencies or professional organizations. Areas to address to enhance security and safety include ventilation, control systems, air filtration, alarm systems, building access, and surveillance. This paper will look at the objectives of task forces, sources of information, and measures owners can take in schools and other facilities. Although actions involving increased awareness, structural reinforcement, and emergency water supplies are important, this discussion will focus on mechanical and security systems and related items. The authors' experiences in assisting Texas school districts will also be shared.

McClure, J. D.; Fisher, D.; Fenter, T.

2004-01-01T23:59:59.000Z

209

The Building Design Advisor  

SciTech Connect

The Building Design Advisor (BDA) is a software environment that supports the integrated use of multiple analysis and visualization tools throughout the building design process, from the initial, schematic design phases to the detailed specification of building components and systems. Based on a comprehensive design theory, the BDA uses an object-oriented representation of the building and its context, and acts as a data manager and process controller to allow building designers to quickly navigate through the multitude of descriptive and performance parameters addressed by the analysis and visualization tools linked to the BDA. Through the Browser the user can edit the values of input parameters and select any number of input and/or output parameters for display in the Decision Desktop. The Desktop allows building designers to compare multiple design alternatives with respect to any number of parameters addressed by the tools linked to the BDA.

Papamichael, K.; LaPorta, J.; Chauvet, H.; Collins, D.; Trzcinski, T.; Thorpe, J.; Selkowitz, S.

1996-03-01T23:59:59.000Z

210

Benchmarking Building Performance & the Australian Building Greenhouse  

NLE Websites -- All DOE Office Websites (Extended Search)

Benchmarking Building Performance & the Australian Building Greenhouse Benchmarking Building Performance & the Australian Building Greenhouse Rating Scheme Speaker(s): Paul Bannister Date: August 21, 2006 - 12:00pm Location: 90-3122 Seminar Host/Point of Contact: Stephen Selkowitz (Two topics): Benchmarking Building Performance: In a variety of voluntary and regulatory initiatives around the globe, including the introduction of the European Building Performance Directive, the question of how to assess the performance of commercial buildings has become a critical issue. There are presently a number of initiatives for the assessment of actual building performance internationally, including in particular US Energy Star Buildings rating tools and the Australian Building Greenhouse Rating scheme. These schemes seek to assess building energy performance on the

211

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... approach to protect critical federal missions and business functions ... security areas such physical security, personnel security, continuity of operations ...

212

A number of organizations,  

E-Print Network (OSTI)

buying power to purchase green power. The city of Chicago has formed an alliance with 47 other local installed solar electric systems on a number of the city's buildings, including the Chicago Center for Green to competition, the city of Chicago and 47 other local government agencies formed the Local Government Power

213

Chapter_17_Headquarters_Security_Officer_Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7 7 Headquarters Security Officer Program This chapter implements the requirements of HQ Order 472.1, Headquarters Security Officer Program. The goal of the HSO Program is to have a knowledgeable security person within each HQ element to answer common security questions, process security documentation on behalf of the element's personnel, arrange for security services provided by HS-90, and serve as the element's security point of contact. In summary, HQ Order 472.1 requires each Head of Element at HQ to appoint a Federal employee as his/her HSO and at least one Federal employee as his/her Alternate HSO. The Head of Element may also appoint any number of contractors to the position of HSO Representative. HSOs and Alternate HSOs must be Federal employees because they commit the government to

214

HEADQUARTERS SECURITY OFFICERS  

NLE Websites -- All DOE Office Websites (Extended Search)

HEADQUARTERS SECURITY OFFICERS Revision Date: December 16, 2013 ELEMENT Office of Security Operations AR AR-1 AR-1 AR-1 CF CF-40 CF-40 CI CI-3 ED ED-2 EE EE-3A EE-3A NAME LOCATION PHONE FAX NUMBER WAYNE E. BERKEBILE E-325/GTN 301-903-1163 301-903-8108 Advanced Research Projects Agency - Energy MATTHEW TARDUOGNO L'N !NT 950/Rm. 8014 202-586-2892 202-287-5450 NICHOLE CLAGETT (ALT) L'N !NT 950/Rm. 8025 202-287-6409 202-287-5450 SARA DWYER (REP) L'N !NT 950/Rm. B-2 202-287-6411 202-287-5450 Office of the Chief Financial Officer PHILIP A. KNOPP Rm. 1310 CLV. 301-903-0364 301-903-1863 KIMBERLY J. LUCAS (ALT) Rm. 1310 CLV. 301-903-2485 301-903-6877 Assistant Secretary for Congressional and Intergovernmental Affairs

215

Ventilation in Multifamily Buildings  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

, 2011 , 2011 Ventilation in Multifamily Buildings Welcome to the Webinar! We will start at 2:00 PM Eastern Time Be sure that you are also dialed into the telephone conference call: Dial-in number: 888-324-9601; Pass code: 5551971 Download the presentation at: www.buildingamerica.gov/meetings.html Building Technologies Program eere.energy.gov Building America: Introduction November 1, 2011 Cheryn Engebrecht Cheryn.engebrecht@nrel.gov Building Technologies Program Building Technologies Program eere.energy.gov * Reduce energy use in new and existing residential buildings * Promote building science and systems engineering / integration approach * "Do no harm": Ensure safety, health and durability are maintained or improved * Accelerate adoption of high performance technologies

216

Efficient security mechanisms for overlay multicast-based content distribution  

Science Conference Proceedings (OSTI)

This paper studies the security issues that arise in an overlay multicast architecture where service providers distribute content such as web pages, static and streaming multimedia data, realtime stock quotes, or security updates to a large number of ...

Sencun Zhu; Chao Yao; Donggang Liu; Sanjeev Setia; Sushil Jajodia

2005-06-01T23:59:59.000Z

217

Analyzing websites for user-visible security design flaws  

Science Conference Proceedings (OSTI)

An increasing number of people rely on secure websites to carry out their daily business. A survey conducted by Pew Internet states 42% of all internet users bank online. Considering the types of secure transactions being conducted, businesses are rigorously ...

Laura Falk; Atul Prakash; Kevin Borders

2008-07-01T23:59:59.000Z

218

Using Operational Security (OPSEC) to Support a Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

219

T-592: Cisco Security Advisory: Cisco Secure Access Control System...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System...

220

Residential Buildings  

NLE Websites -- All DOE Office Websites (Extended Search)

Apartment building exterior and interior Apartment building exterior and interior Residential Buildings EETD's research in residential buildings addresses problems associated with whole-building integration involving modeling, measurement, design, and operation. Areas of research include the movement of air and associated penalties involving distribution of pollutants, energy and fresh air. Contacts Max Sherman MHSherman@lbl.gov (510) 486-4022 Iain Walker ISWalker@lbl.gov (510) 486-4692 Links Residential Building Systems Group Batteries and Fuel Cells Buildings Energy Efficiency Applications Commercial Buildings Cool Roofs and Heat Islands Demand Response Energy Efficiency Program and Market Trends High Technology and Industrial Systems Lighting Systems Residential Buildings Simulation Tools Sustainable Federal Operations

Note: This page contains sample records for the topic "building number secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Cyber and Network Security Homepage  

Science Conference Proceedings (OSTI)

Cyber and Network Security. Cyber and network security is focused on ensuring three security objectives of information ...

2010-10-05T23:59:59.000Z

222

GAO Information Security Issues Update  

Science Conference Proceedings (OSTI)

... Critical IT Systems & Infrastructure - NNSA Supercomputers CP & Security - State Security System - Wireless Security - IRS e*File ...

2010-10-08T23:59:59.000Z

223

Bioinformatics Systems | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Cyber Security Nuclear Forensics Bioinformatics Videos Workshops National Security Home | Science & Discovery | National Security | Initiatives | Bioinformatics SHARE...

224

Security Components and Mechanisms Group  

Science Conference Proceedings (OSTI)

Security Components and Mechanisms Group. Welcome. ... A security checklist is a document that contains instructions for securely configuring ...

2013-01-17T23:59:59.000Z

225

Energy Information Administration (EIA)- Commercial Buildings Energy  

U.S. Energy Information Administration (EIA) Indexed Site

5 CBECS Survey Data 2003 | 1999 | 1995 | 1992 | Previous 5 CBECS Survey Data 2003 | 1999 | 1995 | 1992 | Previous Building Characteristics Consumption & Expenditures Microdata Methodology Building Characteristics Data from the 1995 Commercial Buildings Energy Consumption Survey (CBECS) are presented in three groups of detailed tables: Buildings Characteristics Tables, number of buildings and amount of floorspace for major building characteristics. Energy Consumption and Expenditures Tables, energy consumption and expenditures for major energy sources. Energy End-Use Data, total, electricity and natural gas consumption and energy intensities for nine specific end-uses. All Principal Buildings Activities Number of Buildings, Total Floorspace, and Total Site and Primary Energy Consumption for All Principal Building Activities, 1995

226

ASC eNews Quarterly Newsletter June 2012 | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

the only way to influence technology providers to build machines that actually meet our national security requirements. Indeed, ASC's ability to deliver to the Stockpile...

227

Information Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information Security | National Nuclear Security Administration Information Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Information Security Home > About Us > Our Programs > Nuclear Security > Information Security Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by

228

Building Technologies Office: Commercial Building Activities  

NLE Websites -- All DOE Office Websites (Extended Search)

on Twitter Bookmark Building Technologies Office: Commercial Building Activities on Google Bookmark Building Technologies Office: Commercial Building Activities on Delicious...

229

Building Technologies Office: Buildings Performance Database  

NLE Websites -- All DOE Office Websites (Extended Search)

on Twitter Bookmark Building Technologies Office: Buildings Performance Database on Google Bookmark Building Technologies Office: Buildings Performance Database on Delicious...

230

1999 Commercial Buildings Characteristics--Disaggregated Principal Building  

U.S. Energy Information Administration (EIA) Indexed Site

Disaggregated Principal Building Activities Disaggregated Principal Building Activities Disaggregated Principal Building Activities The 1999 CBECS collected information for 20 general building activities. Five of the activities were aggregated and data for 16 activities are displayed in the detailed tables. Within the aggregated warehouse and storage category, nonrefrigerated warehouses greatly exceeded refrigerated warehouses both in amount of floorspace and number of buildings (compare Figure 1 with Figure 2). Within the mercantile category, the number of retail buildings greatly exceeded strip shopping buildings which, in turn, greatly exceeded enclosed shopping malls (Figure 2). The amount of mercantile floorspace was more evenly distributed (Figure 1) because of differences in average building size-enclosed malls were largest and retail buildings the smallest.

231

Border Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

232

GAO-06-811 Information Security: Coordination of Federal Cyber Security Research and Development  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the Chairman, Committee on the Chairman, Committee on Government Reform, House of Representatives INFORMATION SECURITY Coordination of Federal Cyber Security Research and Development September 2006 GAO-06-811 What GAO Found United States Government Accountability Office Why GAO Did This Study Highlights Accountability Integrity Reliability September 2006 INFORMATION SECURITY Coordination of Federal Cyber Security Research and Development Highlights of GAO-06-811, a report to Chairman, Committee on Government Reform, House of Representatives Research and development (R&D) of cyber security technology is essential to creating a broader range of choices and more robust tools for building secure, networked computer systems in the federal government and in the private sector. The National

233

Increasing Energy Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Increasing Energy Security Increasing Energy Security Increasing Energy Security January 20, 2012 - 4:01pm Addthis Increasing Energy Security Heather Zichal Deputy Assistant to the President for Energy and Climate Change Editor's note: This article is cross-posted from WhiteHouse.gov. There is a lot of discussion lately about domestic energy production and American energy security. For the Obama Administration, moving towards the goal of energy independence has been a clear priority since day one. When President Obama took office, the United States imported 11 million barrels of oil a day. The President has put forward a plan to cut that by one-third by 2025 by strengthening domestic production of our energy resources, making our homes and buildings more efficient, and transitioning to a wide

234

Around Buildings  

E-Print Network (OSTI)

Around Buildings W h y startw i t h buildings and w o r k o u t wa r d ? For one, buildings are difficult t o a v o i d these

Treib, Marc

1987-01-01T23:59:59.000Z

235

Global Security 2009  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

23744 23744 This work was performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory under contract DE-AC52-07NA27344. Lawrence Livermore National Security, LLC DOE OCIO Open Government Technology Summit January 25, 2012 Lawrence Livermore National Laboratory LLNL-PRES-523744 2 1. Conceptualize  Define Problem  Frame Question  Identify Incentives 2. Develop  Develop Messaging  Build Website  Review & Release 3. Engage  Launch Communication  Idea Moderation  Adjust by KPIs 4. Close  Idea Evaluation  Debrief with Sponsor  Communicate Impacts Target Impacts  Program Development  Cost Reduction  Operational Improvement Value Propositions  Speed Collaboration

236

March 16, 2010, Safety and Security Reform Roundtable - Agenda  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safety and Security Reform Roundtable Safety and Security Reform Roundtable Forrestal Building, Washington, DC March 16 th , 2010 1:00 PM (EST) AGENDA * Introduction of Union Leaders Glenn Podonsky, Chief Health, Safety and Security Officer * Welcome/Introductory Remarks on Reform Goals Dan Poneman, Deputy Secretary * Reform Status and Approach - Oversight, Directives, Mission Support Glenn Podonsky, Chief Health, Safety and Security Officer * Discussion Forum - Union Feedback - Feedback on oversight reform initiatives - Priority safety issues - Experience in collaborative focus group efforts - Recommendations for a path forward * Operating Organization Perspectives 1. Tom D'Agostino Administrator, National Nuclear Security Administration 2. Steven Koonin Under Secretary for Science

237

BUILDING INSPECTION Building, Infrastructure, Transportation  

E-Print Network (OSTI)

BUILDING INSPECTION Building, Infrastructure, Transportation City of Redwood City 1017 Middlefield Sacramento, Ca 95814-5514 Re: Green Building Ordinance and the Building Energy Efficiency Standards Per of Redwood City enforce the current Title 24 Building Energy Efficiency Standards as part

238

Table 2. Number of U.S. Housing Units by Census Region and ...  

U.S. Energy Information Administration (EIA)

Home > Households, Buildings & Industry > Energy Efficiency > Residential Buildings Energy Intensities > Table 2. Number of U.S. ...

239

CBECS Buildings Characteristics --Revised Tables  

U.S. Energy Information Administration (EIA) Indexed Site

Structure Tables Structure Tables (16 pages, 93 kb) CONTENTS PAGES Table 8. Building Size, Number of Buildings, 1995 Table 9. Building Size, Floorspace, 1995 Table 10. Year Constructed, Number of Buildings, 1995 Table 11. Year Constructed, Floorspace, 1995 These data are from the 1995 Commercial Buildings Energy Consumption Survey (CBECS), a national probability sample survey of commercial buildings sponsored by the Energy Information Administration, that provides information on the use of energy in commercial buildings in the United States. The 1995 CBECS was the sixth survey in a series begun in 1979. The data were collected from a sample of 6,639 buildings representing 4.6 million commercial buildings and 58.8 billion square feet of commercial floorspace in the U.S. The 1995 data are available for the four Census

240

Education Buildings  

U.S. Energy Information Administration (EIA) Indexed Site

Education Education Characteristics by Activity... Education Education buildings are buildings used for academic or technical classroom instruction, such as elementary, middle, or high schools, and classroom buildings on college or university campuses. Basic Characteristics [ See also: Equipment | Activity Subcategories | Energy Use ] Education Buildings... Seventy percent of education buildings were part of a multibuilding campus. Education buildings in the South and West were smaller, on average, than those in the Northeast and Midwest. Almost two-thirds of education buildings were government owned, and of these, over three-fourths were owned by a local government. Tables: Buildings and Size Data by Basic Characteristics Establishment, Employment, and Age Data by Characteristics

Note: This page contains sample records for the topic "building number secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Lodging Buildings  

U.S. Energy Information Administration (EIA) Indexed Site

a nursing home, assisted living center, or other residential care building a half-way house some other type of lodging Lodging Buildings by Subcategory Figure showing lodging...

242

Commercial Buildings  

NLE Websites -- All DOE Office Websites (Extended Search)

Exterior glass windows of office tower Commercial Buildings Commercial building systems research explores different ways to integrate the efforts of research in windows, lighting,...

243

EERE: Buildings  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Commercial Building Initiative works with commercial builders and owners to reduce energy use and optimize building performance, comfort, and savings. Solid-State Lighting...

244

Buildings Energy Data Book: 7.1 National Legislation  

Buildings Energy Data Book (EERE)

4 4 Energy Independence and Security Act 2007, High Performance Commercial Buildings Create the Office of Commercial High Performance Green Buildings The Office of Commercial High Performance Green Buildings with The Office of Federal High Performance Green Buildings will establish a High Performance Green Buildings Clearinghouse to disseminate research through outreach, education, and technical assistance Zero Net Energy Initiative for Commercial Buildings was also included establishing specific goals: -- Net zero energy use in all new commercial buildings constructed by 2030 -- Net zero energy use in 50% of the United State commercial building stock by 2040 -- Net zero energy use in the entire United States commercial building stock by 2050 Source(s):

245

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1670P Thermal thermal environments different from regulatory standards. Packaging, Transport, Storage & Security

246

Designing security into software  

E-Print Network (OSTI)

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

247

Property:Building/InteriorHeight | Open Energy Information  

Open Energy Info (EERE)

Building/InteriorHeight Building/InteriorHeight Jump to: navigation, search This is a property of type Number. Interior height, m Pages using the property "Building/InteriorHeight" Showing 25 pages using this property. (previous 25) (next 25) S Sweden Building 05K0001 + 3.5 + Sweden Building 05K0002 + 3 + Sweden Building 05K0003 + 3 + Sweden Building 05K0004 + 3 + Sweden Building 05K0005 + 2.8 + Sweden Building 05K0006 + 3 + Sweden Building 05K0007 + 3.5 + Sweden Building 05K0008 + 3 + Sweden Building 05K0009 + 3 + Sweden Building 05K0010 + 3 + Sweden Building 05K0011 + 3 + Sweden Building 05K0012 + 3 + Sweden Building 05K0013 + 3 + Sweden Building 05K0014 + 3 + Sweden Building 05K0015 + 3.2 + Sweden Building 05K0016 + 3 + Sweden Building 05K0017 + 3 + Sweden Building 05K0018 + 3 +

248

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration National Nuclear Security Administration Ofice of Secure Transportation mKlK= Box RQMM= ^luquerqueI= kj= UTNUR= ;JAN 03 213 MEMORANDUM FOR GREGORY eK= WOODS GENERAL COUNSEL DEPARTMENT OF ENERGY FROM: SUBJECT: JEFFREY P. HARREL ASSIST ANT DEPU FOR SECURE 2013 ANNUAL PLANNING SUMMARY In response to your memorandum of December TI= 2012, the following information is provided for the National Nuclear Security Administration Ofice of Secure

249

Security guide for subcontractors  

Science Conference Proceedings (OSTI)

This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

Adams, R.C.

1991-01-01T23:59:59.000Z

250

Building Airtightness: Research and Practice  

NLE Websites -- All DOE Office Websites (Extended Search)

Fiscal Year 2014. Title Building Airtightness: Research and Practice Publication Type Book Chapter LBNL Report Number LBNL-53356 Year of Publication 2003 Authors Sherman, Max H.,...

251

Security challenges and opportunities in adaptive and reconfigurable hardware  

E-Print Network (OSTI)

We present a novel approach to building hardware support for providing strong security guarantees for computations running in the cloud (shared hardware in massive data centers), while maintaining the high performance and ...

Costan, Victor Marius

252

Buildings Performance Database Helps Building Owners, Investors...  

NLE Websites -- All DOE Office Websites (Extended Search)

Buildings Performance Database Helps Building Owners, Investors Evaluate Energy Efficient Buildings Buildings Performance Database June 2013 A new database of building features and...

253

Building Technologies Office: Buildings NewsDetail  

NLE Websites -- All DOE Office Websites (Extended Search)

NewsDetail on Twitter Bookmark Building Technologies Office: Buildings NewsDetail on Google Bookmark Building Technologies Office: Buildings NewsDetail on Delicious Rank Building...

254

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... Standards. ITL January 1999, Jan 1999, Secure Web-Based Access to High Performance Computing Resources. ITL November ...

255

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... Security Strategies for the Smart Grid: Protecting the ... Overview: The Government Smart Card Interoperability ... Mar 2001, An Introduction to IPsec ...

256

Personnel Security Program | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

257

Radiological Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

258

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Program Home Office of Security and Cyber Evaluations Office of Safety and Emergency Management Evaluations Guidance Documents Security and Cyber Evaluations ...

259

Cyber Security Module  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Module Cyber security training is required for all facility users and must be submitted before or upon arrival at the GUV Center. System Requirements and Information...

260

Security - Problem Solved?  

Science Conference Proceedings (OSTI)

There are plenty of security problems that have solutions. Yet, our security problems don't seem to be going away. What's wrong here?

John Viega

2005-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "building number secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Office of Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Welcome to the Office of Security Mission and Functions The Office of Security (HS-50) developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. The Office of Security, through the Office of Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented.

262

Security: A Coordinated Approach  

Science Conference Proceedings (OSTI)

... SIM / SEM Asset Management System AAA ICS/SCADA Security Physical Security ... Location-Awareness ICS/SCADA Smart Grid Mobile Devices ...

2012-10-26T23:59:59.000Z

263

JLab Security Banner  

NLE Websites -- All DOE Office Websites (Extended Search)

Computer Center | Jefferson Lab Home | Experiments | The Lab | News Privacy and Security Notice Security Notice This is a Federal computer system and is the property of the United...

264

NNSA orders security enhancements  

NLE Websites -- All DOE Office Websites (Extended Search)

orders security enhancements NNSA orders security enhancements Because of this government order, until further notice all vehicles entering government property will be required to...

265

NIST Cyber Security Framework  

Science Conference Proceedings (OSTI)

Page 1. NIST Cyber Security Framework ISA-62443-2-1 :2009 ISA-62443-2-1 (Ed. 2, D2E8 ... Page 2. Security NIST Cyber ...

2013-12-13T23:59:59.000Z

266

Building Technologies Office: Residential Buildings  

NLE Websites -- All DOE Office Websites (Extended Search)

building sector by at least 50%. Photo of people walking around a new home. Visitors Tour Solar Decathlon Homes Featuring the Latest in Energy Efficient Building Technology...

267

RECORD OF CATEGORICAL EXCLUSION (CX) DETERMINATION! National Nuclear Security Administration/Kansas City Site Office  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DETERMINATION! DETERMINATION! National Nuclear Security Administration/Kansas City Site Office A. Description of Proposed Action: (lor 2 sentences; include title, general activities, location, timeframe) Kansas City Plant - Project 1615 - Building 16 PCB Decontamination: Areas within Building 16 that exhibit PCB contamination above the 10 ug/l00cm2 exposure threshold, as defined by the Toxic Substances Control Act (TSCA) (40 CFR Part 761), would be addressed under this project. February 2014 thru September 2014. B. Number and Title of the Categorical Exclusion Being Applied: (See text in 10 CFR 1021, Subpart D.) B 1.17 - Removal of polychlorinated biphenyl-containing items from buildings, other above ground locations. C. Regulatory Requirements in 10 CFR 1021.410 (b): (See full text in regulation.)

268

IPS - Secure Internet Payment System  

Science Conference Proceedings (OSTI)

There are a number of questions one might ask about security of money transactions on the Internet. A first question might be: "Why do we need to protect money transaction on the Internet?" The Internet is an insecure and unreliable communication medium ...

Zoran Djuric

2005-04-01T23:59:59.000Z

269

Office of Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Security Policy Office of Security Policy Mission and Functions The Office of Security Policy develops and promulgates safeguards and security policy governing the protection of National Security and other critical assets entrusted to the Department. Director's Perspective Welcome to the Office of Security Policy Jack Cowden, Director The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the Department. This includes the protection of DOE nuclear facilities, nuclear weapons components, special nuclear materials and classified information. Our broad topical areas are organized as: Program Planning and Management, Protection Program Operations (which includes both physical security and protective forces), Information Security and Material Control and Accountability.

270

Using equivalence relations for corrective enforcement of security policies  

Science Conference Proceedings (OSTI)

In this paper, we present a new framework of runtime security policy enforcement. Building on previous studies, we examine the enforcement power of monitors able to transform their target's execution, rather than simply accepting it if it is valid, or ... Keywords: inlined reference monitors, monitoring, program transformation, security policy enforcement

Raphal Khoury; Nadia Tawbi

2010-09-01T23:59:59.000Z

271

BLUEPRINT FOR A SECURE ENERGY FUTURE March 30, 2011  

E-Print Network (OSTI)

Oil and Gas Development and Production Lead the World Towards Safer, Cleaner, and More Secure Energy at the Pump with More Efficient Cars and Trucks Cut Energy Bills with More Efficient Homes and Buildings V to secure our energy future." President Obama, March 30, 2011 Rising prices at the pump affect everybody

Lotko, William

272

CYBER SECURITY METRICS AND MEASURES  

Science Conference Proceedings (OSTI)

... CYBER SECURITY METRICS AND MEASURES ... Keywords: cyber security; metrics; measures; software; computer systems; IT ...

2013-05-07T23:59:59.000Z

273

Secure NEPA Documents | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Secure NEPA Documents Secure NEPA Documents Secure NEPA Documents The Department of Energy (DOE) limits electronic access to certain NEPA documents on this website due to the potential security sensitivity of some information these documents may contain. DOE regrets any inconvenience caused by this decision, which reflects an awareness of the need to protect the public. Requesting Secure NEPA Documents You may request copies of documents by e-mail or by leaving a message on our toll-free information line at 1-800-472-2756. Please provide the following information in your request: Title and Number of Document requested First Name: Last Name: Address: City: State: Zip Code: Organization (If Applicable): E-mail: Phone: List of Secure NEPA Documents May 1, 1984 EIS-0108: Final Environmental Impact Statement

274

Secure NEPA Documents | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Secure NEPA Documents Secure NEPA Documents Secure NEPA Documents The Department of Energy (DOE) limits electronic access to certain NEPA documents on this website due to the potential security sensitivity of some information these documents may contain. DOE regrets any inconvenience caused by this decision, which reflects an awareness of the need to protect the public. Requesting Secure NEPA Documents You may request copies of documents by e-mail or by leaving a message on our toll-free information line at 1-800-472-2756. Please provide the following information in your request: Title and Number of Document requested First Name: Last Name: Address: City: State: Zip Code: Organization (If Applicable): E-mail: Phone: List of Secure NEPA Documents April 1, 2007 EIS-0376: Final Environmental Impact Statement

275

Secure Manufacturing | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to optimize manufacturing and systems performance; and executing projects cost effectively and with timeliness. Y-12 accomplishes this mission to meet the national security challenges of today and those of the future, with capability and expertise in the following areas:

276

Security tasks are highly interdependent.  

E-Print Network (OSTI)

Motivation Security tasks are highly interdependent. To improve security tools, we need to understand how security practitioners collaborate in their organizations. Security practitioners in context Exchange of Information Develop security tools that: · Integrate information from different communication

277

Security Policies Dr. Ahmad Almulhem  

E-Print Network (OSTI)

Security Policies Dr. Ahmad Almulhem Computer Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 51 #12;Security Policies Types of Security Policies Trust Types of Access Control Summary Part I Overview Ahmad Almulhem - Network Security Engineering

Almulhem, Ahmad

278

Nuclear Security | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

279

Nuclear Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

280

Nuclear Security Enterprise | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Enterprise | National Nuclear Security Administration Enterprise | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Enterprise Home > About Us > Our Programs > Defense Programs > Nuclear Security Enterprise Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective nuclear deterrent through the

Note: This page contains sample records for the topic "building number secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Nevada National Security Site Operational Awareness Oversight...  

NLE Websites -- All DOE Office Websites (Extended Search)

HSS Independent Activity Report - Rev. 0 Report Number: HIAR NNSS-2011-11-28 Site: Nevada National Security Site Subject: Office of Enforcement and Oversight's Office of Safety and...

282

Deterministic Secure Positioning in Wireless Sensor Networks  

Science Conference Proceedings (OSTI)

Position verification problem is an important building block for a large subset of wireless sensor networks (WSN) applications. As a result, the performance of the WSN degrades significantly when misbehaving nodes report false location information in ... Keywords: Distributed Protocol, Secure Positioning, Wireless Sensor Network

Sylvie Delat; Partha Sarathi Mandal; Mariusz A. Rokicki; Sbastien Tixeuil

2008-06-01T23:59:59.000Z

283

Nuclear Security & Safety  

Energy.gov (U.S. Department of Energy (DOE))

The Energy Department is working to enhance nuclear security through defense, nonproliferation, and environmental efforts.

284

Security Technologies Group  

Science Conference Proceedings (OSTI)

Security Technologies Group. Welcome. Our group develops measurement science in support of performance-based standards ...

2012-10-24T23:59:59.000Z

285

Industrial Control Systems Security  

Science Conference Proceedings (OSTI)

... Risk Management Architecture security focus Physical interaction ... Cybersecurity Cybersecurity Framework Smart Grid Program ...

2013-06-05T23:59:59.000Z

286

NERSC Computer Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as possible at security@nersc.gov. You may also call the NERSC consultants (or NERSC Operations during non-business hours) at 1-800-66-NERSC. Please save any evidence of the break-in and include as many details as possible in your communication with us. NERSC Computer Security Tutorial

287

Developing a Taxonomy for Various Types of Security Force Positions  

NLE Websites -- All DOE Office Websites (Extended Search)

UR 04-7226 Security Assignments 1 UR 04-7226 Security Assignments 1 Journal of Security Administration 26(2): 1-11 (2003) A TAXONOMY FOR SECURITY ASSIGNMENTS Edward G. Bitzer III, M.A. and Roger G. Johnston, Ph.D., CPP Vulnerability Assessment Team Los Alamos National Laboratory LA-UR 04-7226 Security Assignments 2 Abstract Despite its importance in most security plans, the position of security guard has undergone very little systematic examination. In response this paper proposes a formal taxonomy of security guard positions as a starting point for research. A number of procedures that could be used to test the taxonomy are proposed. Finally, implications of this work are discussed for both researchers and practitioners in the security field.

288

MN Office of Energy Security | Open Energy Information  

Open Energy Info (EERE)

MN Office of Energy Security MN Office of Energy Security Jump to: navigation, search Name MN Office of Energy Security Place St. Paul, MN Website http://www.mnofficeofenergysec References MN Office of Energy Security[1] Information About Partnership with NREL Partnership with NREL Yes Partnership Type Test & Evaluation Partner Partnering Center within NREL Electricity Resources & Building Systems Integration LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! MN Office of Energy Security is a company located in St. Paul, MN. References ↑ "MN Office of Energy Security" Retrieved from "http://en.openei.org/w/index.php?title=MN_Office_of_Energy_Security&oldid=379158" Categories: Clean Energy Organizations Companies Organizations

289

Operational Awareness Oversight of the Nevada National Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

HSS Independent Activity Report - Rev. 0 Report Number: HIAR NNSS-2012-08-16 Site: Nevada National Security Site Subject: Office of Enforcement and Oversight's Office of Safety...

290

Mercantile Buildings  

U.S. Energy Information Administration (EIA) Indexed Site

Mercantile Mercantile Characteristics by Activity... Mercantile Mercantile buildings are those used for the sale and display of goods other than food (buildings used for the sales of food are classified as food sales). This category includes enclosed malls and strip shopping centers. Basic Characteristics [ See also: Equipment | Activity Subcategories | Energy Use ] Mercantile Buildings... Almost half of all mercantile buildings were less than 5,000 square feet. Roughly two-thirds of mercantile buildings housed only one establishment. Another 20 percent housed between two and five establishments, and the remaining 12 percent housed six or more establishments. Tables: Buildings and Size Data by Basic Characteristics Establishment, Employment, and Age Data by Characteristics

291

Other Buildings  

U.S. Energy Information Administration (EIA) Indexed Site

Other Other Characteristics by Activity... Other Other buildings are those that do not fit into any of the specifically named categories. Basic Characteristics [ See also: Equipment | Activity Subcategories | Energy Use ] Other Buildings... Other buildings include airplane hangars; laboratories; buildings that are industrial or agricultural with some retail space; buildings having several different commercial activities that, together, comprise 50 percent or more of the floorspace, but whose largest single activity is agricultural, industrial/manufacturing, or residential; and all other miscellaneous buildings that do not fit into any other CBECS category. Since these activities are so diverse, the data are probably less meaningful than for other activities; they are provided here to complete

292

Building Energy Use Benchmarking Guidance  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Building Energy Use Benchmarking Guidance April 15, 2010 EISA SECTION 432 - Benchmarking of Federal Facilities (42 U.S.C. 8253 Subsection (f), Use of Energy and Water Efficiency Measures in Federal Buildings) I. Background A. Authority - Benchmarking Requirements Section 432 of the Energy Independence and Security Act of 2007 (EISA) requires the Secretary of the United States Department of Energy (DOE) to select or develop a building energy use benchmarking system and to issue guidance for use of the system. EISA requires the designated agency energy managers to enter energy use data for each metered building that is (or is a part of) a covered facility into a building energy use benchmarking system, such as the ENERGY STAR Portfolio Manager tool (Portfolio Manager) (see 42 U.S.C. 8253(f)(8)(A), as

293

Best Practices Guide to Securing Wireless Substation Applications  

Science Conference Proceedings (OSTI)

The use of wireless communications in substations raises a number of security concerns. This report, an updated version of EPRI report 1013810) identifies wireless security best practices for electric substation applications, giving special consideration to a defense-in-depth approach to wireless security. The emphasis is on technical, administrative, and operational security controls. In addition to discussing the defense-in-depth concept, the report also examines training activities and rogue device de...

2009-02-18T23:59:59.000Z

294

The Manhattan Project National Security History Series  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

The Manhattan Project National Security History Series 5 Visit our Manhattan Project web site: http://www.cfo.doe.gov/me70/manhattan/index.htm 5 DOE/MA-0002 Revised F. G. Gosling Office of History and Heritage Resources Executive Secretariat Office of Management Department of Energy January 2010 The Manhattan Project National Security History Series 5 National Security History Series Volume I: The Manhattan Project: Making the Atomic Bomb Volume II: Building the Nuclear Arsenal: Cold War Nuclear Weapons Development and Production, 1946-1989 (in progress) Volume III: Nonproliferation and Stockpile Stewardship: The Nuclear Weapons Complex in the Post-Cold War World (projected) The National Security History Series is a joint project of the Office

295

Vacant Buildings  

U.S. Energy Information Administration (EIA) Indexed Site

of 275 thousand cubic feet per building, 29.9 cubic feet per square foot, at an average cost of 475 per thousand cubic feet. Energy Consumption in Vacant Buildings by Energy...

296

Building America  

SciTech Connect

IBACOS researched the constructability and viability issues of using high performance windows as one component of a larger approach to building houses that achieve the Building America 70% energy savings target.

Brad Oberg

2010-12-31T23:59:59.000Z

297

Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Global Security We train nuclear industry professionals, emergency responders and security forces from around the world to safeguard vulnerable materials. Nuclear nonproliferation - stopping the spread of nuclear materials - is a critical part of creating a safer world. Y-12 has been working in nonproliferation since the early 1990s in more than 25 countries. As the nation reduces the size of its arsenal, Y-12 will play a central role in decommissioning weapons systems and providing weapons material for peacetime uses. We are a leader across the National Nuclear Security Administration in implementing technology and current training to ensure materials are protected with the highest degree of confidence. We provide the expertise to secure highly enriched uranium - domestically

298

Security Notice | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Notice Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized users; to access, obtain, alter, damage, or destroy information; or otherwise to interfere with the system or its operation - all are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and

299

buildings | OpenEI  

Open Energy Info (EERE)

buildings buildings Dataset Summary Description Emissions from energy use in buildings are usually estimated on an annual basis using annual average multipliers. Using annual numbers provides a reasonable estimation of emissions, but it provides no indication of the temporal nature of the emissions. Therefore, there is no way of understanding the impact on emissions from load shifting and peak shaving technologies such as thermal energy storage, on-site renewable energy, and demand control. Source NREL Date Released April 11th, 2011 (3 years ago) Date Updated April 11th, 2011 (3 years ago) Keywords buildings carbon dioxide emissions carbon footprinting CO2 commercial buildings electricity emission factors ERCOT hourly emission factors interconnect nitrogen oxides NOx SO2

300

Prototype Buildings  

Science Conference Proceedings (OSTI)

... The SDC D buildings, designed for Seattle, Washington, used special moment frames (SMFs) with reduced beam section (RBS) connections. ...

2013-02-08T23:59:59.000Z

Note: This page contains sample records for the topic "building number secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... The NIST Handbook SP 800-12. SP 800-12 (HTML). NIST IR 7621, Oct 2009, Small Business Information Security: The Fundamentals NISTIR 7621. ...

302

Office of Headquarters Security Operations: Security Awareness...  

NLE Websites -- All DOE Office Websites (Extended Search)

Paul Ruehs Contact Information: Paul Ruehs - (301) 903-7189; Room F-324 Scope: The Security Awareness Program is established by DOE Order to inform individuals of their...

303

Microsoft Word - Critical Infrastructure Security and Resilience Month.docx  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Office of the Press Secretary For Immediate Release October 31, 2013 Presidential Proclamation -- Critical Infrastructure Security and Resilience Month, 2013 CRITICAL INFRASTRUCTURE SECURITY AND RESILIENCE MONTH, 2013 - - - - - - - BY THE PRESIDENT OF THE UNITED STATES OF AMERICA A PROCLAMATION Over the last few decades, our Nation has grown increasingly dependent on critical infrastructure, the backbone of our national and economic security. America's critical infrastructure is complex and diverse, combining systems in both cyberspace and the physical world -- from power plants, bridges, and interstates to Federal buildings and the massive electrical grids that power our Nation. During Critical Infrastructure Security and Resilience Month, we

304

Commercial Building National Accounts | Open Energy Information  

Open Energy Info (EERE)

Commercial Building National Accounts Commercial Building National Accounts Jump to: navigation, search National Accounts is part of DOE's Net-Zero Energy Commercial Building Initiative (CBI), which was mandated by the 2007 Energy Independence and Security Act (EISA). EISA enabled DOE to bring together parties from the private sector, DOE national labs, other federal agencies and nongovernmental organizations to advance research into low- and zero-net-energy buildings. CBI's goal is to develop market-ready, net zero-energy commercial buildings by 2025. A net zero-energy building makes as much energy as it uses over a year[1] [2]. As of 2009, estimates indicated that retail and office buildings consume 18 percent of the nation's total energy and half of nation's overall building energy (including homes, schools, and other structures). The program

305

RL-721 Document ID Number:  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4 4 NEPA REVIEW SCREENING FORM DOE/CX-00075 I. Project Title: Project 1-718, Electrical Utili ties Transformer Management Support Facility II. Project Description and Location (including Time Period over which proposed action will occur and Project Dimensions -e.g., acres displaced/disturbed, excavation length/depth, area/location/number of buildings, etc.): The proposed action includes design, procurement, and construction of a pre-engineered metal building for transformer management; including inspections, routine maintenance, testing, refurbishing, and disposition of excess transformers. The building will be constructed in the previously disturbed, gravel-covered electrical utilities lay-down yard west of the 2101-M Building in 200 East Area of the Hanford Site. The building footprint

306

Better Buildings Neighborhood Program: Better Buildings Neighborhood  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Better Buildings Neighborhood Program Search Better Buildings Neighborhood Program Search Search Help Better Buildings Neighborhood Program HOME ABOUT BETTER BUILDINGS PARTNERS INNOVATIONS RUN A PROGRAM TOOLS & RESOURCES NEWS EERE » Building Technologies Office » Better Buildings Neighborhood Program Printable Version Share this resource Send a link to Better Buildings Neighborhood Program: Better Buildings Neighborhood Program to someone by E-mail Share Better Buildings Neighborhood Program: Better Buildings Neighborhood Program on Facebook Tweet about Better Buildings Neighborhood Program: Better Buildings Neighborhood Program on Twitter Bookmark Better Buildings Neighborhood Program: Better Buildings Neighborhood Program on Google Bookmark Better Buildings Neighborhood Program: Better Buildings Neighborhood Program on Delicious

307

Building Technologies Office: Advancing Building Energy Codes  

NLE Websites -- All DOE Office Websites (Extended Search)

Building Energy Codes Building Energy Codes Printable Version Share this resource Send a link to Building Technologies Office: Advancing Building Energy Codes to someone by E-mail Share Building Technologies Office: Advancing Building Energy Codes on Facebook Tweet about Building Technologies Office: Advancing Building Energy Codes on Twitter Bookmark Building Technologies Office: Advancing Building Energy Codes on Google Bookmark Building Technologies Office: Advancing Building Energy Codes on Delicious Rank Building Technologies Office: Advancing Building Energy Codes on Digg Find More places to share Building Technologies Office: Advancing Building Energy Codes on AddThis.com... Popular Links Success Stories Previous Next Lighten Energy Loads with System Design. Warming Up to Pump Heat.

308

Building Technologies Office: Building America Meetings  

NLE Websites -- All DOE Office Websites (Extended Search)

Building America Building America Meetings to someone by E-mail Share Building Technologies Office: Building America Meetings on Facebook Tweet about Building Technologies Office: Building America Meetings on Twitter Bookmark Building Technologies Office: Building America Meetings on Google Bookmark Building Technologies Office: Building America Meetings on Delicious Rank Building Technologies Office: Building America Meetings on Digg Find More places to share Building Technologies Office: Building America Meetings on AddThis.com... About Take Action to Save Energy Partner With DOE Activities Solar Decathlon Building America Research Innovations Research Tools Building Science Education Climate-Specific Guidance Solution Center Partnerships Meetings Publications Home Energy Score Home Performance with ENERGY STAR

309

Cranfield University Building 41 (Stafford Cripps Building)  

E-Print Network (OSTI)

Cranfield University Building 41 (Stafford Cripps Building) Building 41, formally known as the Stafford Cripps Building, has been transformed into a new Learning and Teaching Facility. Proposed ground

310

Building Technologies Office: Residential Building Activities  

NLE Websites -- All DOE Office Websites (Extended Search)

Residential Building Residential Building Activities to someone by E-mail Share Building Technologies Office: Residential Building Activities on Facebook Tweet about Building Technologies Office: Residential Building Activities on Twitter Bookmark Building Technologies Office: Residential Building Activities on Google Bookmark Building Technologies Office: Residential Building Activities on Delicious Rank Building Technologies Office: Residential Building Activities on Digg Find More places to share Building Technologies Office: Residential Building Activities on AddThis.com... About Take Action to Save Energy Partner With DOE Activities Solar Decathlon Building America Home Energy Score Home Performance with ENERGY STAR Better Buildings Neighborhood Program Challenge Home Guidelines for Home Energy Professionals

311

Better Buildings Neighborhood Program: Better Buildings Residential...  

NLE Websites -- All DOE Office Websites (Extended Search)

Better Buildings Residential Network to someone by E-mail Share Better Buildings Neighborhood Program: Better Buildings Residential Network on Facebook Tweet about Better Buildings...

312

Building Technologies Office: Better Buildings Challenge  

NLE Websites -- All DOE Office Websites (Extended Search)

on Twitter Bookmark Building Technologies Office: Better Buildings Challenge on Google Bookmark Building Technologies Office: Better Buildings Challenge on Delicious Rank...

313

Building Technologies Office: Building Energy Optimization Software  

NLE Websites -- All DOE Office Websites (Extended Search)

Building Energy Building Energy Optimization Software to someone by E-mail Share Building Technologies Office: Building Energy Optimization Software on Facebook Tweet about Building Technologies Office: Building Energy Optimization Software on Twitter Bookmark Building Technologies Office: Building Energy Optimization Software on Google Bookmark Building Technologies Office: Building Energy Optimization Software on Delicious Rank Building Technologies Office: Building Energy Optimization Software on Digg Find More places to share Building Technologies Office: Building Energy Optimization Software on AddThis.com... About Take Action to Save Energy Partner With DOE Activities Solar Decathlon Building America Research Innovations Research Tools Building Science Education Climate-Specific Guidance

314

U.S. No Longer Building Any Nuclear Weapons | National Nuclear...  

NLE Websites -- All DOE Office Websites (Extended Search)

No Longer Building Any Nuclear Weapons | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency...

315

Building Science  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Science Science The "Enclosure" Joseph Lstiburek, Ph.D., P.Eng, ASHRAE Fellow www.buildingscience.com * Control heat flow * Control airflow * Control water vapor flow * Control rain * Control ground water * Control light and solar radiation * Control noise and vibrations * Control contaminants, environmental hazards and odors * Control insects, rodents and vermin * Control fire * Provide strength and rigidity * Be durable * Be aesthetically pleasing * Be economical Building Science Corporation Joseph Lstiburek 2 Water Control Layer Air Control Layer Vapor Control Layer Thermal Control Layer Building Science Corporation Joseph Lstiburek 3 Building Science Corporation Joseph Lstiburek 4 Building Science Corporation Joseph Lstiburek 5 Building Science Corporation

316

Buildings Blog  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

blog Office of Energy Efficiency & blog Office of Energy Efficiency & Renewable Energy Forrestal Building 1000 Independence Avenue, SW Washington, DC 20585 en EnergyPlus Boosts Building Efficiency with Help from Autodesk http://energy.gov/eere/articles/energyplus-boosts-building-efficiency-help-autodesk building-efficiency-help-autodesk" class="title-link">EnergyPlus Boosts Building Efficiency with Help from Autodesk

317

Extending WS-Security to Implement Security Protocols for Web Services  

E-Print Network (OSTI)

Web services use tokens provided by the WS-Security standard to implement security protocols. We propose several extensions to the WS-Security standard, including name types, key and random number extensions. The extensions are used to implement existing protocols such as ISO9798, Kerberos or BAN-Lowe. The advantages of using these implementations rather than the existing, binary ones, are inherited from the advantages of using Web service technologies, such as extensibility and end-to-end security across multiple environments that do not support a connection-based communication.

Bela, Genge

2009-01-01T23:59:59.000Z

318

Property:Building/FloorAreaMiscellaneous | Open Energy Information  

Open Energy Info (EERE)

FloorAreaMiscellaneous FloorAreaMiscellaneous Jump to: navigation, search This is a property of type Number. Floor area for Miscellaneous Pages using the property "Building/FloorAreaMiscellaneous" Showing 25 pages using this property. S Sweden Building 05K0002 + 360 + Sweden Building 05K0005 + 110 + Sweden Building 05K0013 + 3,550 + Sweden Building 05K0016 + 445 + Sweden Building 05K0021 + 250 + Sweden Building 05K0025 + 254 + Sweden Building 05K0035 + 1,629 + Sweden Building 05K0037 + 175 + Sweden Building 05K0040 + 869 + Sweden Building 05K0044 + 1,234 + Sweden Building 05K0047 + 1,039 + Sweden Building 05K0051 + 1,489.92 + Sweden Building 05K0052 + 200 + Sweden Building 05K0062 + 140 + Sweden Building 05K0063 + 654 + Sweden Building 05K0068 + 746 + Sweden Building 05K0071 + 293 +

319

Energy Information Administration (EIA)- Commercial Buildings Energy  

U.S. Energy Information Administration (EIA) Indexed Site

9 CBECS Survey Data 2003 | 1999 | 1995 | 1992 | Previous 9 CBECS Survey Data 2003 | 1999 | 1995 | 1992 | Previous Building Characteristics Consumption & Expenditures Microdata Methodology Building Characteristics Data from the 1999 Commercial Buildings Energy Consumption Survey (CBECS) are presented in the Building Characteristics tables, which include number of buildings and total floorspace for various Building Characteristics, and Consumption and Expenditures tables, which include energy usage figures for major energy sources. Complete sets of RSE tables (What is an RSE?) are also available in PDF format 1999 Summary Tables for all principal building activities Summary Tables For All Principal Building Activities Number of Buildings (thousand) Floorspace (million square feet) Square Feet per Building (thousand) Median Age of Building (years)

320

RECORD OF CATEGORICAL EXCLUSION (CX) DETERMINATION I National Nuclear Security Administration/Kansas City Site Office  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration/Kansas City Site Office National Nuclear Security Administration/Kansas City Site Office A. Description of Proposed Action: (lor 2 sentences: include title, general activities, location, timeframc) Kirtland Operations - Project 1769 - Relocate NC-135 Site Operations: transfer existing operations from the NC-135 site on Kirtland Air force Base (KAFB) to leased and other Federal property. No buildings designed for occupancy are being relocated. Transfer will consist of tenant improvements to the new leased properties and transfer through the relocation of existing equipment and office personnel. November 2012 thru April 2014. B. Number and Title of the Categorical Exclusion Being Applied: (See text in 10 CFR 1021, Subpart D.) B 1.24 - Property Transfer B 1.31 - Installation or relocation of machinery and equipment

Note: This page contains sample records for the topic "building number secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Residential Buildings  

NLE Websites -- All DOE Office Websites (Extended Search)

Exterior and interior of apartment building Exterior and interior of apartment building Residential Buildings The study of ventilation in residential buildings is aimed at understanding the role that air leakage, infiltration, mechanical ventilation, natural ventilation and building use have on providing acceptable indoor air quality so that energy and related costs can be minimized without negatively impacting indoor air quality. Risks to human health and safety caused by inappropriate changes to ventilation and air tightness can be a major barrier to achieving high performance buildings and must be considered.This research area focuses primarily on residential and other small buildings where the interaction of the envelope is important and energy costs are dominated by space conditioning energy rather than air

322

Los Alamos CCS (Center for Computer Security) formal computer security model  

SciTech Connect

This paper provides a brief presentation of the formal computer security model currently being developed at the Los Alamos Department of Energy (DOE) Center for Computer Security (CCS). The initial motivation for this effort was the need to provide a method by which DOE computer security policy implementation could be tested and verified. The actual analytical model was a result of the integration of current research in computer security and previous modeling and research experiences. The model is being developed to define a generic view of the computer and network security domains, to provide a theoretical basis for the design of a security model, and to address the limitations of present models. Formal mathematical models for computer security have been designed and developed in conjunction with attempts to build secure computer systems since the early 70's. The foundation of the Los Alamos DOE CCS model is a series of functionally dependent probability equations, relations, and expressions. The mathematical basis appears to be justified and is undergoing continued discrimination and evolution. We expect to apply the model to the discipline of the Bell-Lapadula abstract sets of objects and subjects. 5 refs.

Dreicer, J.S.; Hunteman, W.J. (Los Alamos National Lab., NM (USA))

1989-01-01T23:59:59.000Z

323

NNSA PERSONNEL SECURITY CLEARANCE ACTION REQUEST Required: SUBJECT INFORMATION  

NLE Websites -- All DOE Office Websites (Extended Search)

PERSONNEL SECURITY PERSONNEL SECURITY CLEARANCE ACTION REQUEST Required: SUBJECT INFORMATION Contractor Federal Name (Last, First, Middle): Suffix: Date of Birth: Social Security Number: Place of Birth (city and state/country): Citizenship(s): Email Address: Employer (legal name): Job Title: Required: LOCATION/BILLING Work Location: Contracting Office Location/SON: Prime Contract Number: Sub-contract Number: Facility Code: Employer Code: Required: CLEARANCE ACTION Requested Action(s): Clearance Level: (for employer/contract above) Clearance History Never held a clearance Previously held Currently holds Key Management Personnel (KMP)? Human Reliability Program (HRP)? PERSONNEL SECURITY USE ONLY: DOE Clearance: Special Access Program (SAP)? Yes No CLEARANCE JUSTIFICATION NARRATIVE

324

Quantifying Security in Secure Software Development Phases  

Science Conference Proceedings (OSTI)

Secure software is crucial in todays software dependent world. However, most of the time, security is not addressed from the very beginning of a software development life cycle (SDLC), and it is only incorporated after the software has been developed. ...

Muhammad Umair Ahmed Khan; Mohammad Zulkernine

2008-07-01T23:59:59.000Z

325

Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)  

Science Conference Proceedings (OSTI)

Battelles National Security & Defense objective is, applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratorys (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

Hadley, Mark D.; Clements, Samuel L.

2009-01-01T23:59:59.000Z

326

SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS  

E-Print Network (OSTI)

SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology The selection and implementation of security controls are critical decisions for protecting

327

Building Technologies Office: Commercial Reference Buildings  

NLE Websites -- All DOE Office Websites (Extended Search)

Commercial Reference Commercial Reference Buildings to someone by E-mail Share Building Technologies Office: Commercial Reference Buildings on Facebook Tweet about Building Technologies Office: Commercial Reference Buildings on Twitter Bookmark Building Technologies Office: Commercial Reference Buildings on Google Bookmark Building Technologies Office: Commercial Reference Buildings on Delicious Rank Building Technologies Office: Commercial Reference Buildings on Digg Find More places to share Building Technologies Office: Commercial Reference Buildings on AddThis.com... About Take Action to Save Energy Activities 179d Tax Calculator Advanced Energy Design Guides Advanced Energy Retrofit Guides Building Energy Data Exchange Specification Buildings Performance Database Data Centers Energy Asset Score

328

Building Technologies Office: Buildings to Grid Integration  

NLE Websites -- All DOE Office Websites (Extended Search)

Buildings to Grid Buildings to Grid Integration to someone by E-mail Share Building Technologies Office: Buildings to Grid Integration on Facebook Tweet about Building Technologies Office: Buildings to Grid Integration on Twitter Bookmark Building Technologies Office: Buildings to Grid Integration on Google Bookmark Building Technologies Office: Buildings to Grid Integration on Delicious Rank Building Technologies Office: Buildings to Grid Integration on Digg Find More places to share Building Technologies Office: Buildings to Grid Integration on AddThis.com... About Take Action to Save Energy Partner with DOE Activities Appliances Research Building Envelope Research Windows, Skylights, & Doors Research Space Heating & Cooling Research Water Heating Research Lighting Research

329

Nuclear Security 101 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

330

Nuclear Security 101 | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

331

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO), May 2011

332

Secure Shell (SSH)  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Shell (SSH) Name: Rutaiwan Status: Educator Age: 20s Location: NA Country: NA Date: June 2003 Question: What is the Secure Shell (SSH)? What is a strong and weak points of...

333

Foundation for system security  

Science Conference Proceedings (OSTI)

We provide a coherent framework for the design and analysis of secure systems. Our framework is inspired by Lawrence Lessig's modalities of control, by Niklas Luhmann's theory of trust, by existing models of information security, and by existing models ...

Clark Thomborson

2009-01-01T23:59:59.000Z

334

Performance and security tradeoff  

Science Conference Proceedings (OSTI)

A tradeoff is a situation that involves losing one quality or aspect of something in return for gaining another quality or aspect. Speaking about the tradeoff between performance and security indicates that both, performance and security, can be measured, ...

Katinka Wolter; Philipp Reinecke

2010-06-01T23:59:59.000Z

336

Checking Security Policy Compliance  

E-Print Network (OSTI)

Ensuring compliance of organizations to federal regulations is a growing concern. This paper presents a framework and methods to verify whether an implemented low-level security policy is compliant to a high-level security policy. Our compliance checking framework is based on organizational and security metadata to support refinement of high-level concepts to implementation specific instances. Our work uses the results of refinement calculus to express valid refinement patterns and their properties. Intuitively, a low-level security policy is compliant to a high-level security policy if there is a valid refinement path from the high-level security policy to the low-level security policy. Our model is capable of detecting violations of security policies, failures to meet obligations, and capability and modal conflicts.

Gowadia, Vaibhav; Kudo, Michiharu

2008-01-01T23:59:59.000Z

337

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Digital Age - Information Security Transformation for the ... to Information Systems (Transforming the Certification ... for Smart Grid Cyber Security (NIST ...

338

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Automated Information Flows for Situational Awareness; Transformation of Dynamic Security ... Cyber security leadership in the Executive Branch. ...

339

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... per the Security Content Automation Protocol (SCAP ... securely install and configure a device; and; ... applicable scenarios and distribution formats, the ...

340

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Nuclear Regulatory Commission; National Security Agency (File ... Richard S. Carson & Associates; RSA Securities; RU Consulting (File 1 of 2 ...

Note: This page contains sample records for the topic "building number secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

T-645: Microsoft Security Bulletin Advance Notification | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Microsoft Security Bulletin Advance Notification 5: Microsoft Security Bulletin Advance Notification T-645: Microsoft Security Bulletin Advance Notification June 13, 2011 - 3:45pm Addthis PROBLEM: This is an advance notification of security bulletins that Microsoft is intending to release on June 14, 2011. PLATFORM: Windows Operating System and Components, Microsoft Office Suites and Software, Microsoft Server Software, Microsoft Developer Tools and Software and Microsoft Security Software ABSTRACT: Microsoft provides the Microsoft Security Bulletin Advance Notification Service. This advance notification is intended to help our customers plan for effective deployment of security updates, and includes information about the number of new security updates being released, the software affected, severity levels of vulnerabilities, and information about any

342

T-687: Microsoft Security Bulletin Advance Notification for August 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

87: Microsoft Security Bulletin Advance Notification for August 87: Microsoft Security Bulletin Advance Notification for August 2011 T-687: Microsoft Security Bulletin Advance Notification for August 2011 August 8, 2011 - 3:50pm Addthis PROBLEM: This is an advance notification of security bulletins that Microsoft is intending to release on August 9, 2011. PLATFORM: MS Windows Operating System and Components ABSTRACT: Microsoft Security Bulletin Advance Notification for August 2011. reference LINKS: Microsoft Security Bulletin Microsoft Security Bulletin Summaries IMPACT ASSESSMENT: Medium Discussion: An advance notification of security bulletins that Microsoft is intending to release on August 9, 2011. 12 Bulletin updates and two are considered 'Critical'. Impact: This advance notification provides a number as the bulletin identifier,

343

The management of the National Nuclear Security Administration's Classified Enterprise Secure Network project  

Science Conference Proceedings (OSTI)

Original publisher: Washington, DC : U.S. Dept. of Energy, Office of Inspector General, Office of Audit Services, [2009] OCLC Number: (OCoLC)712149327 Subject: Nuclear weapons information -- Security measures -- Evaluation. Excerpt: ... support of ESN. ...

United States. Dept. of Energy. Office

2011-09-01T23:59:59.000Z

344

Self-benchmarking Guide for Laboratory Buildings: Metrics, Benchmarks...  

NLE Websites -- All DOE Office Websites (Extended Search)

Laboratory Buildings: Metrics, Benchmarks, Actions Title Self-benchmarking Guide for Laboratory Buildings: Metrics, Benchmarks, Actions Publication Type Report LBNL Report Number...

345

Validation of the Window Model of the Modelica Buildings Library  

NLE Websites -- All DOE Office Websites (Extended Search)

Validation of the Window Model of the Modelica Buildings Library Title Validation of the Window Model of the Modelica Buildings Library Publication Type Report LBNL Report Number...

346

Office Buildings - End-Use Equipment  

U.S. Energy Information Administration (EIA) Indexed Site

End-Use Equipment End-Use Equipment The types of space heating equipment used in office buildings were similar to those of the commercial buildings sector as a whole (Table 8 and Figure 5). Furnaces were most used followed by packaged heating systems. Individual space heaters were third-most used but were primarily used to supplement the building's main heating system. Boilers and district heat systems were more often used in larger buildings. Table 8. Types of Heating Equipment Used in Office Buildings, 2003 Number of Buildings (thousand) Total Floorspace (million square feet) All Buildings* All Office Buildings All Buildings* All Office Buildings All Buildings 4,645 824 64,783 12,208 All Buildings with Space Heating 3,982 802 60,028 11,929 Heating Equipment (more than one may apply)

347

ADVANCED DATA SECURITY  

Science Conference Proceedings (OSTI)

ADVANCED DATA SECURITY. NVLAP Lab Code: 200968-0. Address and Contact Information: 1933 O'Toole Avenue San ...

2013-11-08T23:59:59.000Z

348

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

349

Security system signal supervision  

SciTech Connect

This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

1991-09-01T23:59:59.000Z

350

Verifiably secure devices  

Science Conference Proceedings (OSTI)

We put forward the notion of a verifiably secure device, in essence a stronger notion of secure computation, and achieve it in the ballot-box model. Verifiably secure devices 1. Provide a perfect solution to the problem of achieving correlated equilibrium, ...

Sergei Izmalkov; Matt Lepinski; Silvio Micali

2008-03-01T23:59:59.000Z

351

Understanding Android Security  

Science Conference Proceedings (OSTI)

Google's Android platform is a widely anticipated open source operating system for mobile phones. This article describes Android's security model and attempts to unmask the complexity of secure application development. The authors conclude by identifying ... Keywords: Android, mobile phones, Smartphones, security

William Enck; Machigar Ongtang; Patrick McDaniel

2009-01-01T23:59:59.000Z

352

Security auditing course development  

Science Conference Proceedings (OSTI)

As people increasingly depend on computers and network systems, security auditing has become one of the most effective security practices to achieve defense-in-depth in organizations. It follows an effective process to measure policies, procedures ... Keywords: IT audit, IT education, curriculum development, security

Yin Pan

2007-10-01T23:59:59.000Z

353

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1846P CustomTraining Sandia providesPRAsandhowtheycanbemanaged to increase levels of safety and security. Like othertrainings,Sandiaexpertsdesigncoursesto beasbroadorin

354

Human Rights and Security  

E-Print Network (OSTI)

Migration, Human Rights and Security in Europe MRU Student Conference Proceedings 2012 Edited by Siril Berglund, Helen McCarthy and Agata Patyna #12;2 "Migration, Human Rights and Security...............................................................................................58 #12;3 "Migration, Human Rights and Security in Europe", MRU Student Conference Proceedings

Saunders, Mark

355

UNIVERSITY POLICE ANNUAL SECURITY  

E-Print Network (OSTI)

UNIVERSITY POLICE 2013 ANNUAL SECURITY AND FIRE SAFETY GUIDE In compliance with the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act The University of New Orleans. Please take a moment to read the following information. #12;ANNUAL SECURITY AND FIRE SAFETY GUIDE 2013

Kulp, Mark

356

Functional Programming and Security  

E-Print Network (OSTI)

This paper analyses the security contribution of typical functional-language features by examining them in the light of accepted information security principles. Imperative and functional code are compared to illustrate various cases. In conclusion, there may be an excellent case for the use of functional languages on the grounds of better security; however, empirical research should be done to validate this possibility.

Motara, Yusuf Moosa

2012-01-01T23:59:59.000Z

357

Information Security Guide  

E-Print Network (OSTI)

Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

358

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-0987P Transportation of the safe and secure transport of radioactive and hazardous materials. AWaytoEnsureSafeTransport Sandia

359

White House Forum on Energy Security (Update) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

White House Forum on Energy Security (Update) White House Forum on Energy Security (Update) White House Forum on Energy Security (Update) July 27, 2010 - 4:48pm Addthis John Schueler John Schueler Former New Media Specialist, Office of Public Affairs What does this mean for me? The Department of Energy is partnering with the Department of Defense to accelerate clean energy innovation and enhance national energy security. Earlier this afternoon high ranking officials from the Departments of Energy and Defense came together with national security officials, business leaders, academics and other stakeholders for a discussion on the national security imperative of building a clean energy economy. Navy Secretary Ray Mabus and Deputy Energy Secretary Daniel Poneman kicked off the session by announcing a Memorandum of Understanding between

360

Property:Building/FloorAreaShops | Open Energy Information  

Open Energy Info (EERE)

Property Property Edit with form History Facebook icon Twitter icon » Property:Building/FloorAreaShops Jump to: navigation, search This is a property of type Number. Floor area for Shops Pages using the property "Building/FloorAreaShops" Showing 19 pages using this property. S Sweden Building 05K0002 + 900 + Sweden Building 05K0009 + 800 + Sweden Building 05K0012 + 1,587 + Sweden Building 05K0013 + 154 + Sweden Building 05K0017 + 3,150 + Sweden Building 05K0018 + 245 + Sweden Building 05K0019 + 5,600 + Sweden Building 05K0035 + 292 + Sweden Building 05K0046 + 530 + Sweden Building 05K0062 + 940 + Sweden Building 05K0081 + 530 + Sweden Building 05K0086 + 920 + Sweden Building 05K0088 + 1,170 + Sweden Building 05K0089 + 976 + Sweden Building 05K0092 + 360 +

Note: This page contains sample records for the topic "building number secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Program Areas | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Programs Initiatives Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Program Areas SHARE Program...

362

Supporting Organizations | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Supporting Organizations SHARE Supporting...

363

Office Buildings  

U.S. Energy Information Administration (EIA) Indexed Site

Since they comprised 18 percent of commercial floorspace, this means that their total energy intensity was just slightly above average. Office buildings predominantly used...

364

Better Buildings Neighborhood Program: Better Buildings Partners  

NLE Websites -- All DOE Office Websites (Extended Search)

Better Better Buildings Partners to someone by E-mail Share Better Buildings Neighborhood Program: Better Buildings Partners on Facebook Tweet about Better Buildings Neighborhood Program: Better Buildings Partners on Twitter Bookmark Better Buildings Neighborhood Program: Better Buildings Partners on Google Bookmark Better Buildings Neighborhood Program: Better Buildings Partners on Delicious Rank Better Buildings Neighborhood Program: Better Buildings Partners on Digg Find More places to share Better Buildings Neighborhood Program: Better Buildings Partners on AddThis.com... Better Buildings Residential Network Progress Stories Interviews Videos Events Quick Links to Partner Information AL | AZ | CA | CO | CT FL | GA | IL | IN | LA ME | MD | MA | MI | MO NE | NV | NH | NJ | NY

365

Building Technologies Office: National Laboratories Supporting Building  

NLE Websites -- All DOE Office Websites (Extended Search)

National Laboratories National Laboratories Supporting Building America to someone by E-mail Share Building Technologies Office: National Laboratories Supporting Building America on Facebook Tweet about Building Technologies Office: National Laboratories Supporting Building America on Twitter Bookmark Building Technologies Office: National Laboratories Supporting Building America on Google Bookmark Building Technologies Office: National Laboratories Supporting Building America on Delicious Rank Building Technologies Office: National Laboratories Supporting Building America on Digg Find More places to share Building Technologies Office: National Laboratories Supporting Building America on AddThis.com... About Take Action to Save Energy Partner With DOE Activities Solar Decathlon Building America

366

Building Technologies Office: Integrated Building Management System  

NLE Websites -- All DOE Office Websites (Extended Search)

Integrated Building Integrated Building Management System Research Project to someone by E-mail Share Building Technologies Office: Integrated Building Management System Research Project on Facebook Tweet about Building Technologies Office: Integrated Building Management System Research Project on Twitter Bookmark Building Technologies Office: Integrated Building Management System Research Project on Google Bookmark Building Technologies Office: Integrated Building Management System Research Project on Delicious Rank Building Technologies Office: Integrated Building Management System Research Project on Digg Find More places to share Building Technologies Office: Integrated Building Management System Research Project on AddThis.com... About Take Action to Save Energy Partner with DOE

367

JOB NUMBER  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

. . . . . . . . . .: LEAVE BLANK (NARA use only) JOB NUMBER N/-&*W- 9d - 3 DATE RECEIVED " -1s - 9 J - NOTIFICATION TOAGENCY , In accordance with the provisions of 44 U.S.C. 3303a the disposition request. including amendments, is ap roved except , . l for items that may be marke,, ,"dis osition not approved" or "withdrawn in c o i m n 10. 4. NAME OF PERSON WITH WHOM TO CONFER 5 TELEPHONE Jannie Kindred (202) 5&-333 5 - 2 -96 6 AGENCYCERTIFICATION -. ~ - I hereby certify that I am authorized to act for this agency in matters pertaining to the disposition of its records and that the records roposed for disposal are not now needed for the business of this agency or wiRnot be needed after t G t r & s s d ; and that written concurrence from

368

KPA Number  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Supports CMM-SW Level 3 Supports CMM-SW Level 3 Mapping of the DOE Information Systems Engineering Methodology to the Software Engineering Institute (SEI) Software Capability Maturity Model (CMM-SW) level 3. Date: September 2002 Page 1 KPA Number KPA Activity SEM Section SEM Work Product SQSE Web site http://cio.doe.gov/sqse ORGANIZATION PROCESS FOCUS OPF-1 The software process is assessed periodically, and action plans are developed to address the assessment findings. Chapter 1 * Organizational Process Management * Process Improvement Action Plan * Methodologies ! DOE Methodologies ! SEM OPF-2 The organization develops and maintains a plan for its software process development and improvement activities. Chapter 1 * Organizational Process Management * Process Improvement

369

NPT Compliance | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Compliance | National Nuclear Security Administration Compliance | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog NPT Compliance Home > Our Mission > Managing the Stockpile > NPT Compliance NPT Compliance Maintaining the safety, security and effectiveness of the nuclear deterrent without nuclear testing - especially at lower numbers - requires

370

Lemnos Interoperable Security Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Lemnos Interoperable Security Program Lemnos Interoperable Security Program Creating common language and metrics for describing functions of network security tools and testing for interoperability As energy control systems employ more Internet-based features and routable communication methods, the need grows for enhanced security functions, such as firewalls, virtual private networks (VPNs), and intrusion detection systems. When purchasing network security products, today's control systems users cannot adequately compare products from different vendors because the industry lacks a widely accepted mechanism for evaluating functionality, performance,

371

Security | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Nonproliferation and Nuclear Forensics Decision Science Sensors and Materials Security Enhancing national and homeland security requires technological advancements in everything from biosensors to risk assessments. Game-changing scientific discovery is required for the development of sensors, detectors and other technological advancements used to protect and defend our country. At Argonne, our highly collaborative community of scientists and engineers discover and develop critical security and defense technologies to prevent and mitigate events with the potential for mass disruption or destruction, thereby protecting our citizens and our national interests. Our goal is to make America a safer place through innovations in threat decision science, sensors and materials, infrastructure assurance,

372

Engineering secure software  

E-Print Network (OSTI)

In recent years computer software has gained notoriety for the endemic nature of security problems in software. These problems have been exploited with malicious intent by attackers. Most attempts at fixing these problems have been after-the-fact fixes in the form of software patches. The root causes for security problems in software are explored. A survey of research attempts at engineering secure software is presented. The techniques discussed range from those that are very similar to classical software engineering, to those that may be used in analyses of security requirements, as well as tools that can help engineer secure software. The survey classifies the approaches as process-oriented and as tools-oriented. The current approaches are incomplete in nature. They seem to address the security problem in parts and not in the whole. A comprehensive methodology, integrated with evolutionary software engineering practices is presented. The methodology combines both process and tools oriented approaches to construct secure software.

Jetly, Prateek

2001-01-01T23:59:59.000Z

373

Residential Buildings  

U.S. Energy Information Administration (EIA) Indexed Site

Residential Residential Residential Buildings Residential buildings-such as single family homes, townhomes, condominiums, and apartment buildings-are all covered by the Residential Energy Consumption Survey (RECS). See the RECS home page for further information. However, buildings that offer multiple accomodations such as hotels, motels, inns, dormitories, fraternities, sororities, convents, monasteries, and nursing homes, residential care facilities are considered commercial buildings and are categorized in the CBECS as lodging. Specific questions may be directed to: Joelle Michaels joelle.michaels@eia.doe.gov CBECS Manager Release date: January 21, 2003 Page last modified: May 5, 2009 10:18 AM http://www.eia.gov/consumption/commercial/data/archive/cbecs/pba99/residential.html

374

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

74: Drupal Secure Password Hashes Module Security Bypass 74: Drupal Secure Password Hashes Module Security Bypass Vulnerability T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability July 22, 2011 - 3:00pm Addthis PROBLEM: Drupal Secure Password Hashes Module Security Bypass Vulnerability PLATFORM: Drupal Secure Password Hashes 6.X-1.0 Drupal Secure Password Hashes 5.X-1.4 ABSTRACT: The Secure Password Hashes module for Drupal is prone to a security-bypass vulnerability. reference LINKS: Drupal Homepage SA-CONTRIB-2011-026 - Secure Password Hashes (phpass) - Multiple Vulnerabilities IMPACT ASSESSMENT: Medium Discussion: This module uses the PHPass hashing library to try to store users hashed passwords securely. The module sets a fixed string for the 'pass' column in the {users} database column but does not replace the pass attribute of the account

375

Better Buildings Neighborhood Program: Better Buildings Residential  

NLE Websites -- All DOE Office Websites (Extended Search)

Better Better Buildings Residential Network-Current Members to someone by E-mail Share Better Buildings Neighborhood Program: Better Buildings Residential Network-Current Members on Facebook Tweet about Better Buildings Neighborhood Program: Better Buildings Residential Network-Current Members on Twitter Bookmark Better Buildings Neighborhood Program: Better Buildings Residential Network-Current Members on Google Bookmark Better Buildings Neighborhood Program: Better Buildings Residential Network-Current Members on Delicious Rank Better Buildings Neighborhood Program: Better Buildings Residential Network-Current Members on Digg Find More places to share Better Buildings Neighborhood Program: Better Buildings Residential Network-Current Members on AddThis.com...

376

Building Technologies Office: Commercial Building Partnership Opportunities  

NLE Websites -- All DOE Office Websites (Extended Search)

Commercial Building Commercial Building Partnership Opportunities with the Department of Energy to someone by E-mail Share Building Technologies Office: Commercial Building Partnership Opportunities with the Department of Energy on Facebook Tweet about Building Technologies Office: Commercial Building Partnership Opportunities with the Department of Energy on Twitter Bookmark Building Technologies Office: Commercial Building Partnership Opportunities with the Department of Energy on Google Bookmark Building Technologies Office: Commercial Building Partnership Opportunities with the Department of Energy on Delicious Rank Building Technologies Office: Commercial Building Partnership Opportunities with the Department of Energy on Digg Find More places to share Building Technologies Office: Commercial

377

Building Technologies Office: About Residential Building Programs  

NLE Websites -- All DOE Office Websites (Extended Search)

About Residential About Residential Building Programs to someone by E-mail Share Building Technologies Office: About Residential Building Programs on Facebook Tweet about Building Technologies Office: About Residential Building Programs on Twitter Bookmark Building Technologies Office: About Residential Building Programs on Google Bookmark Building Technologies Office: About Residential Building Programs on Delicious Rank Building Technologies Office: About Residential Building Programs on Digg Find More places to share Building Technologies Office: About Residential Building Programs on AddThis.com... About Take Action to Save Energy Partner With DOE Activities Technology Research, Standards, & Codes Popular Residential Links Success Stories Previous Next Warming Up to Pump Heat.

378

Safeguards and Security and Cyber Security RM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safeguards and Security and Safeguards and Security and Cyber Security Review Module March 2010 CD- -0 OFFICE O S CD-1 OF ENVIRO Standard Safeguar and Cy Rev Critical D CD-2 M ONMENTA Review Pla rds and S yber Secu view Modul Decision (CD CD March 2010 AL MANAG an (SRP) Security urity le D) Applicabili D-3 GEMENT ity CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-

379

Office of Headquarters Security Operations: Operations Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

380

Office of Headquarters Security Operations: Headquarters Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

Note: This page contains sample records for the topic "building number secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Customer Service Specialist Job Number: 54844874  

E-Print Network (OSTI)

. The credit company is able to link a customer's identification number with 1 A discussion of signatures can: identification numbers for the customer, the customer's credit company, and the merchant; the amount customers' identities. ffl The credit company will not know what customers buy. Security is implemented

Heller, Barbara

382

Property:Building/FloorAreaHeatedGarages | Open Energy Information  

Open Energy Info (EERE)

Property Property Edit with form History Facebook icon Twitter icon » Property:Building/FloorAreaHeatedGarages Jump to: navigation, search This is a property of type Number. Floor area for Heated garages (> 10 °C) Pages using the property "Building/FloorAreaHeatedGarages" Showing 15 pages using this property. S Sweden Building 05K0002 + 900 + Sweden Building 05K0007 + 400 + Sweden Building 05K0020 + 300 + Sweden Building 05K0022 + 3,300 + Sweden Building 05K0031 + 2,331 + Sweden Building 05K0033 + 465 + Sweden Building 05K0035 + 1,276 + Sweden Building 05K0037 + 130 + Sweden Building 05K0039 + 580 + Sweden Building 05K0047 + 1,076 + Sweden Building 05K0048 + 340 + Sweden Building 05K0061 + 90 + Sweden Building 05K0067 + 856 + Sweden Building 05K0093 + 2,880 +

383

Property:Building/FloorAreaRestaurants | Open Energy Information  

Open Energy Info (EERE)

Property Property Edit with form History Facebook icon Twitter icon » Property:Building/FloorAreaRestaurants Jump to: navigation, search This is a property of type Number. Floor area for Restaurants Pages using the property "Building/FloorAreaRestaurants" Showing 13 pages using this property. S Sweden Building 05K0007 + 1,990 + Sweden Building 05K0008 + 300 + Sweden Building 05K0013 + 215 + Sweden Building 05K0038 + 345 + Sweden Building 05K0046 + 200 + Sweden Building 05K0058 + 330 + Sweden Building 05K0060 + 256 + Sweden Building 05K0065 + 520 + Sweden Building 05K0081 + 98 + Sweden Building 05K0089 + 155 + Sweden Building 05K0098 + 170 + Sweden Building 05K0105 + 2,450 + Sweden Building 05K0114 + 400 + Retrieved from "http://en.openei.org/w/index.php?title=Property:Building/FloorAreaRestaurants&oldid=285973#SMWResults"

384

The Department's Unclassified Cyber Security Program - 2012, IG-0877  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Evaluation Report Evaluation Report The Department's Unclassified Cyber Security Program - 2012 DOE/IG-0877 November 2012 U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Department of Energy Washington, DC 20585 November 8, 2012 MEMORANDUM FOR THE SECRETARY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Evaluation Report on "The Department's Unclassified Cyber Security Program - 2012" INTRODUCTION AND OBJECTIVE As the use of information technology resources continues to expand, the number of cyber security threats against Federal agencies has also increased. In fact, Federal cyber security officials have warned that the number of cyber attackers has increased and that the Nation's

385

Property:Building/Oid | Open Energy Information  

Open Energy Info (EERE)

Oid Oid Jump to: navigation, search This is a property of type Number. OID, m2 Pages using the property "Building/Oid" Showing 25 pages using this property. (previous 25) (next 25) S Sweden Building 05K0001 + 20,246 + Sweden Building 05K0002 + 7,700 + Sweden Building 05K0003 + 4,920 + Sweden Building 05K0004 + 26,420 + Sweden Building 05K0005 + 2,395 + Sweden Building 05K0006 + 13,957 + Sweden Building 05K0007 + 25,162 + Sweden Building 05K0008 + 8,040 + Sweden Building 05K0009 + 35,830 + Sweden Building 05K0010 + 460 + Sweden Building 05K0011 + 15,780 + Sweden Building 05K0012 + 23,220 + Sweden Building 05K0013 + 20,156 + Sweden Building 05K0014 + 1,487 + Sweden Building 05K0015 + 1,608 + Sweden Building 05K0016 + 2,786 + Sweden Building 05K0017 + 21,860 +

386

Building Technologies Office: Bookmark Notice  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

RESIDENTIAL BUILDINGS COMMERCIAL BUILDINGS APPLIANCE & EQUIPMENT STANDARDS BUILDING ENERGY CODES EERE Building Technologies Office Commercial Buildings Printable Version...

387

Federal Energy Management Program: Energy Security Planning for Sustainable  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Planning for Sustainable Buildings Security Planning for Sustainable Buildings For energy security, Federal facility managers have a responsibility to consider a broad array of potential threats and incident scenarios. An underlying process or methodology is essential to comprehensively and intelligently address all elements of energy security analysis. Given recent blackouts and concerns about vulnerable infrastructure, many public and private organizations are taking steps to ensure reliable power and continuity of operations in the event of future outages. Some government facilities have the capacity to survive short-term power outages, but are now evaluating whether their back-up power capabilities are sufficient to serve their most critical needs during a prolonged outage.

388

Building Technologies Office: Contacts  

NLE Websites -- All DOE Office Websites (Extended Search)

Office: Contacts on Twitter Bookmark Building Technologies Office: Contacts on Google Bookmark Building Technologies Office: Contacts on Delicious Rank Building...

389

Building Technologies Office: Webmaster  

NLE Websites -- All DOE Office Websites (Extended Search)

Office: Webmaster on Twitter Bookmark Building Technologies Office: Webmaster on Google Bookmark Building Technologies Office: Webmaster on Delicious Rank Building...

390

Building and Fire Publications  

Science Conference Proceedings (OSTI)

... high rise buildings; building collapse; disasters; fire ... adhesive strength; building codes; cohesive ... materials; thermal conductivity; thermal insulation ...

391

Building Technologies Office: Residential Buildings Energy Efficiency...  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Efficiency Meeting to someone by E-mail Share Building Technologies Office: Residential Buildings Energy Efficiency Meeting on Facebook Tweet about Building Technologies...

392

Building Technologies Office: Residential Buildings Energy Efficiency...  

NLE Websites -- All DOE Office Websites (Extended Search)

Buildings Energy Efficiency Meeting The U.S. Department of Energy (DOE) Building America program held the Residential Buildings Energy Efficiency Meeting in Denver, Colorado, on...

393

Building Technologies Office: 2013 DOE Building Technologies...  

NLE Websites -- All DOE Office Websites (Extended Search)

2013 DOE Building Technologies Office Program Review to someone by E-mail Share Building Technologies Office: 2013 DOE Building Technologies Office Program Review on Facebook Tweet...

394

Building America Building Science Education Roadmap  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Building America Building America Building Science Education Roadmap April 2013 Contents Introduction ................................................................................................................................ 3 Background ................................................................................................................................. 4 Summit Participants .................................................................................................................... 5 Key Results .................................................................................................................................. 6 Problem ...................................................................................................................................... 7

395

Cyberspace security: How to develop a security strategy  

E-Print Network (OSTI)

Despite all visible dividers, the Internet is getting us closer and closer, but with a great price. Our security is the price. The internatl. community is fully aware of the urgent need to secure the cyberspace as you see the multiplication of security standards and national schemes interpreting them beyond borders: ISO 15408, ISO 17799, and ISO 27001. Even though some countries, incl. the Security Big Six (SB6), are equipped with their security books and may feel relatively safe; this remains a wrong sense of security as long as they share their networks with entities of less security. The standards impose security best practices and system specifications for the development of information security management systems. Partners beyond borders have to be secure as this is only possible if all entities connected to the partnership remain secure. Unfortunately, there is no way to verify the continuous security of partners without periodic security auditing and certification, and members who do not comply should ...

Raggad, Bel G

2007-01-01T23:59:59.000Z

396

Energy Efficiency: Transportation and Buildings  

Science Conference Proceedings (OSTI)

We present a condensed version of the American Physical Society's 2008 analysis of energy efficiency in the transportation and buildings sectors in the United States with updated numbers. In addition to presenting technical findings

Michael S. Lubell; Burton Richter

2011-01-01T23:59:59.000Z

397

National Security Science Archive  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Science » National Security Science » NSS Archive National Security Science magazine Latest Issue:April 2013 All Issues » submit National Security Science Archive Using its broad and unique scientific and engineering capabilities, the Laboratory solves a diverse set of challenges to national and global security and the weapons programs. National Security Science magazine showcases the breadth and depth of the Laboratory's scientific and technical work to policy makers, the general public, academia, and scientific and technical experts. past issues cover Issue 2 2012 interactive | web | pdf past issues cover Issue 1 2012 interactive | web | pdf past issues cover Issue 3 2011 web | pdf past issues cover Issue 2 2011 web | pdf past issues cover Issue 1 2011 web | pdf past issues cover

398

Security and Privacy Notice  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Privacy Notice Security and Privacy Notice Thank you for visiting the Office of Health, Safety and Security (HSS) web site and reviewing our position on security and privacy. SECURITY NOTICE This web site is part of a Federal computer system and is the property of the United States Government. It is for authorized use only. The Department of Energy monitors this web site for security purposes to ensure it remains available and to protect information in the system. The Department of Energy uses software programs and additional equipment to monitor network traffic to identify unauthorized attempts to access, obtain, alter, damage or destroy information, or otherwise to interfere with the system or its operation. Any and all uses of this system and all files on this system

399

PNNL: Security & Privacy  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Privacy Security & Privacy Thank you for visiting the Pacific Northwest National Laboratory (PNNL) website (pnnl.gov) and reviewing our security and privacy policies. The following policies apply to all pages and sites in the pnnl.gov domain, unless otherwise noted. Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or

400

Office of Security Operations  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Physical Protection Office of Physical Protection Bill Dwyer Director, 202-586-7887 Mission The mission of the Office of Physical Protection is to implement and oversee dedicated human resources, processes, and equipment designed to protect personnel and assets entrusted to our care at Department of Energy (DOE) Headquarters facilities. The Office is comprised of dedicated DOE Federal security professionals, Headquarters Protective Force personnel, and Alarms and Access Control Technicians. These security subject matter experts work together to ensure compliance with DOE Safeguards and Security regulations, Interagency Security Committee guidance, and federal laws. The result of this collaboration is a security program designed to ensure a safe and secure working environment for all Headquarters employees.

Note: This page contains sample records for the topic "building number secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Security Topic Group  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Group Group Security and TEC * Tension exists between open forum concept of TEC and the ability of STG members to discuss security topics. - DOE will maintain the open forum - it will not form a subgroup of cleared members NAS Study * Some members want STG to formally recommend a fully independent review of security issues - DOE is reviewing the NAS study and has not formulated a position Security Topic Group (Continued) Classification Guide & Information Sharing Protocol * Guide is finished and undergoing internal concurrence - Slated for late September release * Protocol will be completed once the guide is issued Security-Related Lessons Learned * Lessons learned document was distributed and comments requested by the end of March Security Topic Group (Continued) SRG/CVSA Survey

402

Buildings*","Energy Used For  

U.S. Energy Information Administration (EIA) Indexed Site

4. Energy End Uses, Number of Buildings for Non-Mall Buildings, 2003" 4. Energy End Uses, Number of Buildings for Non-Mall Buildings, 2003" ,"Number of Buildings (thousand)" ,"All Buildings*","Energy Used For (more than one may apply)" ,,"Space Heating","Cooling","Water Heating","Cooking","Manu- facturing" "All Buildings* ...............",4645,3982,3625,3472,801,119 "Building Floorspace" "(Square Feet)" "1,001 to 5,000 ...............",2552,2100,1841,1715,354,"Q" "5,001 to 10,000 ..............",889,782,732,725,155,29 "10,001 to 25,000 .............",738,659,629,607,127,28 "25,001 to 50,000 .............",241,225,216,217,69,"Q" "50,001 to 100,000 ............",129,123,118,119,50,8

403

Industrial Buildings  

U.S. Energy Information Administration (EIA) Indexed Site

Industrial Industrial Industrial / Manufacturing Buildings Industrial/manufacturing buildings are not considered commercial, but are covered by the Manufacturing Energy Consumption Survey (MECS). See the MECS home page for further information. Commercial buildings found on a manufacturing industrial complex, such as an office building for a manufacturer, are not considered to be commercial if they have the same owner and operator as the industrial complex. However, they would be counted in the CBECS if they were owned and operated independently of the manufacturing industrial complex. Specific questions may be directed to: Joelle Michaels joelle.michaels@eia.doe.gov CBECS Manager Release date: January 21, 2003 Page last modified: May 5, 2009 10:18 AM http://www.eia.gov/consumption/commercial/data/archive/cbecs/pba99/industrial.html

404

Building debris  

E-Print Network (OSTI)

This thesis relates architectural practices to intelligent use of resources and the reuse of derelict spaces. The initial investigation of rammed earth as a building material is followed by site-specific operations at the ...

Dahmen, Joseph (Joseph F. D.)

2006-01-01T23:59:59.000Z

405

Enterprise Cyber Security Posture  

Science Conference Proceedings (OSTI)

... to enable organizations to transform uncertainties into ... org/issues- research/telecom/security-breach-notification ... systems C. Cyber-physical systems ...

2013-04-10T23:59:59.000Z

406

Hazardous Material Security (Maryland)  

Energy.gov (U.S. Department of Energy (DOE))

All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

407

Nevada National Security Site  

NLE Websites -- All DOE Office Websites (Extended Search)

of nuclear weapons and storing special nuclear materials. Other activities include environmental management, national security response, and defense and civil technologies....

408

Security - Identification Badges  

Science Conference Proceedings (OSTI)

Security - Identification Badges. All doors to the Child Care Center are locked at all times and access is via the card reader system only. ...

2013-08-15T23:59:59.000Z

409

Seamless and Secure Mobility  

Science Conference Proceedings (OSTI)

... layer techniques and the use of advanced measurement in order to accurately assess and manage the performance and security characteristics of ...

2013-11-27T23:59:59.000Z

410

DOC Information System Security Conference on Innovating ...  

Science Conference Proceedings (OSTI)

... B. Walsh, Acting Director, Cyber Security Program, Department of Homeland Security. ... R. Clark, Senior Advisor National and Cyber Security, DOC. ...

2013-06-28T23:59:59.000Z

411

National Nuclear Security Administration Overview | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nuclear Security Administration Overview National Nuclear Security Administration Overview National Nuclear Security Administration Overview More Documents & Publications National...

412

SECURITY TERMINATION STATEMENT | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

SECURITY TERMINATION STATEMENT SECURITY TERMINATION STATEMENT Form provides an individual's statement in connection with the termination of access authorization (security...

413

PNNL EERE Program: Building Technologies Program (Overview)  

NLE Websites -- All DOE Office Websites (Extended Search)

Laboratory, Energy Efficiency and Renewable Energy Program Laboratory, Energy Efficiency and Renewable Energy Program Home Program Areas Contacts Related Sites Energy Directorate PNNL Home Security & Privacy PNNL Buildings Program Overview PNNL Buildings Portfolio Science Foundation EE & Demand Response High-Performance Sustainable Design Codes and Standards Overcoming Market Barriers Analysis and Planning Key Buildings Projects Contacts Publications & Presentations PNNL Buildings Program Buildings account for about 40 percent of our nation's energy use. That's 72 percent of U.S. electricity and 55 percent of natural gas, resulting in 39 percent of U.S. carbon dioxide emissions and a range of other negative environmental impacts. The buildings sciences team at Pacific Northwest National Laboratory (PNNL) is committed to dramatically improving the

414

Building Energy Codes 101: An Introduction | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Codes 101: An Introduction Codes 101: An Introduction In order to provide a basic introduction to the varied and complex issues associated with building energy codes, the U.S. Department of Energy's Building Energy Codes Program, with valued assistance from the International Codes Council and ASHRAE, has prepared Building Energy Codes 101: An Introduction. This guide is designed to speak to a broad audience with an interest in building energy efficiency, including state energy officials, architects, engineers, designers, and members of the public. Publication Date: Wednesday, February 17, 2010 BECP_Building Energy Codes 101_February2010_v00.pdf Document Details Last Name: Britt Initials: M Affiliation: PNNL Document Number: PNNL-70586 Focus: Adoption Code Development Compliance Building Type:

415

Property:Building/TotalFloorArea | Open Energy Information  

Open Energy Info (EERE)

Property Property Edit with form History Facebook icon Twitter icon » Property:Building/TotalFloorArea Jump to: navigation, search This is a property of type Number. Total floor area (BRA), m2 Pages using the property "Building/TotalFloorArea" Showing 25 pages using this property. (previous 25) (next 25) S Sweden Building 05K0001 + 19,657 + Sweden Building 05K0002 + 7,160 + Sweden Building 05K0003 + 4,855 + Sweden Building 05K0004 + 25,650 + Sweden Building 05K0005 + 2,260 + Sweden Building 05K0006 + 13,048 + Sweden Building 05K0007 + 24,155 + Sweden Building 05K0008 + 7,800 + Sweden Building 05K0009 + 34,755 + Sweden Building 05K0010 + 437 + Sweden Building 05K0011 + 15,310 + Sweden Building 05K0012 + 22,565 + Sweden Building 05K0013 + 19,551 +

416

Annual Security Report October 2012  

E-Print Network (OSTI)

1 Annual Security Report October 2012 Mission Statement The Campus Security and Parking Services Department ("Security") exists to provide a secure and welcoming research, educational, and work environment in which security concerns are balanced with freedom of movement in an open campus atmosphere while

Goddard III, William A.

417

Dumb Ideas in Computer Security  

E-Print Network (OSTI)

Dumb Ideas in Computer Security Dr Charles P Pfleeger Pfleeger Consulting Group 19 July 2011 chuck Security" (2005) http://www.ranum.com/security/computer_security/editorials/dumb/ Default permit Ideas in Computer Security 219 Jul 2011 #12;Struck a Nerve Results 1-10 of about 2,030,000 for dumb

418

Security and Cyber Evaluations - Guidance Documents  

NLE Websites -- All DOE Office Websites (Extended Search)

Guidance Documents Security and Cyber Evaluations Security Evaluations Appraisal Process Guide, April 2008 Cyber Security Evaluations Appraisal Process Guide, April 2008 Security...

419

Integrated Security System | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Integrated Security System Integrated Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems...

420

Nevada National Security Site | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nevada National Security Site Nevada National Security Site Nevada National Security Site | October 2011 Control Point Nevada National Security Site | October 2011 Control Point...

Note: This page contains sample records for the topic "building number secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Headquarters Facilities Master Security Plan | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Headquarters Facilities Master Security Plan Headquarters Facilities Master Security Plan Welcome to the 2013 version of the Headquarters Facilities Master Security...

422

Physical Security Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Oversight Security & Cyber Evaluations Security and Cyber Guidance Physical Security Reports Physical Security Reports 2012 (U) Pantex Plant Protective Force Response...

423

Buildings*","Lit Buildings","Lighting Equipment Types  

U.S. Energy Information Administration (EIA) Indexed Site

3. Lighting Equipment, Number of Buildings for Non-Mall Buildings, 2003" 3. Lighting Equipment, Number of Buildings for Non-Mall Buildings, 2003" ,"Number of Buildings (thousand)" ,"All Buildings*","Lit Buildings","Lighting Equipment Types (more than one may apply)" ,,,"Incand- escent","Standard Fluor- escent","Compact Fluor- escent","High-Intensity Discharge","Halogen" "All Buildings* ...............",4645,4248,2184,3943,941,455,565 "Building Floorspace" "(Square Feet)" "1,001 to 5,000 ...............",2552,2261,1070,2068,382,101,205 "5,001 to 10,000 ..............",889,821,416,772,148,88,107 "10,001 to 25,000 .............",738,716,412,665,189,105,123 "25,001 to 50,000 .............",241,231,145,223,102,60,55

424

Preliminary Notice of Violation, Los Alamos National Security, LLC -  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Los Alamos National Security, LLC Los Alamos National Security, LLC - WEA-2010-04 Preliminary Notice of Violation, Los Alamos National Security, LLC - WEA-2010-04 October 18, 2010 Preliminary Notice of Violation issued to Los Alamos National Security, LLC related to the Electrical Shock that occurred at Technical Area 16 at the Los Alamos National Laboratory This letter refers to a U.S. Department of Energy (DOE) investigation into the facts and circumstances surrounding the electrical shock event that occurred in building 300 at Technical Area 16 (TA-16) at the Los Alamos National Laboratory (LANL) on March 20, 2009. The results of the investigation were provided to Los Alamos National Security, LLC (LANS) in an Investigation Report dated March 2, 2010. An enforcement conference was held on March 23, 2010, with you and members of your staff to discuss the

425

Tag: Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Global Security Tag: Global Security Displaying 1 - 10 of 61... Category: Global Security Ultrasonic cleaner cuts costs, enhances safety The process of upgrading an old cleaning unit revealed how things were once done and the advances that have followed. More... Category: Global Security Well Logging Security Initiatives GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the security of these sources worldwide. More... Category: Global Security Y-12 Receives Two R&D 100 Awards Engineers at the National Nuclear Security Administration's Y-12 National Security Complex have won two R&D 100 Awards. More... Category: Global Security Y-12 researchers garner R&D 100 awards A research chemist and his revolutionary cloth invented to clean surfaces

426

Building energy calculator : a design tool for energy analysis of residential buildings in Developing countries  

E-Print Network (OSTI)

Buildings are one of the world's largest consumers of energy, yet measures to reduce energy consumption are often ignored during the building design process. In developing countries, enormous numbers of new residential ...

Smith, Jonathan Y. (Jonathan York), 1979-

2004-01-01T23:59:59.000Z

427

August 2012 CIP Report Focuses on Smart Grid Security | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August 2012 CIP Report Focuses on Smart Grid Security August 2012 CIP Report Focuses on Smart Grid Security August 2012 CIP Report Focuses on Smart Grid Security September 4, 2012 - 2:01pm Addthis The August 2012 issue of The CIP Report from George Mason University's Center for Infrastructure Protection and Homeland Security highlights the significance and challenges to securing the smart grid. The report includes an overview of smart grid security by Deputy Assistant Secretary Hank Kenchington and the findings for reducing cyber risks from the Workshop on Securing the Smart Grid: Best Practices in Supply Chain Security, Integrity, and Resilience. The issue also includes contributions from Progress Energy explaining their collaborative efforts in building bridges between operations technology, information technology, and supply chain

428

August 2012 CIP Report Focuses on Smart Grid Security | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August 2012 CIP Report Focuses on Smart Grid Security August 2012 CIP Report Focuses on Smart Grid Security August 2012 CIP Report Focuses on Smart Grid Security September 4, 2012 - 2:01pm Addthis The August 2012 issue of The CIP Report from George Mason University's Center for Infrastructure Protection and Homeland Security highlights the significance and challenges to securing the smart grid. The report includes an overview of smart grid security by Deputy Assistant Secretary Hank Kenchington and the findings for reducing cyber risks from the Workshop on Securing the Smart Grid: Best Practices in Supply Chain Security, Integrity, and Resilience. The issue also includes contributions from Progress Energy explaining their collaborative efforts in building bridges between operations technology, information technology, and supply chain

429

Secure video communications system  

DOE Patents (OSTI)

A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

Smith, Robert L. (Idaho Falls, ID)

1991-01-01T23:59:59.000Z

430

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... and Space Administration, the National Security Agency, the Department of Energy, the US Office of Management and Budget, the Social Security ...

431

Well Logging Security Initiatives | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Well Logging Security ... Well Logging Security Initiatives The mp4 video format is not supported by this browser. Download video Captions: On Watch as GTRI demonstrates the threat...

432

Berkeley Lab Cyber Security - Cyber Security Website - Berkeley...  

NLE Websites -- All DOE Office Websites (Extended Search)

Department of Energy logo Phone Book Jobs Search Contact Us About CPIC Intranet Cyber Home Resources Training Requirements Search Cyber Security Cyber Security Website FAQs...

433

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... NIST Computer Security Division is Proud to Announce the Release of DRAFT NISTIR 7298, Revision 2: NIST Glossary of Key Information Security ...

434

Security and Training | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Training Security and Training Instability in parts of the world and increased terrorist activities worldwide intensify security concerns in protecting personnel, materials and...

435

From National Security to Environmental Security: A Historical Overview .  

E-Print Network (OSTI)

??The study attempts to provide a historical approach to the role of the environment in security studies. Contemporary security challenges have shown that the narrow (more)

Vella, Andre`

2012-01-01T23:59:59.000Z

436

The Office of Nuclear Safeguards and Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Safeguards and Security | National Nuclear Security Safeguards and Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The Office of Nuclear Safeguards and Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security > The Office of Nuclear Safeguards and Security The Office of Nuclear Safeguards and Security

437

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... To receive email notification(s) when new security publications are released, subscribe to the CSRC Publications Mailing List. ... NIST Security Events. ...

438

/ United States Government Department of Energy Memorandum DATE: August 8, 2005 Audit Report Number OAS-L-05-12  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

United States Government Department of Energy United States Government Department of Energy Memorandum DATE: August 8, 2005 Audit Report Number OAS-L-05-12 REPLY TO ATTN OF: IG-32 (A05AL036) SUBJECT: Audit Report on "Limited Life Component Exchange Program" TO: Deputy Administrator for Defense Programs, National Nuclear Security Administration INTRODUCTION AND OBJECTIVE The goal of the Limited Life Component Exchange (LLCE) Program is to schedule, build and deliver limited life components such as tritium reservoirs and neutron generators. In order for weapon systems to remain operational, these components must be periodically replaced. The objective of this audit was to determine whether the National Nuclear Security Administration's (NNSA) limited life component exchange program has sufficient capacity to provide all components needed to meet stockpile requirements.

439

Securing Control Systems Modems  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Recommended Practice for Securing Recommended Practice for Securing Control System Modems January 2008 iii ABSTRACT This paper addresses an often overlooked "backdoor" into critical infrastructure control systems created by modem connections. A modem's connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods. iv ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland

440

International Nuclear Security  

SciTech Connect

This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

Doyle, James E. [Los Alamos National Laboratory

2012-08-14T23:59:59.000Z

Note: This page contains sample records for the topic "building number secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

PRIVACY/SECURITY NOTICE  

NLE Websites -- All DOE Office Websites (Extended Search)

PRIVACY/SECURITY NOTICE PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system employs software programs to monitor network traffic to identify unauthorized activities. By accessing this Web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized

442

Indirection and computer security.  

SciTech Connect

The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

Berg, Michael J.

2011-09-01T23:59:59.000Z

443

Evaluating mobile agent platform security  

Science Conference Proceedings (OSTI)

Agent mobility requires additional security standards. While the theoretical aspects of mobile agent security have been widely studied, there are few studies about the security standards of current agent platforms. In this paper, test cases are proposed ...

Axel Brkle; Alice Hertel; Wilmuth Mller; Martin Wieser

2006-09-01T23:59:59.000Z

444

UC SECURITY FRAMEWORK 2011 -2012  

E-Print Network (OSTI)

1 UC SECURITY FRAMEWORK 2011 - 2012 #12;2 Contents Background..................................................................................................................................4 About UC Security & Campus Community Support .................................................................5 Security Service Authority and Relationship with NZ Police and Emergency Services ...........5

Hickman, Mark

445

The security of machine learning  

E-Print Network (OSTI)

of the IEEE symposium on security and privacy (pp. 188201).and communications security (CCS) (pp. 5968). Globerson,detection. In USENIX security symposium. Klimt, B. , & Yang,

Barreno, Marco; Nelson, Blaine; Joseph, Anthony D.; Tygar, J. D.

2010-01-01T23:59:59.000Z

446

January 2005 INTEGRATING IT SECURITY  

E-Print Network (OSTI)

January 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS By Joan S. Hash, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Introduction To assist federal agencies with effec tively integrating security

447

Building and Fire Publications  

Science Conference Proceedings (OSTI)

... Measured Performance of Building Integrated Photovoltaic Panels. Round 2. Measured Performance of Building Integrated Photovoltaic Panels. ...

448

Crisis prevention centers as confidence building measures: Suggestions for Northeast Asia  

SciTech Connect

Relationships between countries generally exist somewhere in the grey area between war and peace. Crisis prevention activities are particularly important and should have two goals: stabilizing tense situations that could push countries toward war, and supporting or reinforcing efforts to move countries toward peace. A Crisis Prevention Center (CPC) should facilitate efforts to achieve these goals. Its functions can be grouped into three broad, inter-related categories: establishing and facilitating communication among participating countries; supporting negotiations and consensus-building on regional security issues; and supporting implementation of agreed confidence and security building measures. Technology will play a critical role in a CPC. First, technology is required to establishing communication systems and to provide the means for organizing and analyzing this information. Second, technically-based cooperative monitoring can provide an objective source of information on mutually agreed issues. In addition, technology can be a neutral subject of interaction and collaboration between technical communities from different countries. Establishing a CPC in Northeast Asia does not require the existence of an Asian security regime. Potential first steps for such a CPC should include establishing communication channels and a dedicated communications center in each country, together with an agreement to use the system as a {open_quotes}Hot Line{close_quotes} in bilateral and multilateral emergency situations. A central CPC could also be established as a regional communications hub. The central CPC could coordinate a number of functions aimed at stabilizing regional tensions and supporting confidence building activities, perhaps initially in an unofficial capacity. Specific recommendations for confidence building measures are discussed.

Pregenzer, A.L.

1995-05-01T23:59:59.000Z

449

Enhancing regional security agreements through cooperative monitoring  

SciTech Connect

This paper proposes that strengthening regional capabilities for formulating and implementing arms control and confidence-building measures is a tangible method of enhancing regional security. It discusses the importance of developing a regional infrastructure for arms control and confidence building and elucidates the role of technology in facilitating regional arms control and confidence-building agreements. In addition, it identifies numerous applications for regional cooperative monitoring in the areas of arms control, resource management, international commerce and disaster response. The Cooperative Monitoring Center at Sandia National Laboratories, whose aim is to help individual countries and regions acquire the tools they need to develop their own solutions to regional problems, is discussed briefly. The paper ends with recommendations for establishing regional cooperative monitoring centers.

Pregenzer, A.L.

1995-05-01T23:59:59.000Z

450

Secure Smart Grid Association | Open Energy Information  

Open Energy Info (EERE)

Secure Smart Grid Association Secure Smart Grid Association Jump to: navigation, search Name Secure Smart Grid Association Address 2374 S Josephine St Place Denver, Colorado Zip 80210 Region Rockies Area Number of employees 1-10 Year founded 2009 Phone number 303-997-2824 Coordinates 39.673446°, -104.9575629° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":39.673446,"lon":-104.9575629,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

451

SCADA system security, complexity, and security proof  

Science Conference Proceedings (OSTI)

Modern Critical infrastructures have command and control systems. These command and control systems are commonly called supervisory control and data acquisition (SCADA). In the past, SCADA system has a closed operational environment, so these systems ... Keywords: 11770-2 mechanism 9, Formal security poof, SCADA, key management

Reda Shbib; Shikun Zhou; Khalil Alkadhimi

2012-11-01T23:59:59.000Z

452

Remote PC Security: Securing the home worker  

Science Conference Proceedings (OSTI)

A recent study of 1000 teleworkers in 10 countries, commissioned by Cisco, showed that one in five allows friends, family and others to use their work PC to access the Internet. Now is the time to pull stray remote workers back into the security fold. ...

Steven Furnell

2006-11-01T23:59:59.000Z

453

Efficient security mechanisms for overlay multicast based content delivery  

Science Conference Proceedings (OSTI)

This paper studies the security issues that arise in an overlay multicast architecture where service providers distribute content such as web pages, static and streaming multimedia data, realtime stock quotes, or security updates to a large number of ... Keywords: DoS-resilient, Group key management, Network access control, Overlay multicast

Sencun Zhu; Chao Yao; Donggang Liu; Sanjeev Setia; Sushil Jajodia

2007-02-01T23:59:59.000Z

454

How to secure bluetooth-based pico networks  

Science Conference Proceedings (OSTI)

We have examined Bluetooth-based Pico-network (Piconet) applications in wireless computing and cellular devices and found an extensive number of "unexpected abuses", where the security expectations of the device owner can be violated. We have studied ... Keywords: Bluetooth, design flaws, implementation flaws, pico networks, security controls

Dennis K. Nilsson; Phillip A. Porras; Erland Jonsson

2007-09-01T23:59:59.000Z

455

Rescuing of intelligence and electronic security core applications (RIESCA)  

Science Conference Proceedings (OSTI)

There are number of systems, such as transport and logistic, power and telecommunication, hydropower and nuclear power stations; that are critical systems for the functioning of day-to-day life of the society in Finland. When assessing possible risks, ... Keywords: critical infrastructure, critical process and societal security, critical system, data maining, method development, security core application

Rauno Pirinen; Jyri Rajamki; Lili Aunimo

2008-10-01T23:59:59.000Z

456

Converging Redundant Sensor Network Information for Improved Building Control  

Science Conference Proceedings (OSTI)

This project is investigating the development and application of sensor networks to enhance building energy management and security. Commercial, industrial and residential buildings often incorporate systems used to determine occupancy, but current sensor technology and control algorithms limit the effectiveness of these systems. For example, most of these systems rely on single monitoring points to detect occupancy, when more than one monitoring point would improve system performance. Phase I of the project focused on instrumentation and data collection. In Phase I, a new occupancy detection system was developed, commissioned and installed in a sample of private offices and open-plan office workstations. Data acquisition systems were developed and deployed to collect data on space occupancy profiles. In phase II of the project, described in this report, we demonstrate that a network of several sensors provides a more accurate measure of occupancy than is possible using systems based on single monitoring points. We also establish that analysis algorithms can be applied to the sensor network data stream to improve the accuracy of system performance in energy management and security applications, and show that it may be possible to use sensor network pulse rate to distinguish the number of occupants in a space. Finally, in this phase of the project we also developed a prototype web-based display that portrays the current status of each detector in a sensor network monitoring building occupancy. This basic capability will be extended in the future by applying an algorithm-based inference to the sensor network data stream, so that the web page displays the likelihood that each monitored office or area is occupied, as a supplement to the actual status of each sensor.

Dale K. Tiller; Gregor P. Henze

2005-12-01T23:59:59.000Z

457

Office of Security Operations: Headquarters Security Officers (HSO) Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Officers (HSO) Program Headquarters Security Officers (HSO) Program Responsible Individual/Contact: Wayne Berkebile - (301) 903-1163 - D-320 Scope: The Headquarters Security Officer (HSO) Program was established in 1990 by the Under Secretary of Energy in order to improve communications between the Office of Headquarters Security Operations and component organizations within DOE Headquarters. It is governed by DOE Headquarters Order 472.1, Headquarters Security Officer Program, dated 3-19-2010. Each Headquarters element is required to appoint at least one HSO and an Alternate HSO. HSOs perform a wide variety of security-related functions within their element such as obtaining security badges and clearances, maintaining Security Areas, acquiring security equipment, implementing procedures for protecting classified and sensitive information, conducting security inquiries, and arranging for required security services.

458

Security Suites | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Suites Available by Internet Service Providers Comcast Comcast offers the Norton Security Suite with antivirus and firewall software for your protection, for no additional...

459

Security and Suitability Process Reform  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security and Suitability Process Reform December 2008 Provided by the Joint Security and Suitability Reform Team EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET...

460

Smart-Grid Security Issues  

Science Conference Proceedings (OSTI)

TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

2010-01-29T23:59:59.000Z

Note: This page contains sample records for the topic "building number secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Solar Technologies and the Building Envelope  

Science Conference Proceedings (OSTI)

Advances in on-site renewable energy technology have brought the concept of zero-energy buildings within reach. Many single-story residential and commercial buildings have enough favorably oriented roof area to make achieving zero energy technically feasible, assuming no major solar obstructions exist and that energy efficiency has been aggressively implemented in the building design. As the number of stories increases, the potential to have a zero-energy building within the building's footprint decreases. As efficiencies of photovoltaic (PV) cells increase, the potential to have zero-energy buildings increases.

Torcellini, P. A.; Pless, S. D.; Judkoff, R.; Crawley, D.

2007-04-01T23:59:59.000Z

462

Buildings","All Heated  

U.S. Energy Information Administration (EIA) Indexed Site

2. Heating Equipment, Number of Buildings, 1999" 2. Heating Equipment, Number of Buildings, 1999" ,"Number of Buildings (thousand)" ,"All Buildings","All Heated Buildings","Heating Equipment (more than one may apply)" ,,,"Heat Pumps","Furnaces","Individual Space Heaters","District Heat","Boilers","Packaged Heating Units","Other" "All Buildings ................",4657,4016,492,1460,894,96,581,1347,185 "Building Floorspace" "(Square Feet)" "1,001 to 5,000 ...............",2348,1982,240,783,397,"Q",146,589,98 "5,001 to 10,000 ..............",1110,946,100,387,183,"Q",144,302,"Q" "10,001 to 25,000 .............",708,629,81,206,191,19,128,253,22

463

Buildings Energy Data Book: 4.4 Legislation Affecting Energy Consumption of Federal Buildings and Facilities  

Buildings Energy Data Book (EERE)

3 3 Energy Independence and Security Act of 2007, Provisions Affecting Energy Consumption in Federal Buildings Source(s): Standard Relating to Solar Hot Water - Requires new Federal buildings, or Federal buildings undergoing major renovations, to meet at least 30 percent of hot water demand through the use of solar hot water heaters, if cost-effective. [Section 523] Federally-Procured Appliances with Standby Power - Requires all Federal agencies to procure appliances with standby power consumption of less than 1 watt, if available and cost-effective. [Section 524] Energy Independence and Security Act of 2007, enacted December 19, 2007 Energy Reduction Goals for Federal Buildings - Amended reduction goals set by the National Energy Conservation Policy Act, and

464

Glossary Term - Atomic Number  

NLE Websites -- All DOE Office Websites (Extended Search)

Particle Previous Term (Alpha Particle) Glossary Main Index Next Term (Avogadro's Number) Avogadro's Number Atomic Number Silver's atomic number is 47 The atomic number is equal to...

465

Building Technologies Office: Building America Research Tools  

NLE Websites -- All DOE Office Websites (Extended Search)

Tools to someone by E-mail Tools to someone by E-mail Share Building Technologies Office: Building America Research Tools on Facebook Tweet about Building Technologies Office: Building America Research Tools on Twitter Bookmark Building Technologies Office: Building America Research Tools on Google Bookmark Building Technologies Office: Building America Research Tools on Delicious Rank Building Technologies Office: Building America Research Tools on Digg Find More places to share Building Technologies Office: Building America Research Tools on AddThis.com... About Take Action to Save Energy Partner With DOE Activities Solar Decathlon Building America Research Innovations Research Tools Building Science Education Climate-Specific Guidance Solution Center Partnerships Meetings Publications Home Energy Score

466

Building Technologies Office: Commercial Building Research  

NLE Websites -- All DOE Office Websites (Extended Search)

to someone by E-mail to someone by E-mail Share Building Technologies Office: Commercial Building Research on Facebook Tweet about Building Technologies Office: Commercial Building Research on Twitter Bookmark Building Technologies Office: Commercial Building Research on Google Bookmark Building Technologies Office: Commercial Building Research on Delicious Rank Building Technologies Office: Commercial Building Research on Digg Find More places to share Building Technologies Office: Commercial Building Research on AddThis.com... About Take Action to Save Energy Activities 179d Tax Calculator Advanced Energy Design Guides Advanced Energy Retrofit Guides Building Energy Data Exchange Specification Buildings Performance Database Data Centers Energy Asset Score Energy Modeling Software Global Superior Energy Performance Partnership

467

Security Technology Demonstration and Validation Sustainability Plan  

SciTech Connect

This report describes the process of creating continuity and sustainability for demonstration and validation (DEMVAL) assets at the National Security Technology Incubator (NSTI). The DEMVAL asset program is being developed as part of the National Security Preparedness Project (NSPP), funded by Department of Energy (DOE)/National Nuclear Security Administration (NNSA). The mission of the NSTI program is to identify, incubate, and accelerate technologies with national security applications at various stages of development by providing hands-on mentoring and business assistance to small businesses and emerging or growing companies. Part of this support is envisioned to be research and development of companies technology initiatives, at the same time providing robust test and evaluation of actual development activities. This program assists companies in developing technologies under the NSTI program through demonstration and validation of technologies applicable to national security created by incubators and other sources. The NSPP also will support the creation of an integrated demonstration and validation environment. Development of the commercial potential for national security technologies is a significant NSTI focus. As part of the process of commercialization, a comprehensive DEMVAL program has been recognized as an essential part of the overall incubator mission. A number of resources have been integrated into the NSTI program to support such a DEMVAL program.

None

2008-08-31T23:59:59.000Z

468

Status of Educational Efforts in National Security Workforce  

Science Conference Proceedings (OSTI)

This report documents the status of educational efforts for the preparation of a national security workforce as part of the National Security Preparedness Project, being performed by the Arrowhead Center of New Mexico State University under a DOE/NNSA grant. The need to adequately train and educate a national security workforce is at a critical juncture. Even though there are an increasing number of college graduates in the appropriate fields, many of these graduates choose to work in the private sector because of more desirable salary and benefit packages. This report includes an assessment of the current educational situation for the national security workforce.

None

2008-03-31T23:59:59.000Z

469

Privacy/Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy/Security Privacy/Security Privacy/Security Policy This web site is part of a federal computer system used to accomplish federal functions. Read the following important privacy and security information carefully. Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The Department of Energy monitors this web site for security purposes to ensure that it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of 1986 (Pub. L. 99-474) and the National Information Infrastructure Protection Act of 1996 (Pub. L. 104-294), (18 U.S.C. 1030), or other applicable criminal laws.

470

Development & expansion of an industrial control system security laboratory and an international research collaboration  

Science Conference Proceedings (OSTI)

In this paper, we describe the incremental building of a unique industrial control system laboratory designed to investigate security vulnerabilities and to support development of mitigating tools and techniques. The laboratory has been built over time ... Keywords: SCADA, critical infrastructure security, industrial control systems, test bed

Rayford B. Vaughn; Thomas Morris; Elena Sitnikova

2013-01-01T23:59:59.000Z

471

LiSP: A lightweight security protocol for wireless sensor networks  

Science Conference Proceedings (OSTI)

Small low-cost sensor devices with limited resources are being used widely to build a self-organizing wireless network for various applications, such as situation monitoring and asset surveillance. Making such a sensor network secure is crucial to their ... Keywords: Authentication, key management, lightweight security, sensor networks

Taejoon Park; Kang G. Shin

2004-08-01T23:59:59.000Z

472

Home Network Security  

E-Print Network (OSTI)

Home computers that are connected to the Internet are under attack and need to be secured. That process is relatively well understood, even though we do not have perfect solutions today and probably never will. Meanwhile, however, the home computing environment is evolving into a home network of multiple devices, which will also need to be secured. We have little experience with these new home networks and much research needs to be done in this area. This paper gives a view of the requirements and some of the techniques available for securing home networks.

Technology Journal Interoperable; Carl M. Ellison; Corporate Technology Group; Intel Corporation

2002-01-01T23:59:59.000Z

473

Federal Computer Security Program Managers' Forum (Forum ...  

Science Conference Proceedings (OSTI)

Federal Computer Security Program Managers' Forum. Summary: The Federal Computer Security Program Managers' Forum ...

2013-01-15T23:59:59.000Z

474

Global Nuclear Security Technology Division (GNSTD)  

NLE Websites -- All DOE Office Websites (Extended Search)

Systems Nonproliferation Technology Nuclear Material Detection & Characterization Nuclear Security Advanced Technologies Safeguards & Security Technology Threat Reduction...

475

Federal Information Systems Security Educators' Association ...  

Science Conference Proceedings (OSTI)

Federal Information Systems Security Educators' Association (FISSEA). Summary: The Federal Information Systems Security ...

2013-01-15T23:59:59.000Z

476

Border Gateway Protocol - Robustness and Security  

Science Conference Proceedings (OSTI)

Border Gateway Protocol - Robustness and Security. Summary: This project focuses on Robustness, Security, and Scalability ...

2012-05-03T23:59:59.000Z

477

NIST Highlight about workshop on homeland security ...  

Science Conference Proceedings (OSTI)

Workshop on Homeland Security Standards. On ... Related Links: ANSI Homeland Security Standards Panel. Contact. General ...

2011-12-14T23:59:59.000Z

478

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Risks posters; National Security Agency Counterintelligence Awareness (301-688-6535); Native Intelligence, Inc. Rainbow ...

479

SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card  

E-Print Network (OSTI)

SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card Applying for a Social Security Card is easy AND it is FREE! If you DO NOT follow these instructions, we CANNOT process your and evidence to any Social Security office. Follow instructions below. HOW TO COMPLETE THE APPLICATION Most

Li, Mo

480

Safety and Security What do Safety/Security work with?  

E-Print Network (OSTI)

Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with; · Security revolving work environment · Handle locks, keys, alarms, surveillance · Responsible

Note: This page contains sample records for the topic "building number secure" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY  

E-Print Network (OSTI)

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION Services #12;28 00 00 ELECTRONIC SAFETY AND SECURITY August 8, 2011 2 THE UNIVERSITY OF TEXAS AT AUSTIN ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION AND COMMISSIONING GUIDE PART 1 - GENERAL 1.1 NOTICE

Texas at Austin, University of

482

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY  

E-Print Network (OSTI)

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION Services #12;28 00 00 ELECTRONIC SAFETY AND SECURITY May 1, 2013 2 THE UNIVERSITY OF TEXAS AT AUSTIN ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION AND COMMISSIONING GUIDE PART 1 - GENERAL 1.1 NOTICE

Texas at Austin, University of

483

Building Description  

Science Conference Proceedings (OSTI)

... a number of environmentally progressive features, such as natural ventilation, energy recovery, a biological wastewater treatment process, and ...

2005-10-07T23:59:59.000Z

484

Office Buildings - Types of Office Buildings  

U.S. Energy Information Administration (EIA) Indexed Site

PDF Office Buildings PDF Office Buildings Types of Office Buildings | Energy Consumption | End-Use Equipment Although no one building type dominates the commercial buildings sector, office buildings are the most common and account for more than 800,000 buildings or 17 percent of total commercial buildings. Offices comprised more than 12 billion square feet of floorspace, 17 percent of total commercial floorspace, the most of any building type. Types of Office Buildings The 2003 CBECS Detailed Tables present data for office buildings along with other principal building activities (see Detailed Tables B13 and B14, for example). Since office buildings comprise a wide range of office-related activities, survey respondents were presented with a follow-up list of specific office types to choose from. Although we have not presented the

485

Building Technologies Program: Building America Publications  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Program Program HOME ABOUT ENERGY EFFICIENT TECHNOLOGIES RESIDENTIAL BUILDINGS COMMERCIAL BUILDINGS APPLIANCE & EQUIPMENT STANDARDS BUILDING ENERGY CODES EERE » Building Technologies Program » Residential Buildings About Take Action to Save Energy Partner With DOE Activities Solar Decathlon Building America Research Innovations Research Tools Building Science Education Climate-Specific Guidance Solution Center Partnerships Meetings Publications Home Energy Score Home Performance with ENERGY STAR Better Buildings Neighborhood Program Challenge Home Guidelines for Home Energy Professionals Technology Research, Standards, & Codes Feature featured product thumbnail Building America Best Practices Series Volume 14 - HVAC: A Guide for Contractors to Share with Homeowners Details Bookmark &

486

National Security Information Systems (NSIS) -National Security Systems &  

NLE Websites -- All DOE Office Websites (Extended Search)

NSSA: National Security Information Systems NSSA: National Security Information Systems Nonproliferation & National Security (NPNS) Overview Technical Nonproliferation Policy Support Strategic Trade Control Review of export license applications Multilateral Export Control Arrangements Interdiction Engagement & Training INECP INSEP GIPP Safeguards Concepts and Approaches Human Capital Development Additional Protocol Technical Assistance National Security Systems & Assessments National Security Information Systems Vulnerability Assessment Team (VAT) Radiation Detection & Response (RDR) Contact NPNS Other Major Programs Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE Division on Flickr Nonproliferation and National Security Program National Security Systems & Assessments

487

Information Security: Coordination of Federal Cyber Security Research and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security: Coordination of Federal Cyber Security Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft of this report, OMB stated that it would review the need for such guidance. Information Security: Coordination of Federal Cyber Security Research and Development More Documents & Publications Networking and Information Technology Research and Development Supplement to the President's Budget (February 2010)

488

Erera, Spring School 2004 Transportation Security  

E-Print Network (OSTI)

! Transportation security research: future #12;Erera, Spring School 2004 Outline ! Understanding transportationErera, Spring School 2004 Transportation Security Alan Erera and Chelsea C. White III Industrial transportation security ! Security regulations and programs ! Transportation security research: present

Erera, Alan

489

A compositional logic for proving security properties of protocols  

Science Conference Proceedings (OSTI)

We present a logic for proving security properties of protocols that use nonces (randomly generated numbers that uniquely identify a protocol session) and public-key cryptography. The logic, designed around a process calculus with actions for each possible ...

Nancy Durgin; John Mitchell; Dusko Pavlovic

2003-07-01T23:59:59.000Z

490

ESF: an efficient security framework for wireless sensor network  

Science Conference Proceedings (OSTI)

A wireless sensor network WSN consists of a large number of resource constrained sensor nodes, usually deployed in hostile environments, where they face a variety of malicious attacks. To address the security vulnerabilities in WSN, this paper proposes ...

Somanath Tripathy

2013-02-01T23:59:59.000Z

491

Feature: Information Security, Business and the Internet - Part 2  

Science Conference Proceedings (OSTI)

This article considers the perception of a selected number of small to medium-sized enterprises towards the security problems of E-commerce. It emphasizes the need for common sense and personal responsibility of individual business users. The centralized ...

Clive Blatchford

2000-02-01T23:59:59.000Z

492

Security/Disclaimer  

Office of Scientific and Technical Information (OSTI)

U.S. Department of Energy DOE Green Energy Home & Search About Contact Us Javascript Not Enabled OSTI Security Website Policies and Important Links Some links on this page may take...

493

National Security, Weapons Science  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security, Weapons Science National Security, Weapons Science /science-innovation/_assets/images/icon-science.jpg National Security, Weapons Science National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Dual-Axis Radiographic Hydrodynamic Test Facility (DARHT) The Dual-Axis Radiographic Hydrodynamic Test Facility at LANL is part of the DOE's stockpile stewardship program. It uses two large X-ray machines to record three-dimensional interior images of materials. In most experiments, materials (including plutonium) undergo hydrodynamic shock to simulate the implosion process in nuclear bombs and/or the effects of severe hydrodynamic stress. The tests are described as "full-scale mockups

494

Internet Security Glossary  

Science Conference Proceedings (OSTI)

This Glossary (191 pages of definitions and 13 pages of references) provides abbreviations, explanations, and recommendations for use of information system security terminology. The intent is to improve the comprehensibility of writing that deals with ...

R. Shirey

2000-05-01T23:59:59.000Z

495

Office of Security Enforcement  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

496

Office of Security Operations  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

497

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Nuclear Security Administration FY 2011 - FY 2015 Budget Outlook Managing the NNSA 4.0% Science, Technology & Engineering 14.5% Stockpile Support 17.9% Preventing the Spread of...

498

Wi-Fi security  

Science Conference Proceedings (OSTI)

"ALL [wireless security] mechanisms are completely in-effective" was the conclusion of a study by the Department of Computer Science at the University of Maryland. This discussion will systematically shed light on the inherent insecurities involved with ...

Paul Williams

2006-04-01T23:59:59.000Z

499

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

AI~W~~l AI~W~~l 11Vl'~~4 National Nuclear Security Administration Department of Energy National Nuclear Security Administration Nevada Site Office P.O. Box 98518 Las Vegas, NV 89193-8518 JAN! 8 2013 Gregory H. Woods, General Counsel, DOE/HQ (GC-1) FORS NATIONAL NUCLEAR SECURITY ADMINISTRATION NEVADA SITE OFFICE (NNSA/NSO) NATIONAL ENVIRONMENTAL POLICY ACT (NEPA) ANNUAL SUMMARY In accordance with DOE Order 451.1B, National Environmental Policy Act Compliance Program, NNSA/NSO is submitting the enclosed Annual NEP A Planning Summary. The document provides a brief description of ongoing and planned NEP A actions for calendar year 2013. This summary provides information for completion of the Site- Wide Environmental Impact Statement for the Nevada National Security Site and Off-Site Locations in the State of Nevada.

500

Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance  

Science Conference Proceedings (OSTI)

Recently, distributed data storage has gained increasing popularity for efficient and robust data management in wireless sensor networks (WSNs). The distributed architecture makes it challenging to build a highly secure and dependable yet lightweight ... Keywords: Wireless sensor networks, data storage, integrity check

Qian Wang; Kui Ren; Shucheng Yu; Wenjing Lou

2011-08-01T23:59:59.000Z